The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative innovation is a tendency for research institutions in the knowledge-and technology-intensive (KTI) economic activities. With the growth of Government R&D investment, it is extremely important to explore the big data on research innovation. In this paper, we give the classification and characteristics of the big data in the field of research innovation, and then talk about data mining...
This paper studied on aspects extraction from product reviews by unsupervised topic model, which is an important subtask of opinion mining. The topic distribution of topic model, such as LDA, leans to the high-frequency words since the words in the document comply with the characteristics of power law distribution, which leads to that most of the words that can represent topics are overwhelmed by...
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However,...
In the past several years, most data mining researchers focus on data mining from single data source. Nowadays, data mining from multiple data sources is a new problem in Web environment and is also an efficient technique for solving knowledge discovery in distributed databases. A new method for mining multi-data sources is presented in this paper. By sharing knowledge patterns discovered in other...
Map-reduce framework has received a significant attention and is being used for programming both large-scale clusters and multi-core systems. While the high productivity aspect of map-reduce has been well accepted, it is not clear if the API results in efficient implementations for different subclasses of data-intensive applications. In this paper, we present a system MATE (Map-reduce with an Alternate...
The general crawler provides a great many help to people for finding information in Web. However, it has some drawbacks in terms of precision and efficiency because of it's generality and no specialty. Blog, as an emerging phenomenon of the Internet, has been concerned by more and more people. We propose a new algorithm of blog-oriented web crawler through considering "Blog" as a special...
In this paper, a computational program was developed based on pixel-covering method, which was used to calculate the fractal dimension of leaves from 102 plant species acquired from Xuzhou, Jiangsu province for the sake of plant classification and identification. Results show that both the contour fractal dimension and the contour & nervure fractal dimension can distinguish leaves between different...
It forms many intellectual property protection (IPP) modes in the development of cluster, because laws cannot protect IP effectively. Based on governance theory, this article use authority and the relationship type of network as two dimensions to divided governance modes, analyze the corresponding IPP modes in cluster, protection mechanisms, and compare different process of these modes.
CPU scheduler is a very important subsystem which affects system throughput, interactivity and fairness. The development of Linux kernel is relatively fast-paced. By now, many CPU schedulers have been designed by researchers, hobbyists and kernel hackers. It is necessary to accurately compare and analyze different characteristics among these schedulers, so as to understand and design better CPU schedulers...
Map-reduce has been a topic of much interest in the last 2-3 years. While it is well accepted that the map-reduce APIs enable significantly easier programming, the performance aspects of the use of map-reduce are less well understood. This paper focuses on comparing the map-reduce paradigm with a system that was developed earlier at Ohio State, FREERIDE (FRamework for Rapid Implementation of Datamining...
By means of semi-pre-open L-sets and their inequality, a new form of SP-closedness is introduced in L-topological spaces, where L is a complete De Morgan algebra. This new form does not depend on the structure of basis lattice L and L does not require any distributivity.
Image thresholding is an important technique for image processing and pattern recognition. In this paper, a new multilevel image thresholding algorithm based on the technology of the honey bee mating optimization (HBMO) is proposed. Three different methods such as the particle swarm optimization (PSO), the hybrid cooperative-comprehensive learning based PSO algorithm (HCOCLPSO) and the fast Otsupsilas...
The problem of robust energy-to-peak filtering based on sampled measurement for uncertain systems is studied. Based on piecewise Lyapunov stability criterion, the sample interval dependent conditions for the existence of such filters are established, which are less conservative. The admissible filters can be obtained from the solution of convex optimization problems in terms of linear matrix inequalities,...
Web service policies capture the capabilities and requirements of Web services from both functional and nonfunctional perspectives. Policies of a Web service govern and ensure the runtime consistency of the service, i.e., people or services interacting with this service are only allowed to perform legitimate actions. When composing Web services, policies of the participated Web services have to be...
Automatic service composition has been a hot topic in both academia and industry. It begins with syntactic composition, and then evolves semantic description. QoS of the composition comes into researcherspsila mind, which aims at meeting the need of the overall qualities like service fee, response time, throughput, etc. In this paper, a novel QoS-aware approach is presented. It adopts a forward filtering...
The problem of word mismatch is fundamental to information retrieval. The primary goal of this paper is effectively solve the above-mentioned problem by presenting a novel approach to query expansion to LSA and factor analysis, that has a solid statistical foundation, called PLSA, since it is based on the likelihood principle and defines a proper generative model of the data.The experiment result...
To improve the traditional direct torque control, bring in the stator field-oriented method, and introduce how to realize the quick response under the constant stator flux amplitude. Then directly calculate the accurate voltage vector values according to the angle that the flux goes across during a cycle and the difference between the flux's actual and desired values. In the last the space vector...
This paper proposes a novel approach based on artificial immune network for dealing with the task of Pinyin-to-character (PTC) conversion. The researches in recent years have nearly indicated that the sparse data problem and the independent identical distribution (iid.) assumption are two main difficulties of improving the PTC performance, and these two problems widely exist in the supervised learning...
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated side-information, such as time, location, authorship, and so on. Earlier research have used side-information as pre-filter before visual analysis is performed, and we design a machine learning algorithm to model the join statistics of the content and the side information. Our...
Secret key reconciliation is an important step in the process of quantum key distribution. In the protocols used for reconciliation, Winnow has been proved a fast and efficient one. In this paper, we analyze the efficiency of Winnow in terms of amount of leaked information in details. We give the optimal block size in Winnow theoretically and experimentally for different error rate.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.