The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In light of the present situation research on learner model in adaptive learning system at home and abroad, this paper has put forward a new learner model to achieve self-organization and push of learning resources on the basis of learning goals and learner's personal conditions. It includes knowledge level module, cognitive ability module and preferences module. We respectively introduce the representation...
Moving vehicle detection based on computer vision is an important aspect in the application of Intelligent Transportation Systems (ITS). How to get the accurate parameters of the vehicle in real-time, especially in complicated background situation is very critical. In this paper an improved detection algorithm of moving vehicle is proposed. According to the characteristics of some present detection...
Coronary heart disease is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment based on the symptoms and signs in Traditional Chinese Medicine (TCM) have certain curative effect. But the objective of the syndrome diagnose...
Target recognition algorithm based on support vector machine of optimum parameters is put forward in this paper. Firstly, local surrounding-line integral bispectrum feature is extracted from the bispectrum of range profile of target. Secondly, parameter scope is obtained through experiment method, optimum parameters of support vector machine are gotten using genetic algorithm. Finally, support vector...
There are a lot of important and sensitive data in databases, which need to be protected from attacks. To secure the data, Cryptography support is an effective mechanism. However, a tradeoff must be made between the performance and the security because encryption and decryption greatly degrade the query performance. In this paper, a framework is proposed that can quickly implement query over encrypted...
This paper aims to develop a decision rule-based model of household car ownership by using household travel survey data. The rough set approach as one of data mining techniques provides an effective tool to model the presented data set with decision rule sets. In this paper, the outputted “if-then” rules show the significant relationships between car ownership type and household characteristics. The...
Unstable angina (UA) is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment based on the symptoms and signs in Traditional Chinese Medicine (TCM) have certain curative effect. But the objective of the syndrome diagnose...
Based on dynamic changes of land use types from remote sensing data at 2000-2005 periods, dynamics of landscape pattern in Shen-Fu Connection Area are quantitatively analyzed during those two periods. The transition probability matrices at two primary states (2000 and 2005) are established. Then, the development and the future tendency of landscape patterns are simulated and forecasted with Markov...
An in-line fiber-optic Fabry-Perot sensor formed by hollow-core photonic crystal fiber is used for ultrasound detection. The experimental results show that the wavelength-pressure sensitivity is ~7.29 ?? 10-3 nm/MPa, which is about twice more than that of FBG.
Single frequency coherent terahertz-wave generation method is used to obtain low-frequency spectra of the hydrogen bonding organic small molecules. Transmission spectrum of each sample show several peaks in this region. On the other hand, ab initio frequency calculations are performed for each molecule by CRYSTAL06 package. Both experimental results and theoretical calculations are compared each other.
Knowledge element analogy relation is a corresponding relationship in content, function or other aspects between two knowledge elements. This paper proposes a framework of relation Gaussian processes-based learning for knowledge element analogy relation recognition, which can integrate information from text and relation graph structure. Based on terms or core terms co-occurrence and type compatibility,...
A cognitive OFDM-based relay network is considered in this paper. Communication between any node pair occurs on a spectrum pool of OFDM subcarriers where the subcarriers are not used by primary users. Therefore, the available spectrum for different transmitter-receiver pairs is distinct due to their location difference and so on. To satisfy different traffic demand and improve system performance,...
For the characteristics of wireless sensor networks, combined the knowledge discover theory of data mining and knowledge application theory of data fusion, to set a unique integrated information treatment model based on neural-network based aggregation. The model is effective on saving wireless sensor energy consumption, extends net life, and is applicable to a variety of wireless sensor networks.
In order to improve the communication quality in practical network coding system, three main strategies are proposed to protect the encoding vectors, which includes importing cyclical redundancy into the encoding vectors of the coded packets, executing distributed space-time code to the encoded packets and a shift between the above two modes above according to different signal-noise ratios. And then...
Risk allocation in public-private partnership (PPP) projects is currently claimed as capability driven. While lacking theoretical support, the claim is often 'violated' by current industrial practice. There is thus a need for formal mechanisms to interpret why a particular risk is retained by government in one project while transferred to private partners in another. Moreover, it could be utilized...
Blind source separation (BSS) can be used to separate mixed signals which is combined by the original data linearly, and obtain the source component which is statistically independent. The capacity of independent component analysis (ICA) is usually affected by the phase difference of the mixed signals. For this reason, an improved method called frequency domain BSS is proposed. By the properties of...
Web feature service is an important part of geospatial data interoperability and enables GIS data with different formats to be operated at feature-level. Open Geospatial Consortium (OGC) has already developed standard implementation specifications for Web feature service, and for those Web feature services with different versions, such as WFS1.1, WFS1.0. OGC also define different schemas. Different...
Protocols for secure multi-party computation allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. However, the execution time of a secure protocol may be too high therefore it is not practical unless some tradeoffs are made between data access and confidentiality. This paper aims to provide some empirical...
In CT-RSA 2008, Yu et al. proposed a family of three efficient Online/Offline signature schemes, which are especially suitable for the devices with limited computing capabilities. In this paper, we propose a new security model of Online/Offline signature. We find that Yu et al.' basic scheme is insecure under our model. We repair Yu et al.'s loophole by proposing a modified scheme.
Microarray data produces expression pattern of thousands of genes at once. Grouping these gene expression patterns to have each group convey some biologically meaningful sight entails use of a clustering method. Two problems exist when attempting to use conventional clustering methods for the microarray data analysis. Presence of outliers skews the mean value computation which, in turn influences...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.