The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Various network relationships in many complex social systems can be described effectively by multilayer networks, but we find that there are interactions between individuals attributes and their social relationships by a principle of homophily, which hence impact the process of information spread and social influence in complex social systems. In order to integrate individuals relationships and attributes...
As data become big and complex, it is also more challenging to data scientists to extract useful information in a timely fashion. Although many tools and packages are available to them, it is crucial to have a high productive and scalable big data analytics platform to carry out their daily work productively. The objective for our work is to build such a productive data analytics cloud platform by...
The past decade has seen a lot of research on statistics-based network protocol identification using machine learning techniques. Prior studies have shown promising results in terms of high accuracy and fast classification speed. However, most works have embodied an implicit assumption that all protocols are known in advance and presented in the training data, which is unrealistic since real-world...
In this paper, the feasibility of building seismic damage assessment using oblique images is discussed. Firstly, some geometric features of buildings are selected and analyzed according to the universal geometric characteristics of most buildings. Secondly, the parameters of each geometric features are calculated by the method of photogrammetry. Finally, the results of parameters calculation are analyzed...
GPS enabled taxis provide us not only their locations and passenger status information in real-time, but also historical digital traces which could enable innovative services such as smart taxi dispatching, anomalous taxi detection, urban hotspots discovery, bus planning, and so on. Even though researchers have developed algorithms and systems in previous work targeting specific applications, there...
Mine use sublevel caving method, in the production process, the mine pass is an essential ore transport channel, in the production plays an very important role. Therefore the stability of the chute is an important technical support of the mining production and the safety in underground metal mines. Taking a sublevel caving method mining as the research background, Using the MIDAS / GTS finite element...
The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web-based visualization system (CASASviz) that integrates monitoring, analysis, and automated recognition of residents behavior patterns in smart environments. In our data collection module, we collect real sensor data from the...
In modern cities, more and more vehicles, such as taxis, have been equipped with GPS devices for localization and navigation. Gathering and analyzing these large-scale real-world digital traces have provided us an unprecedented opportunity to understand the city dynamics and reveal the hidden social and economic “realities”. One innovative pervasive application is to provide correct driving strategies...
With more older adults and people with cognitive disorders preferring to stay independently at home, prompting systems that assist with Activities of Daily Living (ADLs) are in demand. In this paper, with the introduction of “The PUCK”, we take the very first approach to automate a prompting system without any predefined rule set or user feedback. We statistically analyze realistic prompting data...
In view of the severe situation in coal mine safety production, using tomcat6.0 as the Web server software, through the dynamic web page struts technology and ibatis framework technology to realize database connectivity, using Myeclipse 5.5.1 as a development tool, we develope the web-based system which is monitoring and managing of the coal mine safety equipment intelligently. For different units,...
Key frame extraction methods aim to obtain a set of frames that can efficiently represent and summarize video contents and be reused in many video retrieval-related applications. An effective set of key frames, viewed as a high-quality summary of the video, should include the major objects and events of the video, and contain little redundancy and overlapped content. In this paper, a new key frame...
Recent years have witnessed the emergence of Smart Environments technology for assisting people with their daily routines and for remote health monitoring. A lot of work has been done in the past few years on Activity Recognition and the technology is not just at the stage of experimentation in the labs, but is ready to be deployed on a larger scale. In this paper, we design a data-mining framework...
This paper presents a priority-based opportunistic multi-channel medium access control (MAC) protocols in cooperative cognitive radio (CR) wireless networks, which used to promote the utilization of radio spectrum resources and to address the fairness issue of channel access among secondary users (SUs). On the one hand, we make use of Markov chain to prioritize each data channel that licensed to the...
This paper deals with the collaborative campaign of pair-warships, whose decision-making process is described. Considering behavior and cognition factors of decision-makers, the mathematical model of two-decision-maker decision-making process with superior-subordinate relationship is constructed subsequently. Based on this issue collaborative decision-making consistency and its measurement are defined,...
Most of work on rate-compatible low-density parity-check (RC-LDPC) codes focus on binary codes. In this paper, we propose a construction of nonbinary RC-LDPC codes at short block length by using a bit-wise shortening method based on the algebraic properties of their binary images. All shortened information bits are carefully chosen according to the degree distributions of their binary images. Simulations...
In this paper, we propose a class of efficiently encodable nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes over finite fields. The special structure of the parity-check matrix allows the construction of both regular and irregular codes. A parallel encoding algorithm with a simple shift-register circuits implementation is presented, which significantly reduces the encoding latency....
In this paper, a classification framework is developed to address the issue that empirical determination of the parameters and their values typically makes a classification framework less adaptive and general to different data sets and application domains. Experimental results show that our proposed framework achieves (1) better performance over other comparative supervised classification methods,...
Credit risk management, which is the basic of the credit application, is the most perfect embodiment in the bank credit application and asset supervision. The ultimate purpose of credit risk management is to ensure that credit fund is of safety, profitability and fluidity. At present, it is extremely important of commercial banks to set up an early bank risk warning system. The author who makes great...
Nowadays with the growing scale of computer network as well as the number of nodes, the traditional method of mobile agent based distributed intrusion detection system may cause severe problem of network congestion and time delay, for the data processing of all the nodes are converged to the central node which will lead to a mass data processing on it. In this article we bring up a mobile agent and...
An opportunistic network is a network where each node only has connectivity with other nodes opportunistically. To disseminate data in this kind of network is a challenging task and had drawn lots of research effort. When two nodes have connectivity with each other, the data bundles stored in their memory will be either replicated or forwarded to the other node in the hope that the data eventually...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.