The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The widespread prevalence of dietary supplements has drawn extensive attention due to the safety and efficacy issue. Clinical notes document a great amount of detailed information on dietary supplement usage, thus providing a rich source for clinical research on supplement safety surveillance. Identification the use status of dietary supplements is one of the initial steps for the ultimate goal of...
Predicting student academic performance has been an important research topic in Educational Data Mining (EDM) which uses machine learning and data mining techniques to explore data from educational settings. However measuring academic performance of students is challenging since students academic performance hinges on diverse factors. The interrelationship between variables and factors for predicting...
With the development of the network technology, social network services (SNS), which are based on social network theory have gained increasing media, government and popular attention than ever before. In a social networking site, recommendation and trust assessment is of great importance. However, applications are complicated and changeable, so the fixed assessment criteria which are dedicated to...
In Web database integration, crawling data pages is important for data extraction. The fact that data are contained by multiple result pages increases the difficulty of accessing data for integration. Thus, it is necessary to accurately and automatically crawl query result pages from Web database. To address this problem, we propose a novel approach based on URL classification to effectively identify...
The paper proposes a method of collapsed buildings extraction from post-earthquake airborne images. Firstly, training and validation samples are selected, and feature extraction is conducted through morphological profiles and texture statistics based on gray-level co-occurrence matrix, and then support vector machine classifier is used to extract collapsed buildings. An initial experiment is carried...
Detecting changes in stock prices is a well known problem in finance with important implications for monitoring and business intelligence. Forewarning of changes in stock price, can be made by the early detection of changes in the distributions of stock order numbers. In this paper, we address the change detection problem for streams of stock order numbers and propose a novel incremental detection...
The thesis briefly introduced data mining and clustering theories. Also through K-Means, ADSL voice multiplex customers are clustered, which caused over 240,000 customers divided into 8 clusters. Further analysis showed that the 8 clusters had distinct differences in basic characters and surfing the net. However, these differences could help X telecom Co. to design pointed sales strategies respectively,...
4H-SiC metal-semiconductor field effect transistors (MESFETs) with field-plated (FP) and buried gate-buried channel structures are proposed and simulated. The buried gate-buried channel structure serves to reduce the surface trapping effects, and the field-plated structure acts as to increase the breakdown voltage and reduce the peak electric field at the edge of the gate and drain side. The small...
The problem of designing H?? dynamic output-feedback controllers for polytopic Delta operator systems is considered. Given a transfer function matrix of a system with polytopic uncertainty, an appropriate, not necessarily minimal, state-space model of the system is described which permits reconstruction of all its states. To this model, a new polynomial parameter-dependent approach to state-feedback...
In peer-to-peer (P2P) systems, one important technique to improve the effectiveness of blind search is to proactively replicate file, which can lighten peers' load as well. But for autonomy and selfishness of peers in P2P systems, some peers are not willing to contribute their storage to save replications, which cannot be created successfully in this case. This paper presents a replication method...
Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC requires role engineering, the identification of a set of roles that offer administrative benefit. However, establishing that RBAC is desirable in a given enterprise is lacking in current role engineering processes. To help identify...
The transfer hub plays important role in urban public transit. The level of transfer capacity of transfer hub has great impact on the total operation state of urban transit system. Moreover, pedestrian facilities design principles and passenger management methods don't attach the widespread attentions comparing with other issue in many underground transfer hubs. At present, more pursuers have focused...
Regional finance revenue increased significantly with the tax system reform in China since the 90's. But the financial department also encountered the emergence of a series of new problems. There are many impact factors in the regional revenue, among these affect each other, mutual restraint. Changes in the course of finance revenue are a typical gray system. Gray Relational Analysis is to identify...
Both rough set theory and D-S evidence theory are important methods in uncertainty reasoning, and each one has its own advantages and disadvantages. Incomplete information system exists widely in real life. In this paper, two theories are used in combination to study the incomplete information system. First, reduction algorithm for the incomplete information system is put forward based on rough set...
In financial system, the general use of financial data has also been unable to meet the inherent need of the deepening of financial information and management modernization. The financial informationization is faced with needs of the growing use of financial data analysis. Under this background, this paper analyzes the financial income of certain city in a certain period. Association rules are mined...
Marching cube algorithm is a classical 3D reconstruction method, while topological ambiguity exists. Marching tetrahedra algorithms can solve the problem of topological ambiguity, but there are too many triangle patches. This paper proposes a new decomposing method that combines with MC method. We used several sets of medical images in the experiments, which proved this method could avoid topological...
In this paper, different approaches to calculate the characteristic impedance of slotlines by finite difference time domain (FDTD) method is presented. It shows that for non-TEM mode transmission lines, different definitions of Z0 yield completely different results. Then a more rational definition of characteristic impedance of slotlines is proposed. Result is obtained and compared with other definitions.
In the ant colony system (ACS) algorithm, ants build tours mainly depending on the pheromone information on edges. The parameter settings of pheromone updating in ACS have direct effect on the performance of the algorithm. However, it is a difficult task to choose the proper pheromone decay parameters ?? and ?? for ACS. This paper presents a novel version of ACS algorithm for obtaining self-adaptive...
Universal network and pervasive service is one kind of new network architecture. In this architecture, in order to guarantee the security of access network and terminal, terminal access control and access network authentication must both be implemented. Terminal unified access control method based on identifier realizes unified access control of various terminals, authentication of authentication...
In wireless networks, communication links may be subject to random fatal attacks: for example, sensor networks under sudden power losses or cognitive radio networks with unpredictable primary user spectrum occupancy. Under such circumstances, it is critical to quantify how fast and reliably information can be collected over attacked links. In our previous work, we studied such channels by considering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.