Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Heart failure (HF), the terminal stage of all kinds of cardiovascular disease, has a high level of morbidity and mortality. But the heavy burden of curing and managing HF can be largely reduced by early detection of it. Motivated by this problem, we study methods to determine its risk factors based on extreme learning machine (ELM). Several state-of-the-art data mining algorithms are employed to estimate...
This paper describes a night vision pedestrian detection system for autonomous vehicles using an onboard forward-looking infrared (FLIR) camera. Much emphasis has been placed on real-time processing requirements and robustness of the system under different scenarios. At low level, the Haar-like features are used to discriminate infrared pedestrians. AdaBoost learning algorithm is employed to select...
Abstract-Prediction of protein-proteininteraction sites is very important to the function of a protein and drug design. In this paper, we adequately utilize the characters of ensemble learning, which can improve the accuracy of individual classifier and generalization ability of the system, and propose a new prediction method of protein-protein interaction sites: ensemble learning method based on...
The class imbalance problem usually occurs in real applications. The class imbalance is that the amount of one class may be much less than that of another in training set. Under-sampling is a very popular approach to deal with this problem. Under-sampling approach is very efficient, it only using a subset of the majority class. The drawback of under-sampling is that it throws away many potentially...
The identification of protein-protein interface residues is essential for drug design, understanding cell activity of organism. In this paper, a couple of covering algorithms are presented to predict protein-protein interaction sites by using several protein features, such as sequence profile, residue entropy and so on. These features are utilized to construct covering algorithms classifiers to identify...
Recent developments in Graphics Processing Units (GPUs) have enabled inexpensive high performance computing for general-purpose applications. Due to GPU's tremendous computing capability, it has emerged as the co-processor of CPU to achieve a high overall throughput. CUDA programming model provides the programmers adequate C language like APIs to better exploit the parallel power of the GPU. K-nearest...
Support vector machine for pattern classification is motivated by linear machines, but rely on preprocessing the data to represent in a high dimension with an appropriate nonlinear mapping, data from two categories can by separated by a hyperplane. To make certain the hyperplane, the key problem is selecting appropriate criterion and algorithm. To find out the appropriate solution vector in solution...
In this paper, a clustering method of attributes based on genetic algorithms is proposed for feature selection. It combines both the average accuracy of attribute substitution in clusters and the cluster balance as the fitness function. Experimental comparison with the k-means clustering approach and with all combinations of attributes also shows the effectiveness of the proposed approach. Besides,...
Along with the popularization of computers, especially the wide use of Internet, malicious code in recent years has presented a serious threat to our world. In this paper, through the analysis against the suspicious behaviors of vicious program by function calls, we present an approach of malware detection which is based on analysis and distilling of representative characteristic and systemic description...
Computer viruses have become the main threat of the safety and security of industry. Unfortunately, no mature products of anti-virus can protect computers effectively. This paper presents an approach of virus detection which is based on analysis and distilling of representative behavior characteristic and systemic description of the suspicious behaviors indicated by the sequences of APIs which called...
In the sea surface salinity (SSS) application, the data collected by the buoys need to be uploaded as the satellite passes through. Fast sensor identification is a novel technique that can be employed to underpin fair and efficient media access in the SSS application. It deviates from the existing conventional media access control schemes including the random access algorithms and out-of-band signaling...
We propose new R-tree construction techniques (CSR-tree) for spatial databases. The main ideal of this algorithm is to make the spatial objects that near to each other in spatial space in nearest leaf nodes, and to reduce the overlap among the spatial objects' rectangles. Given a collection of multi-dimensional spatial objects with rectangles, we cluster them to k groups by distance relativity, sort...
Classification of high-dimensional data generally requires enormous processing time. In this paper, we present a fast two-stage method of support vector machines, which includes a feature reduction algorithm and a fast multiclass method. First, principal component analysis is applied to the data for feature reduction and decorrelation, and then a feature selection method is used to further reduce...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.