The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Feature selection is a significant aspect of speech emotion recognition system. How to select a small subset out of the thousands of speech data is important for accurate classification of speech emotion. In this paper we investigate heuristic algorithm Harmony search (HS) for feature selection. We extract 3 feature sets, including MFCC, Fourier Parameters (FP), and features extracted with The Munich...
Design pattern is a way of solution building on the common or recurring problems in software design, which can be combined with Unified Modeling Language (UML) to create a system framework. The UML is a semi-formal language which semantic part is described by natural language. So it will produce semantic inconsistency problem in the modeling process. Therefore, this paper proposes an object called...
This paper analyzes the Struts framework, the Hibernate framework, and the combined framework of Struts and Hibernate. The paper also discusses how to use the combined framework to realize the application and design of the management system for scientific research projects. This system can efficiently solve the problem of the poor expansibility and poor maintainability in the application of traditional...
Through intensive study of web page automatic generation technology, this paper proposes a web page code automatic generation system on the basis of XSLT technology and describes a practical implementation of the system. Web Page code automatic generate system can achieve auto-generation of underlying system and repetitive codes, reduce boring duplication of coding in software development, improve...
As a new branch of data mining, privacy preserving data mining has become more and more important in the information security field. This paper first presents an insight into the principles of privacy preserving data mining, and then marks out the difference with normal data mining through three stages, including single data record methods, centralized dataset mining technology and secure multiparty...
In order to meet the complicated data connection between multi businesses, to meet the original business change on structure and application, to meet the multi-user management, we designed the unified database model of user-defined businesses based on those concepts of Business, ManageClass, Indice, Indice_Group, User, Instance and so on. This paper introduces the object-oriented database modeling...
Data streams contain a lot of client information that need to be carefully managed to protect privacy of clients. Most of existing privacy preserving methods, such as k-anonymity, was designed for static data sets. However these methods can not be applied on data streams directly. Moreover, in dada streams applications, there is a need to offer strong guarantees on maximum allowed delay between incoming...
Sequential pattern mining based on constraint is now an important research direction of data mining, since it can reduce the generation of useless candidates as well as make the generated patterns meet the requirements of special users. Average value constraint is a kind of tough aggregate constraint. We propose here an effective pruning strategy based on average value constraint to avoid constructing...
With the rising of data mining technology and the appearances of data stream and uncertain data technology etc, individual data, the enterprise data are possibly leaked at any moments, so the data security has become nowadays the main topic of information security. The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research...
Ontology is a method of expressing knowledge. Now the research on the automatic ontology construction has become very popular. In this paper, we introduce the principles of ontology construction, as well as the several methods of automatic construction and particularly analyze their characteristics. Finally, the ontology in military intelligence is constructed automatically by using the existing resources,...
Previous algorithms mine the complete set of sequential patterns in large database efficiently, but when mining long sequential patterns in dense databases or using low minimum supports, it may produce many redundant patterns and some uninterested patterns. In this paper, a novel weighted closed sequential pattern mining algorithm (WCSpan) is presented, which implements the closed sequential pattern...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.