The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of computer network technology and popularization, and the technology of data acquisition, data management and data query develop rapidly. People who is in the surging "data ocean", need an intelligent technology badly, to "explore" more valuable "oil "from the "data ocean",so the data mining technology which has been successfully used in...
Kinds of text opinion on the Internet are very important to the development of companies, however, methods of opinion mining is very limited, because there always need to deal with many meaning analysis, so this paper presents a new method on opinion mining based on danger theory. Using this method, companies can make decision easier.
To set up various kinds of application system on moving Ad Hoc network, an effective mechanism for security assurance has to be provided. The paper puts forward the Plan for Threshold Identity Authentication that is based on partial Hash table without credibility center. The plan can effectively resist the external attack and passive attack from internal nodes, and thus improve the efficiency of various...
The case retrieval is the core of the case-based reasoning system. The paper applies performance prediction into the case retrieval based on case reasoning system, designs a retrieval strategy based on heterogeneous case base. The paper analyzes the organization fashion of the heterogeneous case, and mainly discusses the dynamic allocation strategy of characteristic items' weight and construction...
Chinese word segmentation is an important foundation for Chinese information processing. This paper proposes a new Chinese word segmentation model based on Bayesian network. In this model, Character alignment Viterbi algorithm, which treats the preceding word of each Chinese character as its state, and the N-gram probability as its state transition probability, is suggested to be combined with Viterbi...
Case retrieval is an important part of case-based reasoning system. According to the idea of ant colony algorithm, the paper performs clustering to case base, and on this basis, in accordance with the idea of k-means algorithm, designs a case retrieval algorithm. Then the paper analyzes the organization method based on heterogeneous case, focuses on the clustering algorithm of case and the retrieval...
How to break silence culture and establish a free climate to encourage employees' voice are big challenges faced to mangers. This study is to research the interactions between managers and employees and focus on employees' negative psychological state when organization silence occurs. In this sense, questionnaires were applied a mobile communication company in China, 444 pairs of questionnaires were...
Service performance variability and failures also arise from the inseparability of service production and consumption, which prevents quality inspections of most services prior to delivery. Service marketers therefore have a large stake in understanding both the consequences of failure and how to provide an effective recovery, so that they can minimize customer dissatisfaction following a failure...
The paper proposed the importance of document filtration system for scientific and technological personnel, and then gave a solution of filtering system at the perspective of software architecture. Finally, this paper provided a complete implementation of filtering system base on the analysis and the design, proving the feasibility of this architecture and our framework.
Case-based reasoning technology has been widely applied in many areas. This study first clustered the case base according to hierarchy, then on the foundation of which designed a retrieval strategy based on non-isomorphic case base, analyzed the hierarchal clustering rules of case base, and mainly discussed the case retrieval strategy based on clustering. The results of the experiment show that this...
Grid is essential for data-intensive application which involves great data transfer among different storage systems. One fundamental service that could be applied to any grid for reliable, high performance data transmission is discussed. Based upon standard FTP protocol, Grid FTP could be extended to the third-party control data transfer, striped data transfer and parallel data transfer. So a Grid...
At present, spatial data has been widely used in many fields, such as GIS.Nevertheless, with the explosion of spatial data and burst from user application demands, lacking of scalability and the trend of being bottle neck have been faded up from traditional centralized GIS. The range query for spatial data is the one of the typical applications. This paper presents a method of range query based on...
We apply a hierarchical control framework to a realistic arm model. With 7 degrees of freedom and 14 muscles, this arm model has complex nonlinear dynamics operating on 28-dimensional state space and 14-dimensional control space. A high-level controller is designed to capture the main features of the complex high-dimensional plant dynamics but with reduced dimensionality. This allows us to solve the...
The network learning environment is one of the keys who decide the quality of network-based education. The paper discusses the learning idea of constructivist theory and the design principles of learning environment based on constructivist theory. Then the paper proposes the overall framework of multi-strategic learning environment based on constructivist theory and analyzes in details the multiple...
Meshless methods popularized in recent years are attractive choices for solving discontinuous and large deformation problems. As one of the most popular methods to form trial function, moving least squares (MLS) can accurately fulfill input signal reconstruction of nonlinear multiple-input multiple-output sensor. However, the parameter matrix obtained from MLS approximation sometimes is ill-conditioned...
Artificial intelligence (AI) techniques have played increasingly important role in antivirus detection. At present, some principal artificial intelligence techniques applied in antivirus detection are proposed, including heuristic technique, data mining, agent technique, artificial immune, and artificial neural network. It believes that it will improve the performance of antivirus detection systems,...
Image denoising is an important step in the pre-processing of image, the noisy image will bear different characteristic. For an anisotropic image, wavelet loses their effect on singularity detection because discontinuities across edges are spatially distributed. The Finite Ridgelet transform is a new directional resolution transform and it is more suitable for describing the signals with line or hyperplane...
In artificial immune optimization algorithm, the mutation of immune cells has been considered as the key operator that determines the algorithm performance. Traditional immune optimization algorithms have used a single mutation operator, typically a Gaussian. A mixed mutation strategy may be more efficient than a single one. In view of this, a mixed mutation strategy using Gaussian and Cauchy mutations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.