The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the rapid increase in the number of users owning location-based devices, there is a considerable amount of geo-tagged data available on social media websites, such as Twitter and Facebook. This geo-tagged data can be useful in a variety of ways to extract location-specific information, as well as to comprehend the variation of information across different geographical regions. A lot of techniques...
We propose a new approach to describe facial expressions based on axiomatic fuzzy set (AFS), which can convert the features to semantic knowledge. The method has two advantages: the first one is that the semantic concepts are gained by data distribution. It means that the concepts can be directly obtained from data set, and the priori model is not required. The second one is the semantic concepts...
With the prevalence of social media, such as Twitter, short-length text like microblogs have become an important mode of text on the Internet. In contrast to other forms of media, such as newspaper, the text in these social media posts usually contains fewer words, and is concentrated on a much narrower selection of topics. For these reasons, traditional LDA-based sentiment and topic modeling techniques...
Subspace clustering aims to reveal the latent subspace structure underlying high dimensional data by segmenting the data into corresponding subspaces. It has found wide applications in machine learning and computer vision. Most recent works on subspace segmentation focus on subspace representation based methods, which constructs the affinity matrix from the subspace representation of data points....
With the increasing death number of cardiovascular disease, it is significant to study ECG signals at meridian acupoints for developing new alternative and complementary therapies for chronic cardiovascular diseases. Therefore, an ECG measuring experiment at acupoints of the human meridian is firstly carried out for obtaining information transmission data of the meridian system. Then according to...
With the development of information technology, the demand for video transmission in wireless networks rapidly increases. The traditional traffic shaping algorithms cannot fully (or adequately) meet the demand for high-quality video transmission in wireless networks. Aiming to reduce this problem, this paper proposes a new multi-service flow, token bucket shaping scheme in an IEEE 802.11e environment...
Large Internet service providers usually operate multiple geographically distributed data centers to guarantee the quality of service for their worldwide users. The enormous power consumption of these data centers may lead to both huge electricity bills and considerable carbon emissions. To mitigate these problems, we propose a novel renewable and cooling aware load balancing policy GGLB-ARMA in this...
Smart mobile handheld devices (MHDs) are being adopted at a fast speed. Compared to wireless non-handheld devices (NHDs), MHDs tend to be more mobile and can be used more opportunistically. In this paper, we study two important network usage characteristics of MHDs, namely session lengths and IP address usage, in a university campus WiFi network. Specifically, we analyze two five-week long DHCP traces...
Detection of buried radioactive objects faces challenges such as low energy counts and strong background clutters due to the burial of the targets. Classical detection methods such as the constrained energy minimization (CEM) and the RX method, when applied separately, may not be able to yield satisfactory results. In this paper, we propose to combine detection results from individual detectors through...
Aiming at the limitation that the interruption event recordings are simply used to calculate the reliability indexes in the reliability management of distribution network at present, this paper proposes a practical method of reliability weak links mining for distribution network based on multidimensional analysis. Firstly, a complete multidimensional cube model of interruption recording is built according...
In this paper, we propose an unsupervised phrase-based data selection model, address the problem of selecting no-domain-specific language model (LM) training data to build adapted LM for use. In spoken language translation (SLT) system, we aim at finding the LM training sentences which are similar to the translation task. Compared with the traditional bag-of-words models, the phrase-based data selection...
The current Hadoop implementation assumes that computing nodes in a cluster are homogeneous. Due to the fact that the input data are split into data blocks with a predefined block size, Hadoop suffers performance degradation during Map phase in heterogeneous cluster. To solve this problem, we propose a heterogeneity-aware data distribution and rebalance method in heterogeneous Hadoop cluster. The...
Owing to the intermittency and uncontrollability of wind power, large-scale wind power integrated into power system will bring severe challenges to power system safety operation and power quality. Wind power forecasting technology is one of the key technologies in coping with those problems. It plays an important role on guiding the grid dispatching and production effectively. However, the accuracy...
In order to overcome the deficiency of the traditional method for determining of threshold value of the health state, this paper proposed a health state grade dividing algorithm based on artificial immune system (AIS) and cloud model. It cluster the state degradation data of equipment and the best clustering date of health state grade is found out without priori knowledge, and then it uses the cloud...
Estate industry plays many efforts on economics' development. For investigating impact factors about estate companies' operating performance and finding the breakthrough to improve operational capacity, this paper constructed the evaluation model based on principal component analysis and adopted 40 estate listed companies as example to verify the model. The results indicated that the model, proposed...
Combining Geographic Information System(GIS) platform with three-dimension(3D) modeling and virtual reality technology, a strategy of visualization of 3D geological bodies and 3D orebody based on Supernatural GIS is proposed and the corresponding data structure is designed. By the direct human-computer interaction, many functions are realized, such as browse of dynamic panorama,3D virtual roaming,...
To realize the fire and human behavior simulation, the texture mapping and particle system technologies were used to achieve realistic fire scene visualization of inner architecture, and advanced skeleton animation technology is used to achieve the simulation of evacuation and fire fighting training behavior, combining with particle system and the mathematical physics method to establish more authentic...
Learning Villages (LV) is an E-learning platform for people's online discussions and frequently citing postings of one another. It will greatly improve learning efficiency if credible users can be accurately identified in the E-learnning community. In this paper, we propose a novel method to rank credibility of users in the LV system. We first propose a k-EACM graph to describe the article citation...
With the e-commerce market competition becoming more and more furious, it has become one of the focuses of companies that how to avoid customer churn and carry out customer retention. This paper applies many techniques of data mining to the research of customer churn, such as clustering analysis, decision tree, neural network, etc, establishes an e-commerce customer churn model and analyzes the factors...
MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service oriented architecture, cloud computing, and volunteer computing, we must provide necessary security mechanisms to protect the integrity of MapReduce data processing services. In this paper, we present SecureMR, a practical service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.