The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of computer and network technology, micro-blog system provides to exchange information and proceed social life. It provides very favorable ways. Especially, how to quickly obtain information and release information, sharing of information in today's society become a research direction for a big data. In this paper, we based on Struts2, JSP, MySql, Ajax and JQuery related...
Automatic photo cropping is an important tool for improving visual quality of digital photos without resorting to tedious manual selection. Traditionally, photo cropping is accomplished by determining the best proposal window through visual quality assessment or saliency detection. In essence, the performance of an image cropper highly depends on the ability to correctly rank a number of visually...
R is a popular programming language which is widely adopted by data scientists. However, typical R can only be executed in a single machine environment. Although R can be linked to Hadoop such as RHadoop, R users need to develop their R scripts based on the MapReduce framework. This de-mands highly skill of R programmers to parallelize their R pro-grams in terms of Map and Reduce jobs, killing the...
In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is...
We tackle the problem of answering maximum probabilistic top-k tuple set queries. We use a sliding-window model on uncertain data streams and present an efficient algorithm for processing sliding-window queries on uncertain streams. In each sliding window, the algorithm selects the k tuples with the highest probabilities from sets of different numbers of the tuples with the highest scores. Then, the...
Supported by maturing information and communication technology (ICT) technologies, the medical care industry entered its digitization age. However, medical information is highly confidential and involves privacy; even legitimate access can cause privacy infringements. Under the current medical administration system, no established application systems conform to the IRB (Institutional review board)...
Face recognition plays a important role in computer vision. Recent researches show that high dimensional face images lie on or close to a low dimensional manifold. LPP is a widely used manifold reduced dimensionality technique. But it suffers two problem: (1) Small Sample Size problem; (2)the performance is sensitive to the neighborhood size k. In order to address the problems, this paper proposed...
We study the question of hand posture recognition by developing a new class of Bag-of-Features (BoF), namely Hierarchical BoF. The Hierarchical BoF captures spatial information by dividing whole hand area into several sub-regions and projecting local features onto horizontal and vertical directions. A similarity measurement based on Histogram Intersection Kernel (HIK) is proposed to classify hand...
Chen, Tsai, and Jan (Chen et al. for short) recently proposed a Radio Frequency Identification (RFID) access control scheme, which includes an authentication mechanism and an access right authorization mechanism designed for a low-cost RFID system. Chen et al. does not only show security weaknesses of Weis's and Chien's access control schemes, but also claim their proposed scheme can resist the man-in-the-middle...
Recently, Chen et al. proposed an anonymous authentication scheme for mobile pay-TV, they claim that their scheme can defend against reply attacks, off-line password guessing attacks, impersonation attack, forgery attack, man-in-the-middle attack, and insider attack. In this paper, we show that Chen et al.'s scheme is still vulnerable to off-line password guessing attacks and fails provide mutual...
Most of the existing algorithms for mining frequent patterns could produce lots of projected databases and short patterns which could increase the time and memory cost of mining. In order to overcome such shortcoming, a fast and efficient algorithm named FBPM for mining frequent patterns in biological sequence is proposed. We first present the concept of primary pattern, and then use prefix tree for...
A new photo retrieval system for mobile devices is proposed in this paper. The system can be used to search for photos with similar spatial layout effectively and efficiently, and it adopts a new algorithm that extracts features of image regions based on hardware K-Means clustering. Since K-Means is computationally intensive for real-time applications in embedded systems, it is necessary to accelerate...
The extensive application of tree model has made tree mining become a hot field in data mining research. As an important branch of tree mining, tree cluster plays a fundamental analysis role in many areas. In this paper, a tree cluster algorithm was proposed based on least closed tree, which effectively solved problems in large amount of data in practical application. The basic method is bringing...
Radio frequency identification (RFID) technology is fast becoming an important tool for tracking commodities in supply chain management applications. The movement of commodities through the supply chain forms a gigantic workflow which can be mined for the discovery of moving trends that in turn will be valuable in understanding and optimizing business processes. There are some methods dealing with...
RFID technology has been applied in more and more fields, such as supply chain management, product tracking and so on. Now many research focus on how to manage and analyze RFID data set. Since location information, which contains multiple conceptual levels, is an important part of RFID data set, mining multi-level location sequences assists the decision-making. Unfortunately, little attention has...
China is one of the countries in the world that suffer serious natural disasters. Frequent and serious biological disasters cause great damage to crop production. The plant disease data of multiform could be analyzed and then a forecasting report was made.This article according to characteristic of the plant disease, introduced forecasts system's design and key technologies realization based on data...
Mining unordered trees are very useful in domains like XML date, biological information, Web structure, etc. In this paper, we introduce an efficient algorithm UTMiner (unordered trees miner). As the trees are unordered, in order to avoid mining the same subtrees, an efficient unordered trees standardization is first introduced to transform the unordered trees into the standard subtrees. Then UTMiner...
Traditional algorithms in mining sequence patterns only discover the frequent sequences satisfying the minimum support threshold minsup; however, these methods don't consider the importance of actual sequences. In order to mine the important sequence patterns satisfying users' many demands, this paper presents a new algorithm called SASeqP for mining self-adaptive sequence patterns based on sequence...
A practical personalized learning system based on Solomon learning style is presented. The system can automatically select the learning contents and methods suitable for the learners of different learning styles. The system would not only be of interest to the learners but also to faculty teaching who want to extend their work to the production and application of educational deliveries for nonuniversity...
Radio frequency identification (RFID) technology is fast becoming an important tool for tracking commodities in supply chain management applications. The movement of commodities through the supply chain forms a gigantic workflow that can be mined for the discovery of trends that in turn can be valuable in understanding and optimizing business processes. In this paper, we propose a method called divide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.