The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper uses Data Envelopment Analysis (DEA) to empirically analysis the efficiency of Beijing-Tianjin-Hebei traffic integration and the results are as follows. Firstly, the railway network is running well while the difficulties to alleviate the contradiction between supply and demand of the highway transport has existed for a long time, and the homogenization of competition in the port construction...
The performance of model-based control system depends a lot on the model fidelity. The mismatch between the model and the true plant plays an important role in poor control quality of the closed-loop control system. In this paper, a new statistical online model quality monitoring method for closed-loop systems is presented, which monitors model quality only requiring the real-time routine operation...
The development of the 6th channel of China Central Television (cctv-6, movie channel) brings a new way to view a movie and a better experience to user. Compared to the theaters, cctv-6 has the advantages of viewing conveniently and it spends little. But from in terms of visual impact and sound, watching movies on TV is not as good as go to the cinema, and the time also to have certain hysteresis...
Nowadays there are more than 10 billion sensors in the Internet of Things. These sensors will produce a mass of historical data as time goes on. And these data are useful in data mining and may create great value for human. However, historical sensor data are hard to archive because they have the characteristics of mass, complexity, isomerism and dynamic nature. Therefore, how to archive historical...
Identifying reliable information from the information ocean is a natural talent of human being, which can be hardly formalized by machines. In this paper, we show how to measure the uncertainty of each sample in terms of their similarity. For applications under complex uncertainty, it is desirable that we provide a systematic way for users to identify what are reliable information. In our approach,...
Appropriate heath resource allocation is the primary condition for protecting all society members to obtain effective and equity health service, and meanwhile, it is the main approach to reduce the health discrepancies among residents in Yunnan Province. This paper collects the medical resource data of 16 cities and prefectures in Yunnan from 2009–2013. This paper measures the discrepancies of medical...
In the literature, Contextual Transaction Trust computation (termed as CTT computation) is considered an effective approach to evaluate the trustworthiness of a seller. Specifically, it computes a seller's reputation profile to indicate his/her dynamic trustworthiness in different product categories, price ranges, time periods, and any necessary combination of them. Then, in order to promptly answer...
We reported a fast and controllable two step deposition method for fabricating perovskite solar cells. Homogeneous perovskite CH3NH3PbI3 thin film layers were deposited by thermal evaporation of PbI2 and ultrasonic spray coating of CH3NH3I. The use of ultrasonic spray coating technique ensured a better control of the perovskite morphology, and a complete reaction for forming the CH3NH3PbI3 layer in...
Graph Pattern Matching (GPM) plays a significant role in social network analysis, which has been widely used in, for example, experts finding, social community mining and social position detection. Given a pattern graph GQ and a data graph GD, a GPM algorithm finds those subgraphs, GM, that match GQ in GD. However, the existing GPM methods do not consider the multiple constraints on edges in GQ, which...
With the development of value-added services in cable digital TV, user behavior analysis has important practical significance in improving stickiness and implementation of personalized marketing. Based on real viewing data collected by software in set-top box, this paper adopts clustering method to analyze viewing habit in a particular region of Shanxi Province. The results show that the prime time...
The sizes of hidden data sources are of great interests to public, researchers and even business competitors. Estimating the size of hidden data sources has been a challenging problem. Most existing methods are derived from the classic capture-recapture methods. Another approach is based on a large query pool. This method is not accurate due to the large variance of the document frequencies of queries...
This work examines a straightforward solution to a problem of space surveillance resource allocation by exploring the application of an optimal algorithm to a subset of the general scheduling problem. Due to the resource constraints of the surveillance resource, there could be some serious conflicts among observation requirements. To solve the problem of conflicts in the work of sensor resources allocation,...
Terrestrial LiDAR Scanning(TLS) technology can quickly acquire three-dimensional information of forest canopy with high precision. As a new technique of data collection, it has been gradually applied to characterize structural attributes such as plant area densities. This paper presented a ray-tracing method to simulate laser intersection with a single tree and retrieves the plant area index based...
In e-commerce and e-service environments, transaction context is important when evaluating the trust level of a seller or a service provider in a forthcoming transaction. However, most existing trust evaluation models compute a single value to reflect the general trust level of a seller without taking any transaction context into account. In the literature, a trust vector approach has been proposed...
Service fairness of traffic with different granularities in elastic optical networks is addressed and correspondingly a fairness-aware spectrum allocation scheme is proposed. Simulation results imply that it achieves service fairness without significant blocking performance deterioration.
With the development of the society, distance education and training gradually shows some characteristics similar to the service industry, such as invisible, cannot be stored, heterogeneous, serving and consuming in the same time and so on. To gain a bigger market share in competition and more reputation and brand value in development, distance education and training institutions must pay great attention...
Cancer risk of exposure of salesperson in an ornament market to volatile organic compounds (VOCs) was evaluated. VOCs were sampled by SUMMA canister and analyzed by thermal desorption-Gas Chromatograph-Mass Spectrometer system. 8-hours average concentrations of dichloromethane and toluene were the highest (110.94µg/m3 and 58.83µg/m3), which were well below the indoor air quality standard (GB/T 18883-2002)...
Correlation coefficients are dominant indexes of measurement instrument quality. Among the varieties of correlation coefficients Pearson product moment correlation coefficient is the most popular. That is why intraclass correlation attracts relatively less relation. But in certain conditions, Pearson product moment correlation coefficient is not effective and intraclass correlation takes advantage...
In order to evaluate the MBO short-term performance and long-term performance, by virtue of 36 listed company samples which were buy-outed by management among 1997-2004, an empirical study was conducted based on factor analysis and matching T test. Empirical results showed that there was obvious improvement on the enterprise performance from overall view. The common factors such as risk control factor,...
In a multiple-input multiple-output (MIMO) precoding system based on finite-rate feedback, the receiver sends a precoding matrix to the transmitter via a feedback channel. The overall system performance is degraded due to feedback error. In this paper, we propose a robust feedback scheme that employs the index permutation technique to provide the system with redundancy-free protection against the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.