Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Frequent pattern mining is an important data mining task. Since its introduction, it has drawn attention from many researchers. Consequently, many frequent pattern mining algorithms have been proposed, which include level-wise Apriori-based algorithms, tree-based algorithms, and hyperlinked array structure based algorithms. While these algorithms are popular and benefit from a few advantages, they...
Photoplethysmography (PPG) is a kind of physiological information that can be easily disturbed by motion artifacts. Therefore,this paper paid attention to the extraction of information from PPG with motion artifacts. In the paper, a new framework that can extract heart rate(HR) information from PPG signals with severe motion artifacts is proposed, using Singular Spectrum Analysis, Real-time Clustering,...
Since mirror-like odd and even features in face recognition reflect the symmetrical and asymmetrical image information, respectively, their proper combination can improve the recognition rates to some extent. However, the face imaging process can easily be affected by external factors and encounter the noise signal, which disturbs the effect of face recognition based on combinational mirror-like odd...
Data mining is a critical data analysis technique for extracting hidden information from large databases for business or industrial applications. As the size of organizational databases increase, finding information and knowledge efficiently is essential. In the past, numerous clustering algorithms based on grid-clustering schemes have been proposed. This study proposes, simple-leaping search (SLS),...
In order to maximum the profit of each flight, the airlines always have some over-booking in one flight. Accurate forecasts of the expected number of noshows for each flight can increase airline revenue by reducing the number of spoiled seats and the number of involuntary denied boarding at the departure gate. In this paper, we develop a combined model to predict no-show rates using historical data...
Modern enterprise manages indexes more refined and systematically. This paper reviews common construction and function of data warehouse on huge iron & steel enterprise and gives an example of enterprise's index. This example explains the process of building subject data set and computing and analyzing indexes by models and methods in data warehouse platform. It is proved that using the results...
In this paper, a novel multifocus image fusion method based on region selection is proposed. The basic idea is to select sharply focused regions from source images and to combine them together to reconstruct the resultant image. Region Acutance as a kind of superior sharpness criterion is introduced here for region segmentation. In view of the inevitably errors of selection, morphological operations...
Posture estimation plays an important role in human-computer interaction, many algorithms have been presented, but their precisions are not good enough, moreover, some approaches can only be applied under certain initial gestures. We propose a hierarchical estimation of body poses by adopting geodesic information in initiation and combining curvature constraints into graph model. Unlike other approaches,...
E-commerce Web sites provide the economic information by query interfaces. Query interfaces are considered as deep Web services that indirectly reflect the real schema of the hidden databases. The valid accessing method of deep Web is through query interfaces. However, the query interfaces are designed and coded in different development models and using different programming languages and the semantic...
Single photon emission computed tomography (SPECT) could achieve the functional image of the organ of interest, so the diseases can be found much earlier. Cone-beam SPECT reconstruction can improve the photo density and spatial resolution of the reconstructed image. A simple method for cone beam reconstruction is to rebin the cone-beam projection data into 2D sinograms and use 2D reconstruction method...
In this paper, the response of ALOS (the Advanced Land Observing Satellite) PALSAR (the Phased Array type L-band Synthetic Aperture Radar) data to the forest biomass was analyzed in the Qilian Mountain area within Gansu province, western China. Due to not enough field biomass, the Light Detection and Ranging (LiDAR) data were used to extract biomass in a 20 m ?? 20 m cell. Then, the relationship between...
In this paper, we study the performance of non-orthogonal pulse position modulation (NPPM) for an ultra-wideband (UWB) communication system with timing jitter in an IEEE802.15.3a channel. The error probability and performance bounds are derived for a multiuser environment. It is shown that with proper selection of the pulse waveform and modulation index, NPPM can provide better performance than orthogonal...
In this paper, we propose a cross layer approach to wireless image transmission over fading channels. We first extract the key information from the image and transmit this information only when the channel is good to ensure that most errors occur in the less important image information. The relationship between the channel SNR and Peak SNR (PSNR) of the received image is examined. Performance results...
Data acquisition system on industrial control field plays an important role in the whole industrial production procedure. This paper mainly researches FlexRay, a high speed fieldbus technology, and discusses the design procedure of data acquisition system based on FlexRay, including system basic structure, general design, hardware design and software design. The experiment result shows that data acquisition...
Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graph-based algorithms. However, such methods generally suffer the exponential state space problem. Therefore, this paper brings forward two conceptions of vulnerability correlation...
In complex rule flow logic verification, simulation based testing approach is one feasible way which tries to go through all the feasible paths. As the baseline, the total number of feasible paths is usually desired to know although it is usually a huge number. The calculation algorithm of feasible paths in a rule flow is proposed in this paper. Using air cargo loading planning rule as an example,...
We present an efficient graph based rule execution method which incorporate expert knowledge and statistical knowledge. How to use both the knowledge from expert experiences and the statistical information from business instances to improve the efficiency of rule execution is meaningful. We define a directed acyclic graph to control rule execution where each potential sequential rule execution corresponds...
We present a novel method to learn the priorities of rules for sequential rule execution during the running of a rule engine system. The priority based ordering of rules influences the condition evaluation count of rule execution. User-assigned priorities can not guarantee optimal execution performance. We present and prove that the execution count and the dependency relationship are two factors influencing...
This paper presented a new gait identification and authentication method based on Haar wavelet and Radon transform. This method consists of two stages, gait modeling and recognition. In the first stage, images extracted from video sequences are pre-processed into binary silhouette. In terms of gait cycle, they are divided into 4 states, in each of which the distinct images are selected. The horizontal...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.