The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we focus on the problem of group detection on Sina micro-blog, the most popular micro-blogging system in China. Efficiency plays an extremely important role in data analysis. As a consequence, we propose a framework to quickly detect groups, in which we modify SimHash algorithm to calculate similarity of short text and improve TF-IDF algorithm to accurately calculate the weights. Basing...
Combined with the characteristics of network security audit system, paper introduced the idea of dynamic programming to pattern-matching algorithm, and gave the best dynamic matching algorithm, that is, by solving for matching pairs of local sub-problem, and for the number of different rules, (deleted) to find the best combination for the pattern-matching algorithms, then to achieve the strategy of...
A semi-fragile digital watermarking algorithm resisting affine transformation based on 2D vector graphics was designed for tamper localization. We divide graphics vertices after extraction, and then transform the construction of 8 ?? 8 matrix by DCT; authentication watermark is generated by the relationship between the DCT coefficients, and then embedded in the middle frequency region of the coefficients;...
One of the largest disadvantages in radio frequency identification (RFID) system is its low tag identification efficiency by tag collision. When the number of tags is large, for the conventional RFID anti-collision algorithm the number of slots required to read the tags increases exponentially as the number of tags does. The proposed IDFSA algorithm solved this problem by dividing frequency of tags...
An approach of multiple facula targets recognition based on particular distribution is presented. Firstly, a sort of particular distributions is proposed. Secondly, every target's edge and region pixels are searched and recorded after morphology open operation and adaptive thresholding. And then a feature vector is established, in order to segment facula targets from other disturbing regions. Finally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.