The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microblog as one of the most popular social network sites, has become an important platform for people to share, exchange, obtain and spread information in their life. This paper infers the Microblog user's age range from the perspective of feature selection. We analyze the user microblog text from six kinds of features. This paper has two distinctive characteristics: (i) a new feature selection method...
Essays in different text genres have different ideas and writing method. Prediction the text genres firstly will help get a better accuracy when predicting the success of literary or finding the beautiful words and sentences in the essay. And it will help set a different standard for different text genres when scoring the writing by computer. Words and structure can be effective in discriminating...
Mechanical and electrical equipments are widely used in industry. Existing electro-hydraulic mixing equipments mainly use expert systems for fault diagnasis. However, in order to increase the accuracy of diagnasis, the expert systems have to acquire more knowledge. And diagnosis system will bring great uncertainty due to limited knowledge. Furthermore, existing fault diagnosis system has the disadvantages...
With the increasing number of network comments, mining product reviews is an emerging area of research which fundamental work is focused on feature extraction. Previous studies mainly focus on explicit features extraction while often ignore implicit features which haven't been stated clearly but containing necessary information for analyzing comments. Actually in our study, we find a lot of implicit...
With the advent of the big data era, data mining technology has gradually become mature, association rules analysis is also applied in many fields. Web log mining is an important way to do some personalized services and achieve Web personalize. Apriori algorithm is a classical algorithm of association rules, but it has a lot of shortcomings. In recent years, the improvement about Apriori algorithm...
With the development of social economy and the improvement of cultural and educational level, the enrollment of all the major colleges and universities in our country has been expanding constantly. The arrangement of courses of the school has become more and more complicated. It has become a common phenomenon that students of colleges and universities select courses by online course selection system...
Search engine query logs contain quantities of Named Entities. As the basic work of information extraction, traditional Named-entity extraction methods only can extract specific categories of entities. It is very difficult for them to be applied to the query log Named-entity recognition directly for their limitation. In this paper, a novel approach is proposed to extract Named Entities from user query...
The goal of document representation is to capture certain feature of the document. Many existing document representation methods are based on bag-of-words and ignore semantic relevance between words in the document. There we proposed a semantic smoothed topic model to represent document. It takes semantic similarity into consideration for topic of document. We conducted two experiments utilizing this...
In this paper, we use GSM mobile network that is the most reliable and matured in this day to achieve community alarm system. And it will directly convey the alarm news in short message or telephone at manager's mobile phone. The design includes hardware and software parts. Its hardware uses MCU AT89C52 series as the core, and controls three alarm parts, they are infrared monitoring alarm system,...
In this paper, the basic principle and design process to build a community network are determined by the demand for social network and the development pace of network technology at present. And we design the appropriate network structure by combining the actual situation of the community. This paper designs the overall topology, divides the network internal IP address and divides the virtual local...
With the rapid growth of images information, how to classify the images has been a main problem, and most of researchers are concerning on the neural networks to realize the images classification. However, the neural networks can not escape from its own limitations including the local optimum or the dependence on the input sample data. In this paper, another new algorithm named support vector machine,...
Nowadays, more and more people are getting engaged in the construction of the Internet, consciously or not, by posting their individual comments on it. In today's big data era, opinion mining on customer's opinions has become one of the most effective ways to roundly use the great amount of information. Opinion mining, a brand new section of unstructured information mining, is mainly related to emotional...
With the economy growing rapidly, as one of the means of transportation, the aircraft has played a significant role. But, there is a feature of the aircraft that if it happens to be faced with an air crush, the passengers from the airplane will merely be alive. So building a generic mathematical model to seek for the crashed plane is urgent. In this paper, the aircraft's rescuing mission is made up...
With the continuous development of the Internet, the information explosions become obvious phenomenon in the field of books. So it becomes a serious problem to help users retrieve the books what they want to without taking too much time. This paper studies the realization of a personalized book retrieval system based on user. First, crawling and download book information with the use of web crawlers,...
With the rapid development and popularity of the Internet technology, more and more people like to share their feelings and experiences on the Internet. The increasing rich in network resources, such as personal blogs, online reviews, etc., provide us with new opportunities and challenges. Opinion mining is talking about how to use information technology to mining, and understand the views of others...
In the field of the Semantic Web, ontology plays a crucial role. In this paper, for the user's choice and retrieval needs, ontology language grammar-based content, research and construction are hot tourist areas in Africa ontology knowledge of the domain ontology, the knowledge base can not only meet the user's needs, but also scalability. In this paper, the process of constructing domain ontology,...
With the increasing amount of detected genes and gene products, more and more unknown functions of genes and gene products need to be predicted. A lot of methods are proposed to predict gene functions, but most of them neglect the existing annotation information. This article proposes a novel method to predict function similarity between genes and gene products based on existing annotation information...
Aiming at the problems in extant automatic question answering system, such as inadequate knowledge expression and weakness of indicating the inherent relations among knowledge, a solution with using Ontology to build curriculum domain knowledge base was put forward in this paper. In this paper, the course of "Natural Language Processing" was took as an example to construct an automatic question...
With the rapid growth of tagged images, researchers are now resorting to this high semantic textual information for image clustering, which has showed higher clustering performance compared with conventional methods using the low level visual features. However, how to bridge the gap between the semantic information and the visual information is still an open problem. In this paper, a novel topic model...
Fingerprint segmentation is the key step of fingerprint image preprocessing. Efficient fingerprint segmentation technology has significance in both saving preprocessing time and improving the image quality. In this paper, on the basis of the right direction of the fingerprint ridge, we use the gradient threshold method to segment image for the first time. While there are still limitations on the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.