The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a traffic jam prediction method based on mining frequent patterns correlated to traffic jams. For traffic jam prediction at a given sensor, first, we apply a one-dimensional clustering scheme to identify automatically which sensors are and in what degree correlated to the given sensor in terms that certain volume values with a compact distribution co-occur frequently with the traffic jams...
Heuristic reduction algorithm has got an extensive application in decision table; based on rough sets theory and partition of set, the attribute reduction of information systems without decision attributes is discussed. And a heuristic rule and an algorithm are given out. Some example shows the algorithm is effective and is an instructive attempt.
Sequential pattern mining is an important research task in many domains, such as biological science. In this paper, we study the problem of mining frequent patterns from sequences with wildcards. The user can specify the gap constraints with flexibility. Given a subject sequence, a minimal support threshold and a gap constraint, we aim to find frequent patterns whose supports in the sequence are no...
This paper presents a new association rule mining algorithm called MFP. The MFP algorithm can convert a transaction database into an MFP_tree through scanning the database only once, and then do the mining of the tree. The MFP algorithm usually is more efficient than FP_growth. We used it for mining some formulas of synthetic perfume essence and obtained the success.
Outlier detection keeps an important and attractive task of the knowledge discovery in databases. In this paper, a novel approach named Multi-scale Local Kernel Regression is proposed. It transfers the unsupervised learning of outlier detection to the classic non-parameter regression learning. Through preprocessing the original data by the basic local density-based method, it adopts the local kernel...
In this paper, a set of biologically-inspired features are presented for robust object recognition. The proposed pyramidal feature set is obtained by extracting the geometric relationship of keypoints using a set of biologically inspired templates in different scales. Lifetime is proposed to describe the keypoints. This paper brings together new algorithms, representations, and insights which are...
Overcomplete blind source separation (BSS) has been a difficult problem for a long time. This paper proposed a novel overcomplete BSS algorithm based on second statistics. The first step is complete decorrelation processing by principal component analysis (PCA), then one strong correlation signal chosen as one input signal by the first canonical correlation analysis (CCA). At last, source signal estimation...
Mining frequent patterns with a gap requirement from sequences is an important step in many domains, such as biological sciences. Given a character sequence S of length L, a certain threshold and a gap constraint, we aim to discover frequent patterns whose supports in S are no less than the given threshold value. A frequent pattern P can have wildcards, and the numbers of the wildcards between elements...
Pattern matching with wildcards is a complex problem and this problem has wide potential application in text search, biological sequences and information security etc. We propose a new algorithm called Quicksearch, for pattern matching with wildcards and length constraints based on key character location and subspace partition. This new algorithm increases by 40%-60% searching efficiency in comparison...
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Considering the Scarani-Acin-Ribordy-Gisin protocol (SARG04) with a heralded single photon source (HSPS), we review the general model of HSPS QKD system with a threshold detector, and analyze the SARG04 non-decoy-state protocol, SARG04 infinite active decoy-state...
Ecotourism is a mode of sustainable tourism development that can bring about good economic benefit to the local place, which has been proved by many successful cases at home and abroad. Economic benefit acquired from domestic ecotourism development is mainly distributed among the local residents, the governments and the developers. The residents can obtain vested income from land acquisition compensation...
A modified semi-supervised learning algorithm based on Riemannian manifolds is proposed, which extends the applicable field to the case of multi-classes problem. Furthermore, the modified version largely increases the learning speed, while attains the classification performance as satisfying as the original algorithm.
Based on data mining technology, this article compared the cash dividends distribution desire of listed companies in China during 2003-2007 to examine how the non-tradable share reform affects the dividends distribution behavior of controlling shareholders. The empirical study result indicates that cash dividends distribution desire of the listed companies has a positive correlation with the share-holding...
The realization of the process bus communications based on IEC 61850 9-2 is introduced in this paper. With employing the bay-oriented principle of the IEC 61850 9-2, the merging unit model is built for the transformer differential protection. The proposed merging model not only supports the broadcast / multicast and unicast transmission services of the SV message, but also supports the access of the...
Efficiency is critical to data mining algorithm. Based on fully analyzing the PF_growth, an association rule mining algorithm, we in this paper give a new association rule mining algorithm called MFP. MFP algorithm converts a transaction database to an MFP_tree through scanning the transaction database only once, then prune the tree and at last mine the tree. Because the MFP algorithm scans a transaction...
Text classification is an important task of data mining. Existing algorithms, which based on vector space models, does not considered concept similarities among words, so the accuracy of traditional text classification cannot guarantee. To solve the problem, this paper proposes a new text classification algorithm in Chinese text processing based on concept similarity. The contributions of the paper...
This paper is concerned with the robust stability and robust stabilization for a class of uncertain systems with delayed state and control. Introducing an extra time-delay term in system and taking the relationship between the terms in the Leibniz-Newton formula into account obtain a new delay-dependent stability criterion. Based on this stability criterion, firstly a sufficient condition is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.