The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sentiment word identification (SWI) is a basic task of sentiment analysis. Traditional techniques become unqualified because they need seed sentiment words which may lead to low robustness. This paper presents an optimization-based framework by incorporating sentiment contextual information instead of seed words. Specifically, we exploit two sentiment phenomena: (1) sentiment matching: polarities...
The advancement of the Internet of Things and wireless sensors has paved the way for the development of new services for next-generation healthcare systems to enable superior communication between healthcare professionals. This paper presents key components of the Wiki-Health Analysis Framework, which enables an ecosystem to support scientists, developers, and professionals to publish their data analysis...
Email plays a very important role in our daily life. Much work have been put into practice on email network. Those studies mostly require real email network datasets and reliable models to analyze user information and understand the mechanisms of network evolution. However, much research work is constrained by the absence of real large-scale email datasets. Although email communication is ubiquitous,...
Recent developments of modern technologies such as cloud computing, wearable sensor devices and big data have significantly impacted people's daily lives, and offer real potential for an Internet-wide, people-centric ecosystem. These advances in technology will considerably extend human capabilities in acquiring, consuming and sharing personal health information. A future in which we are all equipped...
High precision positioning stage has played increasingly important role in the areas of aeronautics and astronautics, ultra-precision manufacturing and measuring, microelectronics, biological engineering, optical engineering, etc. In this paper, a piezo-powered 2D micro-positioning stage based on parallel sheet plate flexible beams is designed. A lever amplifier structure connected by circular arc...
In this paper, a new cooperative control system is proposed for the vehicle's steering antilock braking stability fields. The cooperative control architecture is composed with the steering controller and the braking controller. Based on the yaw moment and the front wheel angle controllers, the vehicle steering controller is designed to improve the respond and stability of the vehicle. On the same...
This article puts forward the third-party guarantee mechanism model with uncertain information. And proved in incomplete information conditions, Guarantee agencies charge premium and reverse collateral will change the profit function and reduce the income of SMEs. It makes partial lower risk SMEs who cannot provide counter-guaranty exit the credit-guarantee market, resulting in the appearance of credit...
Although peer-to-peer system is scalable for content distribution, its lifespan is shorter than traditional systems. More and more researchers pay close attention to swarm lifespan and propose specialized methods to extend it. Bundling technique and SRE (Share Ratio Enforcement) mechanism in Private Tracker system are two successful enhancements which are proved by practical systems. However, they...
The model of the mobile communication location management with self-similar stream is proposed. This paper investigates the model and proposes a probability formula of the count of the location areas for a mobile crossing by the density evolution method of vector Markov processes and overcoming analytic difficulty. These results provide a theoretical basis for quantitative evaluation of mobility management
Considering a Supervisory Control And Data Acquisition (SCADA) system has been installed in many municipal water supply networks, the water network scale mostly is big and the district meter area (DMA) have not been realized in China, a leak detection model based on the cluster-analysis and fuzzy pattern recognition theorem is introduced. First, computer simulation of pipe leak is realized, and a...
In order to ensure the electricity output quality of one turbocharged diesel generator set under pulsed load, some measures were taken to control the speed regulating rate of original power machine. One main reason causing the big diesel speed regulating rate in experiment is the lack of air for combustion in the early period of pulse. The other reason is that the energy stored by set shafting parts...
Fast-flux based service network is first introduced as a technique used to improve the reliability and quality of a service system. But recently, this technique is also adopted by cyber-criminals and Internet miscreants to evade identification and to frustrate law enforcement and anticrime efforts aimed at locating and shutting down the illegal service. Previous work on this topic focuses mostly on...
Assessing and understanding the level of city ecological security are of great importance to sustainable urban development. According to the pressure-state-response model, the indexes of city ecology security assessment were chosen. Subsequently, the assessment model based on projection pursuit technology was set up and used for a case of Hefei city. The result shows that the ecological security level...
In this paper, chaos theory is applied to study the traffic behavior of wireless sensor networks (WSN). Through reconstruction of phase space and calculation of maximum Lyapunov exponent, we find that WSN traffic is chaotic, and different topologies of WSN could cause a little variation on embedded dimensions and maximum Lyapunov exponents, but doesn't change chaotic characteristics of traffic in...
This paper introduces the process algebra language with its powerful standard model-checking tools for trusted software architectures, which deals with incompatibility between two components due to a single interaction or the combination of several interactions and with the lack of interoperability among a set of components through architectural compatibility check and interoperability check relying...
To solve the problems in modulation recognition of time-frequency overlapped two-signal in the single-channel, an algorithm based on cyclic cumulants used modulation recognition is presented. Through computing the fourth-order cyclic cumulants of pretreated band signals, the feature vector for classification was extracted, and then use the minimum-error criterion to classify time-frequency overlapped...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.