The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Robust and accurate traffic prediction is critical in modern intelligent transportation systems (ITS). One widely used method for short-term traffic prediction is k-nearest neighbours (kNN). However, choosing the right parameter values for kNN is problematic. Although many studies have investigated this problem, they did not consider all parameters of kNN at the same time. This paper aims to improve...
Meta-analysis is a quantitative research method for synthesizing research results. This paper explores the application of meta-analysis in educational technology research from 2000. A total of 37 articles from 14 SSCI journals were selected and analyzed with the basic information of the articles, including the publication year and type of cooperation. Then, the moderator variables, such as grade level,...
The alternating direction method of multipliers (ADMM) has been recognized as a versatile approach for solving modern large-scale machine learning and signal processing problems efficiently. When the data size and/or the problem dimension is large, a distributed version of ADMM can be used, which is capable of distributing the computation load and the data set to a network of computing nodes. Unfortunately,...
As vehicles meet each other occasionally in VANETs, users will naturally have the requirement of protecting their privacy during VANET communications. The privacy requirements bring unique challenges for the communication setup and maintenance as any information (such as IP address and MAC address) that may relate to the users' IDs should not be used. To resolve this problem, we propose to utilize...
Nowadays, microblogs provide abundant text data. Mining valuable information from it becomes an interesting topic. Based on the topic model, things can be easily traced. The complete view of an event can help people make decisions. Once we can track topics in a specific domain, experts can rapidly react according to important events. In this paper, we proposed a LDA [2] based framework to capture...
Technology in education has caused numerous of changes. The use of electronic books (e-books) is one of these changes, however, it is given the slower than expected growth. In other words, there is few complete consideration for using e-books materials into education. Therefore, this study proposes a framework to consider how to transfer the traditional textbooks into electronic textbooks called e-textbooks...
This paper considers the downlink traffic from a base station to two different clients. Assuming infinite backlog, it is known that inter-session network coding (INC) can significantly increase the throughput of each flow. However, the corresponding scheduling solution (assuming dynamic arrivals and requiring bounded delay) is still nascent. For the 2-flow downlink scenario, we propose the first opportunistic...
By using B-spline neural networks, an adaptive nonlinear parametric control scheme for nonlinear systems is proposed in this paper. The control scheme which is utilized to design the control input incorporates the adaptive control design technique with the mean-estimation B-spline neural networks. Compared with other neural networks, the B-spline neural networks possess output behavior the characteristic...
In recent years, many network users has been the serious impact by the intrusion of the Internet, there are many attack events occur at the present time. On the Internet, the intruders usually launch attacks from the stepping stone that they previously compromised. In this way, the attackers can reduce their risk of directly detected. Even if the network managers detect the invasion that still can't...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.