The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Concerning the description of strengthening effect of project generation to the management consulting process, according to MCS(Management Consulting System) model proposed by Liang Gefu(2004). the paper will discuss it from five parts. 1. The directional role of project generation can intensify consulting goal. 2. A reasonable human-to-machine division of labor make sure the efficiency of exploiting...
In many real-world data mining tasks, the connotation of the target concept may change as time goes by. For example, the connotation of “learned knowledge” of a student today may be different from his/her “learned knowledge” tomorrow, since the “learned knowledge” of the student is expanding everyday. In order to learn a model capable of making accurate predictions, the evolution of the concept must...
It is well known that the key of Bayesian classifier learning is to balance the two important issues, that is, the exploration of attribute dependencies in high orders for ensuring a sufficient flexibility in approximating the ground-truth dependencies, and the exploration of low orders for ensuring a stable probability estimate from limited training samples. By allowing one-order attribute dependencies,...
In this paper, a color image watermarking algorithm based on fractal and neural networks in Discrete Cosine Transform (DCT) domain is proposed. Firstly, the algorithm utilizes the fractal image coding technique to obtain the characteristic data of a gray-level image watermark signal and encrypts it by a symmetric encryption algorithm before it was embedded. Secondly, by exploiting the abilities of...
Real-time image processing is a difficult work for traffic video monitoring. This paper proposed a method to detect and track vehicles on highway based on airship video and therefore calculate traffic parameters in real-time. A blocking road extraction was performed to determine the ROI, and automatically calculate the tilt of the road which contributes to vehicles detection. A lane marks registration...
This study examines the relationship between job satisfaction, positive affectivity, negative affectivity, distributive justice, and work group cohesion in China. All the survey instruments used in this study are well established multi-item scales that have been validated in English speaking populations. The statistical analysis shows that distributive justice, work group cohesion and positive affectivity...
Distributed localization algorithm continues to be an important and challenging topic in today's wireless sensor networks (WSNs). The accurate estimations of distances among nodes are premises for the accurate estimations of node positions. In this paper, we propose some schemes towards the DV-Hop algorithm to improve the distance estimations. These improvements are based on accurate analysis of hop...
Based on an analysis of related work about time exception in workflow, an algorithm for time exception handling of temporal workflow is presented in the paper. The algorithm is to meet the overall deadline of the case via an approach of cutting down the slack time of remaining activities, when there is a time exception. Meanwhile, details about the adjusting strategy for various kinds of routing constructions...
The fault signal of rotor rub is a typical nonlinear and non-stationary data. HHT is considered an effective method on that kind signal and the crucial step is EMD. However, one of the major drawbacks of the EMD method is mode mixing. Ensemble Empirical Mode Decomposition (EEMD) has been proposed recently. This method overcomes the mode mixing and represents a major improvement of the EMD method....
Detection of the fetal electrocardiogram (FECG) from the maternal cutaneous electrode recordings is an important but hard task. To extract the FECG, two important blind source extraction algorithms have been proposed by Barros and Zhi-lin Zhang which using the periodicity and kurtosis, respectively. Barros' algorithm is sensitive for the estimation error of the period of the FECG and Zhi-lin Zhang's...
The circuit design and structure of siggle-phase bridge voltage source inverter were presented in detail. The main experimental waveforms were given. The reasons that static error is universally bigger in siggle-phase alternating control systems and the output voltage fluctuation resulted from the load changes were analyzed. The regulator was designed with internal model principe to reduce the static...
Choosing a cotton variety involves making comparisons over many trials and across an increasingly large number of available varieties. To aid in this process, a computerized tool has been developed at the Texas Tech University. This tool, called COTWIZ, based on the cotton variety selection model, allows multiple comparisons of varieties across a number of trial locations. COTWIZ based on the cotton...
The efficient achievements management is much significance for the development of basic scientific research, and so all of the knowledge resources of achievements should be managed. In order to integrate the different types of knowledge resources of basic research achievements, this paper proposes a supernetwork model of knowledge resources. First, the person network, the material network and the...
At present, isolated and single network security system can no longer meet the objective needs. As a new type of network, trusted network can make up many of the traditional network security flaws. Based on the analysis of the background and motivation of trusted network, the article discussed the concept and basic properties. It analyzed the architecture of trusted network and the functions of its...
Blind source extraction (BSE) algorithm based on linear prediction model can be used to separate speech signals. The best advantage of this algorithm is that it is very simple and easy to compute. This algorithm is based on the fact that speech signals can be modeled by linear prediction process. But homotopy non-linear model is better than linear prediction model for speech signals. A new BSE algorithm...
This paper deals with the shape control of a cantilever thin plate structure by using laminated piezoelectric actuators (LPA). The shape control equation of the cantilever thin plate partially covered with LPA is derived based on the constitutive relations of the elastic material and piezoelectric material and the thin plate deformation theory. The actuating forces produced by LPA are formulated as...
With the rapid evolution of Internet applications, people all over the world are sharing pictures, videos and audios online, and thus, content-based analysis is often demanded. Test efficiency is crucial to the success of online information processing. One obstacle to high-speed testing is the time cost of feature extraction for test objects, particularly for objects with complex representation such...
The preparation process of Ozone based on dielectric barrier discharge is the most effective method, and highly efficient power is the key to the preparation process. As the merits of piezoelectric transformer are high-frequency, high step-up and no electromagnetic pollution relative to the electromagnetic transformer, it is particularly suited to the ozone generator. A laminated circuit piezoelectric...
Graphs have become increasingly important in modeling the complicated structures. Mining frequent subgraph patterns is an important research topic in graph mining that helps to analyze the structured database. It has been applied in many applications, such as chemistry, biology, computer networks, and world-wide web. In this paper, we propose a new algorithm called FSP (frequent substructure pattern...
This paper is motivated to improve the performance of individual ensembles using a hybrid mechanism in the regression setting. Based on an error-ambiguity decomposition, we formally analyze the optimal linear combination of two base ensembles, which is then extended to multiple individual ensembles via pairwise combinations. The Cocktail ensemble approach is proposed based on this analysis. Experiments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.