Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
PrefixSpan is a pattern-growth method for mining sequential patterns, and it is employed in this research for identifying disease trajectory patterns based on frequent subsequence analysis. One of the most beneficial features of this algorithm is the maintainable characteristics of original data order, especially for effectively and efficiently searching sequential patterns within a huge database...
Accurate classification and recognition of pulmonary nodules is an important and key process of Computer-Aided Diagnosis (CAD) system in lung cancer diagnose. Although it has become an increasingly popular research topic, it remains a lot of scientific and technical challenges. Not only do we lack the accurate and effective algorithm of recognition and classification, but also we have difficulties...
From a perspective of feature extraction, we present a histogram-based sparsity descriptor (HSD) which is derived from the robust principal component analysis (RPCA) and histogram technique. Given a test image, sparse error images with respect to each class can be obtained by using RPCA decomposition. In order to extract the facial features in terms of intensity distribution, a sparseness measure...
Image blur is a common type of image distortion in our daily life. Though traditional image quality assessment (IQA) is increasingly drawing the attention of the research community, the uncertainness and uniqueness which exists in blur images bring unexpected difficulties. We present a simple yet effective automatic method on assessing global invariant blurred images. Different from the traditional...
Aiming at the problem that existing virtual assembly interfaces lack scenario analysis capabilities and can't effectively perceive user's intentions, the scene knowledge model and the user knowledge model are proposed in this paper. We establish scene knowledge base and user knowledge database according to the scene knowledge model and the user knowledge model respectively. To solve the ambiguity...
Data preprocessing plays an essential role in the process of safety equipment linkage system, directly influenced the quality and the results of the later analysis and decision-making. This paper describes the process of data preprocessing in detail, and according to the characteristics of the linkage system data, proposes an improved data cleaning method in order to improve the efficiency of data...
To help the biomedical scientist pre-confirm the disease-related genes, we considered these gene as a whole research set and analyzed the topological features of their interaction network. Two strategies had been proposed to construct the disease-related gene network from the OMIM database. Using these two constructed sets, we trained two support vector machine prediction models, the accuracy of which...
With the growing availability of full-text scientific articles, how text mining researchers utilize them has become an important issue. Although abstract and title provide accurate and summary information of article, lots of details are inevitably lost for its short space. The primary goal of the study is to utilize the advantages of abstract and full-text to ease the burden of reading. Finding essential...
The emergence and application of cloud computing can help users access to various computing resources and services more conveniently. However, it also brings forth many security challenges. This paper proposes the application oriented remote verification trust model, which is capable of adjusting the user's trust authorization verification contents according to the specific security requirements of...
De novo peptide sequencing is one of the most challenging topics in the field of computational proteomics. In this manuscript, a novel method based on virtual database searching is presented to improve the performance of de novo sequencing for the data from high resolution LTQ-FT mass spectrometry. Our method directly generates a virtual database from each spectrum and applies a search engine to match...
In spatial information sharing platform, an important use of the metadata is data searching. Traditional information sharing platform mostly search data just in the central node, which is inefficient. This paper presents a method which improves the efficiency of searching by mobilizing all the nodes of information sharing platform. That is, updating metadata of all the nodes through the synchronizing...
The model of Fuzzy-neural networks (FNN) in the complicated nonlinearity controlling field is difficult to ascertain and dependent on the manpower excessively, According to actual complicated nonlinear system environment and Fuzzy-neural network parameters, the system design of machine generating the adjustable fuzzy-neural networks parameter will be structured automatically based on Extenics theory...
In this paper, we present a face recognition method based on the combination of the LoG-Gabor wavelets (GW) and the phase congruency (PC) method. The phase congruency feature images were obtained by applying phase congruency model to these multi-view face images with log-Gabor wavelets filters over 5 scales and 8 orientations, and then the mean and standard deviation of the image output are computed...
This paper proposes a self-constructed Mercer kernel based subspace LDA approach for face recognition. Our self-constructed Mercer (SM) kernel function is constructed from a given block diagonal matrix. The entries of all its block diagonal sub-matrices are equal to 1. It shows that this kind of matrix is a symmetric, positive semi-definite matrix and thus can serve as a kernel matrix. Based on such...
Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.