The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although there have been many past studies concerning recommendation learning, such studies have ignored that, in addition to recommending learning content to the learners for browsing and learning, the system should also observe their subsequent learning attention status. The premise of effective learning is that learners must exhibit a certain extent of attention during the learning process. The...
Association rule mining (ARM), as a useful method to discover relations between attributes of objects, has been widely studied. The previous methods focused on ARM either from a certain dataset with different type attributes, or from a probabilistic dataset with only Boolean attributes. However, little work on ARM from a probabilistic dataset with coexistence of different type attributes has been...
MapReduce has shown vigorous vitality and penetrated both academia and industry in recent years. MapReduce not only can be used as an ETL tool, it can do even much more. The technique has been applied to SQL summation, OLAP, data mining, machine learning, information retrieval, multimedia data processing, science data processing etc. Basically MapReduce is a general purpose parallel computing framework...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pixels...
Digital watermarking has been a practical and interesting research topic in the last decade. Recently, a newly developed branch called reversible data hiding has emerged. It has attracted more and more attention in both researches and applications. With the definition of reversible data hiding, secret message can be hidden by schemes offered by algorithm designers. On the other hand, at the data extraction...
Detecting anomaly nodes from graphs is an important objective in many applications ranging from social networks to World Wide Web. Recently several methods have been proposed to address this problem. A limitation of most of these methods is that they are based on the random walk of the graph, and often fail to be effective. In this paper, we propose a new framework to detect anomaly nodes within a...
Anomaly intrusion detection is currently an active research topic in the field of network security. This paper proposes a novel method for detecting anomalous program behavior, which is applicable to host-based intrusion detection systems monitoring system call activities. The method employs data mining techniques to model the normal behavior of a privileged program, and extracts normal system call...
In this paper, a very high-throughput and area efficient hardware decoder of the binary (23, 12, 7) Golay code is presented. The key feature of this proposed algorithm is fast determination of the error positions through the analysis on the weight of syndromes without large operations of finite fields. Comparing with the algorithm using one syndrome, the proposed algorithm is more suitable for the...
Recently, a novel decoding procedure which is called the syndrome-weight determination for the Golay code, or the (23, 12, 7) quadratic residue code, was proposed by Chang et al. This method is not only very simple in principle but also suitable for the parallel hardware design. Furthermore, to develop a universal decoding algorithm for arbitrary binary quadratic residue codes is very important. In...
In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors...
The developing trend for the high performance electronic devices still focuses on light, thin, short and small exhibiting high heat resistance and multifunctional properties. To meet the above requirements, the copper clad laminate substrate preferably produced from the materials having high thermal resistance, high glass transition temperature and low CTE. For the above purposes, we used 2,7-dihydroxynaphthalene...
According to the basic theory of the service quality and the characteristics of highway traffic construction, this paper pointed out the conception of trunk highway service quality. Based on the theory of user satisfaction degree, the attributes were selected aim to establish comprehensive evaluation system of trunk highway service quality. At last, an example was analyzed to verify the reasonableness...
The agent-based simulation is introduced in this paper in view of the complexity of industrial cluster system. The micro-mechanism of enterprises knowledge overflow in industrial cluster is analyzed, and then the enterprises knowledge overflow is simulated based on agent. According to the simulation, the positive and negative effects of enterprises knowledge overflow in industrial cluster are analyzed.
The technology for removing oleoresin from masson pine wood without waste water is an great market demand. What is worse is that the current consumption of skim a lot of energy technology.The result is as follows: (1)The influence of the sulfur addition on the quantity of dissolved resin is remarkable.The influence of the other factors is not remarkable. (2) The ideal deresination technology is: The...
Image classification is an important technique for effective content-based multimedia retrieval. Many classifiers have been proposed while frequent patterns based approaches have received many attentions in recent years. In this paper, we proposed an image classification approach utilizing sequential patterns discovered from distinct classes. The image is segmented and low-level features are extracted...
Watermarking is a potential method for copyright protection and multimedia data authentication in the Internet. The watermarking process can be considered as a communication task, where the watermarking acting like information embedded into a host image, which acts like noise in a communication channel susceptible to all kinds of attacks acting like as jamming. In this paper, a novel watermarking...
With aggravating of market competition, the operation of supply chain coordination becomes more and more important. Therefore this paper firstly describes the capability and profit of supply chain members and the operation of supply chain coordination using multiple-objective programming and proposes a multi-product, multi-stage supply chain coordination model based on VMI ,which comprises one manufacturer...
In this paper, we propose an optimized clustering technique based on spatial-correlation in wireless sensor networks (WSN). It combines the advantages of clustering technique with spatial-correlation. It can avoid the impact of unexpected data on the results and get approximate results in a tolerant error by using similarity degree to construct clusters. Moreover, for only cluster-heads transmit data...
As there are more and more online stores and shopping sites available on the Web, integration of product and shopping information provided by different sources has become more and more important, and attract attention of recent research in information integration. One of the fundamental problems is to integrate specifications for products of the same type from difference vendors so that they are described...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.