The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Innovative mobile applications bring radical changes to people's life around the globe. With its unique characteristics of anywhere, anytime accessibility, thousands of mobile apps are developed, distributed, and executed over the Internet. To understand the selection criteria for different end users when facing a mobile application, this paper quests for an evaluation framework for mobile apps based...
In this paper the key indicators of sports tourism competitiveness were selected through the factor analysis method, by using the factor analysis method in Spss22.0 software, all kinds of sports tourism data in each city and county of Hainan were analyzed according to the factor analysis method and the sports tourism competitiveness of each city and county were also evaluated in comprehensive scores...
Person names and location names are essential building blocks for identifying events and social networks in historical documents that were written in literary Chinese. We take the lead to explore the research on algorithmically recognizing named entities in literary Chinese for historical studies with language-model based and conditional-random-field based methods, and extend our work to mining the...
Information security contains many concepts and knowledge entities. As the development of information technology, the complexity of increasing information security knowledge need an overview representation and organization for security analysis and risk evaluation. Ontology as a formal and shareable semantic model, which is often used to define domain knowledge schema, can also be applied for information...
In this paper we introduce a novel probabilistic topic model named rLDA-SNGRLD for motions or activities mining in complex scene. Based on the improvement of rLDA model, we developed SNGRLD algorithm which can inference in real-time with massive video stream data set and mine the video latent motion topics and motion regions online. Experiments prove that the application of this model for detecting...
Discovering causal relationships in large databases of observational data is challenging. The pioneering work in this area was rooted in the theory of Bayesian network (BN) learning, which however, is a NP-complete problem. Hence several constraint-based algorithms have been developed to efficiently discover causations in large databases. These methods usually use the idea of BN learning, directly...
Sina Weibo is the most popular and fast growing microblogging social network in China. However, more and more spam messages are also emerging on Sina Weibo. How to detect these spam is essential for the social network security. While most previous studies attempt to detect the microblogging spam by identifying spammers, in this paper, we want to exam whether we can detect the spam by each single Weibo...
Text localization is important for image-based text analysis and has been intensively studied in the last decade. Even though several metrics have been proposed, developing a general performance evaluation metric according to the nature of text localization task is still an open problem. This paper presents an empirical study on several representative performance evaluation metrics by formulating...
The technological background of smart planet generating is discussed in informationized surveying and mapping stage. The concept of smart planet and differences between smart planet and Digital Earth is generalizes. Architecture and a solution of smart planet based on wireless networks are constructed, and figures of physical frame and logic frame of Smart Planet are presented. Technological component...
Latent semantic indexing (LSI) is an effective technique for feature extraction in text mining, and supervised LSI (SLSI) algorithms have been proposed to exploit the class labels of training data. In this paper, we propose an iterative SLSI framework based on class selection. We show that a previous iterative SLSI algorithm is an instance of the framework. We also propose a method under our framework,...
Art and design department has its own personality and characteristics, and it's different from other professional disciplines, both in assessing students, the characteristics of students, or the mode of teaching, teaching content of combination and curriculum, and so on. The key of training art and design professionals is how to build a mode of training to respect, follow the development of the arts...
In this paper, a novel discriminant analysis approach using Angular Fourier transform is proposed for face recognition. As a generalization of Fourier transform, the Angular Fourier transform is an important frequency-domain analysis technique. The proposed approach combines it with discriminant analysis method. First, this approach selects appropriate value of angle parameter for discrete Angular...
At present, the research of biometric recognition is gave more and more attention in the world. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc. the iris recognition technology has recently become popular in identity recognition. In...
Given uncertain status reports or notes come from multi-sensor, identity fusion further makes them integrate information and jointly determine the observed entities. This paper discusses an improved data fusion approach to multi-biometric feature, including face, fingerprint and iris image. The approach is called improved multiple biometric data fusion algorithm, based on the eigen-face and the Gabor...
As the capacity of flash memory increases and price drops, flash memory will compete more successfully with disk drives. It is thus not inconceivable to consider running a full database system on the flash-only computing platforms or running an embedded database system on the lightweight computing devices. In this paper, the characteristics of flash memory and the key points of designing a flash-based...
Security requirements analysis is gaining growing attention as new vulnerabilities and threats are emerging on daily basis, the systematic evaluation of security requirements is of utmost importance among the various decisions to be made related to security. This short contribution proposes using a 3-dimensional vector for quantitative evaluation of security requirements, which takes into account...
This paper proposes a novel hybrid method to robustly and accurately localize texts in natural scene images. A text region detector is designed to generate a text confidence map, based on which text components can be segmented by local binarization approach. A conditional random field (CRF) model, considering the unary component property as well as binary neighboring component relationship, is then...
This paper describes a publicly available database, CASIA-OLHWDB1, for research on online handwritten Chinese character recognition. This database is the first of our series of online/offline handwritten characters and texts, collected using Anoto pen on paper. It contains unconstrained handwritten characters of 4,037 categories (3,866 Chinese characters and 171 symbols) produced by 420 persons, and...
This paper describes an online handwritten Japanese character string recognition system based on conditional random fields, which integrates the information of character recognition, linguistic context and geometric context in a principled framework, and can effectively overcome the variable length of candidate segmentation. For geometric context, we employ both unary and binary feature functions,...
With the limitations of funds and strength, most of small and medium enterprises (SMEs) often choose the model of logistics outsourcing to reduce costs, and improve logistics efficiency. However, while the logistics cost of the production or commercial enterprises keeps a higher level, the third-party logistics enterprises take a fewer profits or even losses. This paper analyses the contradictory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.