The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces the multiple linear regression, stepwise linear regression, neural network method, and improves the neural network. Comprehensive analysis of the current prediction methods, the application principle of a detailed analysis and comparison of the various prediction methods advantages and disadvantages. Put forward to improve short-term load forecasting accuracy is not only attach...
With the establishment of open universities and development of colleges of online education in China, massive user data are stored in web-based learning cloud platforms and network examination systems. There will have the problem of very slow processing rate if such a huge volume of information is discovered only traditional methods, reducing the mining efficiency because of frequent read-in (RI)...
Due to the vast volume of publications in nowadays research environment, methods for analyzing, organizing, and accessing information from large databases are in great need. Through appropriate analytic tools, competitive intelligence can be revealed to enhance the organization or individual performance. This article will show how a free software package called CATAR carry on the analysis about the...
This paper starting from the teacher assessment data, analyze whether the evaluation indicators are suitable for factor analysis, then find the two factors which played a decisive role in evaluation indicators these indicators were interactive and related, so as to achieve the purpose of simplifying calculation. Final get the teachers' rankings by factor analysis.
Microdata protection in statistical databases has recently become a major societal concern and has been intensively studied in recent years. Statistical Disclosure Control (SDC) is often applied to statistical databases before they are released for public use. Micro aggregation for SDC is a family of methods to protect micro data from individual identification. SDC seeks to protect micro data in such...
In this work, we adopt Apriori Algorithm to explore the relationship between treatment preferences and survival of breast cancer patient based on other medical attributes. The SEER Public-Use Data 2005 is used in this research. After the preprocessing of the dataset, we apply Apriori algorithm of Association Rules. As a result, we obtain a great deal of association rules related. We pick up some easy...
The information on the Internet has been grown exponentially, the Internet users are overwhelmed by these information. How to automatically extract useful information from the relevant pages, so as to provide a convenient and rapid information query platform for the users, is an important issue. In this paper, based on simple tree matching algorithm, we present a Web data extraction method based on...
Water shortage for agriculture gets more and more severity which makes it necessary to develop water saving agriculture and achieving the leaf water potential accurately is the key. To ensure the accuracy of the plants' microenvironment information is the most important. Achieving the ideal microenvironment data under closed environment first, and then mixed with various types of outliers manually...
Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackle this problem through checking whether function pointers target the addresses within the code segment or, more strictly, valid function entries. However, they cannot detect function entry attacks that manipulate function pointers...
Learning management system (LMS) plays a critical role in current pedagogy. Along with the concept of Web 2.0, Web has become an interactive platform for contribution and collaboration. Moodle open source LMS is one of the most popular learning management systems currently. It will be valuable for the learners to view the teaching materials online and perform annotating operations on them which are...
According to mapping relationship of the relative internal efficiency of low pressure cylinder of condensing steam turbine and its affection, a mathematical model based on the Immune system's wavelet network was established. It can be used for calculating the relative internal efficiency of low pressure cylinder of 300 MW steam turbine. The application of the model shows that the proposed method is...
Two problems will be met with while directly using simple genetic algorithm to solve image interpolation: one is how many bits are needed for difference-chromosome coding. Setting it too large will increase implementation spending while making it too small will evolve into local minimum. The other is premature, if some individuals are most dominant in current population, they will emphasize their...
In order to get realistic appearance in building highway by using three-dimensional simulation technology, it is natural to do some complex calculations for the surface of the highway, involving patterns with certain colours and textures. Usually, the surface with single colour can be simulated by direct colouration. The surface involving complicated patterns with colours and textures need to use...
Association rule mining is an important topic in data mining field. On the basis of the association rule mining and Apriori algorithm, this paper proposes an improved algorithm based on the directed network. It reduces consumption and improve the efficiency of algorithms by reduce scanning datasets and improving the efficiency of the pruning step. Finally, this paper gives an experiment to analyze...
P-sensitive k-anonymity model has been recently defined as a sophistication of k-anonymity. This new property requires that there be at least p distinct values for each sensitive attribute within the records sharing a combination of key attributes. However, as shown in this paper, it may not protect sensitive information in some way. In this paper, we empirically investigate two enhanced k-anonymity...
With the enlargement of sizes of networks, scale-free property of networks is present. However, scale-free networks are fragile. If the nodes with most degree are attacked, the whole network will be devastated. This paper proposed an algorithm to optimize the topology of scale-free networks with redundant edges. Adjacent networks of key nodes will be linked as a rotary and junction structure, to ensure...
We study the multi-robot synchronization on a segment. The goal is for each robot to move along a subsegment of equal length in equal time interval with potential impacts. To achieve the synchronization, we propose a decentralized algorithm by designing impact law, which does not depend on the position of the robot, but on the time information. Specifically, ??the time interval between two consecutive...
Large-scale deployment of multicast applications is limited by the number of states that are set in routers for multicast groups. As a new approach to multicast state reduction, aggregated multicast forces multiple multicast groups sharing a common distribution tree. An ant colony optimization algorithm to aggregated multicast is proposed. Inspired by bin packing problem, relative fullness is used...
For data sets of customer churn are imbalanced, it's hard for classical BP neural network to make good classification. This paper proposes an improved BP algorithm, namely CostBP. CostBP modifies the error function into cost-based error function, based on which error propagation is conducted. The experimental results showed that CostBP can minimize total misclassification cost and was effective in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.