The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Thanks to recent advance in massive social data and increasingly mature big data mining technologies, information diffusion and its control strategies have attracted much attention, which play pivotal roles in public opinion control, virus marketing as well as other social applications. In this paper, relying on social big data, we focus on the analysis and control of information diffusion. Specifically,...
To protect sensitive information in mined data, researchers need a way to organize a variety of ongoing work. The Rampart framework categorizes protection approaches and encourages interdisciplinary solutions to the growing variety of privacy problems associated with knowledge discovery from data.
The growing popularity and development of data mining technologies bring serious threat to the security of individual,’s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without...
Questionnaire survey is one of the important research tools to conduct quantitative information collections. The number of completed questionnaires is usually quite large and sometimes can reach thousands; therefore the data collections become one of the key steps during research. This study set out to find an automatic and vast input method by machine vision, so that the future designs for questionnaires...
This paper presents a fast algorithm to detect the road lines and the road edges of structured and unstructured roads, respectively. In structured road detection, we firstly utilize vertical Sobel mask and color characteristic to detect the points of road lines. If the number of points is greater than a predefined threshold, we refine the detection results with slope filtering. And the least square...
The network communication applying network coding, in which the intermediate peers firstly encode the information from source, and then forward the encoded data which will be decoded by the destination peers where the original information gets restored. Previous methods indicate that we can improve throughput and stability of a network, fasten the expanding-velocity of copies, and reduce the download...
The topology mismatching is one of major factors that cause the low efficiency in P2P system and the consumption of large quantity of network bandwidth, while peer aggregation is a kind of practical way to make topology matching. This paper firstly introduces a multilevel marked system. According to the marked symbol, peers can progressively find theirs neighbor peers in a better way to achieve the...
Many previous schemes of multi-node cooperation mimic the behavior of the multiple-antenna system, and the imitation usually causes extra overheads. In this paper, we propose a novel multi-node cooperation scheme to avoid the imitation. The basic idea is to take the wireless broadcast advantage in the whole procedure. As a result, each source could maintain a multihop diversity route to the destination...
It is difficult for enterprise to build CAS (content addressable storage) appliance system because the most of CAS systems only provide API interface, to design and implement a new kind of CAS storage system is proposed in this paper. CAS interface based on http is suggested, which will turn the operation of file objects into the WEB semantic operation of URI resources, so that the management and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.