The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to provide decision and guidance for the future development of libraries, based on the Data Mining Decision Tree C4.5 Algorithm, taking the library of Changchun Institute of Technology as an example, by structuring decision tree and mining the factors which restrain users from using the library digital resource, the author gets some potential links among the factors affacting the using of...
Inference of latent variables from complicated data is one important problem in data mining. The high dimensionality and high complexity of real world data often make accurate inference difficult. We approach this challenge with a neural architecture we call Conjoined Twins, which is a two-layer feed forward network with a Self-Organizing Map (SOM) as its hidden layer. Its output layer can preferentially...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Recently, the video-based technologies play an important role in monitoring fields, including the detection, identification and tracking of moving object. This paper designs an effective pedestrian detection and tracking algorithm in the traffic environment. Firstly, extract the moving prospect from the background in the video images, using conventional frame difference algorithm. The moving targets...
The traffic safety monitoring technology becomes an active research field due to the development of the city's transport system. In this paper, we design a warning method in traffic video monitoring through analyzing vehicle states. This method is based on image analysis and processing technology, extracting the information of the characteristics of the movement of vehicles through detecting and tracking...
Fast identification of critical information in a changing environment is difficult yet it is key to dynamical decision support, in general. Finding critical information in large and complex data volumes is a challenge real systems, and systems of systems, pose increasingly. Moreover, many of these real systems are desired to operate highly autonomously, using extracted critical information and discovered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.