The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an algorithm to automatically extract 3D feature points of a vertebrae model. These feature points aim at enhancing the safety of transpedicular drill guide (TDG) in posterior spinal fusion. The design parameters of the drill, including insertion position, angle, and depth, are generated to construct the drill template based on a spinal 3D structure database. An intelligent 3D...
Three-dimensional stacked memory stacking logic and memory dies are one of the most promising 3-D integration applications. This paper proposes two memory redundancy schemes to improve the yield of channelbased 3-D stacked DRAM by sharing spare memory across dies and satisfying channel constraints at the same time. The proposed schemes achieve much higher yield with very small area overhead than other...
Tallini and Bose defined a random walk function on which an efficient encoding/decoding algorithm for second-order spectral-null (2-OSN) codes was based. Later, Yang enhanced Tallini-Bose code by using quasi 2-OSN codes. Both 2-OSN codes encode the information word into a balanced word and then append extra bits to make the length of this balanced word equal to 0 (or 2) modulo 4. The main innovation...
Although many kinds of collision pre-warning algorithms and systems for vehicles were proposed in order to prevent accidents in past years, two problems have to be resolve in order to enhance the accuracy of collision detection. First, a vehicle does not always keep the same velocity when it is moving. Second, the curve road condition should be considered. In this paper, we proposed an Advanced Cooperative...
Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents a novel score-level fusion scheme called boosted score fusion. The proposed framework is a two-stage design where an existing fusion algorithm is adopted at the first stage. At the second stage, the weights obtained by the AdaBoost algorithm...
Aeronautical maintenance is an important work to assure the reliability and availability of the aircrafts. Firstly, the characters of aeronautical maintenance were analyzed. Then the bacteria foraging optimization algorithm programming flows were given out according to the maintenance task scheduling of aeronautical equipment. Finally, the mathematic model was established, the coding strategy was...
Recently, the concept of indirect associations, a new type of infrequent patterns that indirectly connect two rarely co-occurred items via a frequent item set called ¡§mediator¡¨, has been shown its power in capturing interesting information over web usage data. Most contemporary indirect association mining algorithms are developed for static dataset. Our previous work has proposed an algorithm, MIA-LM,...
This paper briefly introduces the network boundaries can be effectively protected using network defense in depth system and the shortcomings of its technical means. Then introduced the data mining technology applications in the firewall policy optimization, traffic identification, intrusion detection technology areas at different levels of defense in depth, and lists a variety of specific application...
The evaluation of garbage collection (GC) algorithms typically needs a complicated experimental phase, involving a considerable amount of engineering effort. This paper presents a new evaluation method to simplify this experimental phase. By the hypothesis that most of the GC algorithms are based on analyzing a set of object graphs, we propose an indirect evaluation approach that only focuses on the...
With regard to the high dimensional and small sample facial feature, this paper introduced the Kernel and Canonical Correlation Analysis (CCA) into the Locality Preserving Projections (LPP) algorithm and proposed a new face recognition algorithm based on the Kernel Base Locality Preserving Canonical Correlation Analysis (KLPCCA) with the derivation process. According to this algorithm, first use CCA...
The lack of collecting cyclic garbage is generally considered the major weakness of reference counting. Reference counted systems handle this problem by incorporating either a global tracing collector or a partial tracing collector that considers only the cycle candidates. The latter has become a preferred one as it has better scalability and locality. Most of the partial tracing collectors are based...
In this paper, the problem of constraint-based pattern discovery is investigated. By allowing more user-specified constraints other than traditional rule measurements, e.g., minimum support and confidence, research work on this topic endeavor to reflect real interest of analysts and relief them from the overabundance of rules. Surprisingly very little research has been conducted to deal with multiple...
In this paper, we attempt to handle the maintenance of sequential patterns. New transactions may come from both the new customers and old customers. A fast updated sequential pattern tree (called FUSP-tree) structure is proposed to make the tree update process become easy. An incremental FUSP-tree maintenance algorithm is also proposed for reducing the execution time in reconstructing the tree. The...
Recently, the topic of constraint based association mining has received increasing attention within the data mining research community. By allowing more user specified constraints other than traditional rule measurements, e.g., minimum support and confidence, research work on this topic endeavor to reflect real interest of analysts and relief them from the overabundance of rules, and ultimately, fulfill...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.