The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic deep Web query results extraction is a key step of deep Web query results processing. Extracting the query results correctly is the precondition and guarantee of realizing semantic annotation and data integration. In this paper, a simple method for extracting deep Web query results automatically based on tag trees is proposed according to the features of deep Web query results page. The...
This paper describes the port BI system combined with BPM, which enables port enterprises to perform an in depth data analysis to support decision making and to promote performance management. Based on illustrations of the BPM strategies of port enterprises, the BI system architecture is proposed, and some key points in the knowledge discovery process of the BI system are discussed, which are all...
Marketing channel as the downstream end of a supply chain plays a crucial role in generating cash flow and meeting the demands of customers. The extant body of literature postulates that antecedent-consequence links that customer perceived value and service quality foster customer loyalty, leading to long term profitability. Nowadays, given the proliferation of global hypermarket organizations and...
This paper considers a swarm model with a class of simple attraction and repulsion functions and delves into the question of ??soft control?? for swarms system in Euclidean space, which disturb the collective behavior of the group by adding a few controlled intelligent agents at the condition of keeping the local rules of the existing agents in the system. This paper gives a control law for controlled...
Ontology definition is the base of ontology engineering, however, ontology definition currently seldom provides the accurate mathematical characteristics, namely, most of the ontology definitions cannot be described in a formal way, and the existing ontology definitions aren't complete enough. In this paper, it reviews and sums up the ontology definitions and the formal descriptions of ontology. And,...
Suffix tree clustering is a fast, incremental, linear time clustering algorithm, but there are synonymous and label-contained relations among the result clusters. So just return these results to the users directly, would give them an added burden. In response to this problem, this paper presents a method that merging the semantic duplicate clusters and hierarchicalizing the label-contained clusters...
As one of the overwhelmingly predominant medias in the world, network ranks the fourth after TV, radio and newspaper. Network language emerges with the development of Internet to facilitate communications via Internet. The essay aims to explore the essence of network language symbol and its impact on the aesthetic culture in modern society from such four aspects as emergence, dissemination, background...
For integrating web databases, the very first challenge is to understand what a query interface says or what query capabilities a source supports. From the view of people, the interior structure of web pages is not concerned to for people. In the most cases, semantic block is identified via visual elements. Therefore, in this paper, a novel arithmetic of schema extraction based on visual features...
Query interface is used to formulate queries to receive needed data from web databases in deep web. In order to access domain-specific databases, the most important step is to construct an integration interface that allows uniform access to disparate relevant sources. Therefore, this paper proposes a novel method of integrating query interfaces based on ontology in deep web. Firstly, make full use...
In deep web, a significant amount of information can only be accessed through query interface of a back-end database, however, general search engine can not interact with the query interface, resulting in the myriad hidden and unvisible information can not be accessed. Therefore, this paper proposes a novel method of filling forms of deep web entries by importing ontology technique. Firstly, construct...
Firms need to transfer and acquire new knowledge as they seek to opportunities for mutual learning and contributes to organizational members' ability to innovate in and finally contributes to enhance performance. In attempting to understand the antecedents and consequences of organizational knowledge transfer (KT), scholars have increasingly focused on how social capital fosters KT because it is a...
Rough set theory is a relatively new mathematical tool to deal with imprecise, incomplete and inconsistent data. A method of multispectral image classification using rough set theory is proposed. First, to decrease computational time and complexity, band reduction of multispectral image using attribute reduct concept in rough set theory and information entropy is performed. Then, mixture model initial...
In this paper, the perfect index set and the complete index set of the chain-sum graphs of the first kind of K4-e are defined, the perfect index sets of B(n) (n = 1, 2, ... , 13) and a structural method of graphs are researched.
A new search strategy proposed in this paper, which is used in n-dimensional spectral feature space to find reasonable end-members based on maximum volume transform (MVT), is implemented to improve the performance of N-FINDR algorithm. The N-FINDR algorithm, as a successfully used end-member extraction tool, produces inconsistent result in many cases and consumes lots of computing time if it carries...
Dynamic spectrum access (DSA) provides a more flexible spectrum management method versus the current command and control method and promises much higher spectrum utilization efficiency. By this paradigm, secondary users can use vacant spectrum while guaranteeing non-interference to incumbent users. Therefore, spectrum awareness is a required function in DSA, and cooperative spectrum sensing is widely...
TEM horn antennas have been analysed before, however, few people consider the influence of the ground to the radiation of the antenna. In this paper we present the parallel FDTD method based on the message passing interface (MPI) to analyse the influence of the ground to TEM horn antenna for pulse radiation. The numerical result is in agreement with the analysis of the method of images. Then different...
Emerging location-based application and sensor monitoring management system collect user's locations with limited power, which cannot report very accurate position values. An important query is the Continuous Nearest-Neighbor Query (CNNQ), which returns the closest mobile object given a query point over inaccurate location data collected from positioning devices. This paper proposes the Probabilistic...
Emerging location-based application and sensor monitoring management system collect user's locations with limited power, which cannot report very accurate position values. An important query is the Continuous Nearest-Neighbor Query (CNNQ), which returns the closest mobile object given a query point over inaccurate location data collected from positioning devices. This paper proposes the Probabilistic...
A new secure fragile watermarking algorithm for secure communication is proposed in this paper, the idea of cryptography- and the idea of side information are introduced into the security domain of watermarking system. The main idea of the algorithm can be listed as follow. Firstly, the original image is segmented into blocks and the watermark is segmented into subsections. Secondly, the embedded...
A new fragile blind watermarking algorithm for content authentication is proposed in this paper. Firstly, the program (cover work) is divided into segments according to the three basic program control structures (sequence, branch and loop). Secondly, the frangibility of watermark is used to mark the variation of the code line, which achieved through using a hash function and generalized character...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.