The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the development of a human-like intelligent system, named AKEOS (Automatic Knowledge Extraction from Online Sources), is introduced. AKEOS can automatically harvest knowledge from online resources to build a Bayesian network inference engine. Starting from a single event, the AKEOS system performs unsupervised knowledge extraction to convert unstructured text into structured knowledge...
The identical physiological signal, which is measured by different sources, can not compare directly. In order to process the data further and analysis the impact of uncertainty, a method of electrophysiological data normalization is proposed. In this paper, Mahalanobis scaling method is applied to electrophysiological data normalization in order to reduce the differences between different instruments,...
Many people increasingly rely on mobile communication services to carry out daily activities. Due to the limitation of the PCS network architecture, a constantly relocating user may encounter significant delay when requesting data or value-added services. Previous research showed that this inefficiency can be effectively reduced by predicting the user's mobile patterns. However, most research merely...
In model-driven development, requirements are captured as a specification model, from which a conforming implementation is automatically generated. Model consistency, with respect to requirements, is a primary concern. If the various structural and integrity constraints are inconsistent, then either the model will admit no implementation, or the implementation produced will not behave according to...
Term rewriting is a branch of theoretical computer science which combines elements of logic, universal algebra, automated theorem proving and functional programming, it has lots of application in math and computer field. Termination is a very important property of term rewriting system, and the standard detected measure is constructing a reduction order, but a right order is difficult to construct...
Zadeh Absurdity will appear in applying D-S evidence theory to fuse highly conflicting evidence. To solve the problem, a novel information fusion model is presented. Firstly, through calculating evidence information capacity, the model pretreats evidence of containing overlapping focal element; Secondly, the model utilizes evidence distance function to gain every evidence creditable degree which is...
SCTP (Stream Control Transport Protocol) is a latest transport protocol, which is mainly used to transport PSTN coder over IP network. Transport performance of SCTP, TCP and UDP will be compared in generic network. These findings suggest that transport performance of SCTP is greatly inferior to one of TCP and UDP. Relationship between number of SCTP stream and transport performance of SCTP are discussed...
Find out the corresponding relationships between the pump flux and the cubage of waterlogging storage under the criteria for waterlogging control, using the EPA SWMM 5.0 through modeling the quantity of storm water runoff produced from urban areas. Computer simulation and automated design will become a scientific and reasonable method in calculating the storage of the city waterlogged field drainage.
Data quality is crucial for data integration and the consistency dimension is an important issue in data quality. Traditional methods of data consistency focus on the conflict or inconsistency that occurs in the same concept. However, it is sometimes insufficient to ensure the data consistency only using these methods. In this paper, we divide the conflicts among different data sources into the traditional...
Since KASUMI algorithm is forbidden to use commercially in China, a new f8 keystream generator is presented by using SMS4 as core algorithm in this paper. Then the new f8 is implemented in software to produce 100 groups 20000-bit keystreams with different cipher keys. Later, FIPS 140-2 is applied to these keystreams to test randomness. Based on the data obtained, six figures are drawn to specify the...
Glycine(Gly), cysteine(Cys), aspartic acid(Asp), leucine(Leu), and lysine(Lys) were chosen as typical amino acids. Their haloacetic acids(HAAs) formation potential was tested, and their impacts on HAAs formation were investigated on a filtrated water chlorination. Results shown that HAAs could be yielded in chlorination of amino acids, leucine and aspartic acid had the HAAs formation potential as...
The inactivation of Copepod with available oxidants such as chlorine, chlorine dioxide, ozone and potassium permanganate were investigated under various working conditions of different oxidant dosage, organic substance content and pH value. The results showed that chlorine dioxide might be most effective to inactivate Copepod than other oxidants and complete inactivation effect may be attained by...
In this paper, we construct a fuzzy ontology model and propose using a fuzzy matching rule base to promote a fuzzy ontology generation frame which supports rough concept descriptions on intrinsic semantic level. To consider the rule base and express the fuzziness, the formal analysis of concept vector is developed for the generation of fuzzy ontology that can deal with uncertain information. The proposed...
With the GIS (geographic information system) applications becoming more and more wide, and GIS data growing by magnitude, data mining of the field has become a focus and difficulty on research. In this paper, the continuous query and dynamic store method for GIS data mining is introduce, GIS data update and optimization is researched, and how to improve the efficiency of GIS data mining is discussed.
In the present paper, duffing system is used to produce chaotic time series which is then used to reconstruct phase space, RCD algorithm is used to computer the largest Lyapunov characteristic exponent (LCE1), detailed program of these tasks successfully debugged in in Matlab 7.1 is given, experiment method is used to choose parameter in the program, LCE1 and dichotomy is used to find system parameter...
In this work, we propose a framework to build a billiards tutoring system based on broadcasting nine-ball video analysis. A robust table detection module is developed by mapping the displayed video frames to a predefined billiard table model. In addition, we detect balls and trace their positions at every time instant. The real-world spatial relationships between the table and the balls are used to...
A low temperature C2W (Chip to wafer) bonding method is developed for integrating MEMS and electronics into a wafer level package. The diced known good MEMS chip is picked and bonded onto an ASIC wafer using an In based low temperature solder below 200 degC. The C2W bonded MEMS and ASIC wafer is sealed with a cap wafer. The sealed package is characterized for hermeticity and shear strength and found...
This paper proposes a mining-based method to achieve event detection for broadcasting tennis videos. Utilizing visual and aural information, we extract some high-level features to describe video segments. The audiovisual features are further transformed to symbolic streams and an efficient mining technique is applied to derive all frequent patterns that characterize tennis events. After mining, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.