The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nanoelectromagnetics problems in nanophotonics and plasmonics in the optical-wavelength regime are concerned in this paper. Very often such problems demand more accurate electromagnetic computation and analysis. A multidomain Legendre pseudospectral time-domain (PSTD) method recently developed and demonstrated to provide high numerical accuracy is utilized to study light interaction with sub-wavelength...
Recently, there are more touch panels that have been extensively used throughout the world. Due to customer input regarding improvements, we have examined the use of technology of touch products. In the market, most of touch monitors used by finger or touch pen get the electricity, capacity effect, or stop sensor signal. From the signal orientates the controller, lots of products were used by ATM...
With the Semantic Web services technology research work continued to deepen, the number of semantic Web services on the Internet has dramatically increased how to locate available semantic Web services quickly and easily has become an urgent and key issue. Among semantic Web service matchmaking technology study, one of the important research themes is the semantic Web service matchmaking result ranking...
A new suction detection algorithm for rotary Left Ventricular Assist Devices (LVAD) is presented. The algorithm is based on a Lagrangian Support Vector Machine (LSVM) model. Six suction indices are derived from the LVAD pump flow signal and form the inputs to the LSVM classifier. The LSVM classifier is trained and tested to classify pump flow patterns into three states: No Suction, Approaching Suction,...
Objective To evaluate the diagnostic accuracy of dual-source CT (DSCT) prospective ECG-triggering coronary angiography in patients with different heart rate (HR). Methods 103 patients with suspected coronary artery disease underwent DSCT prospective ECG-triggered coronary angiography and invasive coronary angiography (ICA). The patients were grouped by HR during CT scans: low HR (≤60 bpm, n = 34);...
A basic conceptual design process of warship is described in this paper. quality function deployment method and house of quality are briefly introduced and applied to requirements analysis in conceptual design of warship. problems in application are generalized and discussed. the case study shows that QFD method can help demonstrators to ascertain interrelationship between operation requirements and...
In view of the limitation of QFD method in requirements analysis of equipment demonstration, a structured method combining axiomatic design theory and QFD is proposed. Operation requirements, operation capability and measures of performance of equipment are used as elements of domains in axiomatic design theory. Mapping between the domains is done by House of Quality. An example shows that by the...
This paper provides a simple but effective approach, named ECON, to fully-automatically extract content from Web news page. ECON uses a DOM tree to represent the Web news page and leverages the substantial features of the DOM tree. ECON finds a snippet-node by which a part of the content of news is wrapped firstly, then backtracks from the snippet-node until a summary-node is found, and the entire...
Identifying applications and classifying network traffic flows according to their source applications are critical for a broad range of network activities. Such classifications can be based on information derived from packet header fields and payload content, or statistical characteristics of flows and communication patterns of hosts. However, most of present methods rely on some forms of priori knowledge...
There are a large number of accessible deep Web sites on the Internet. However, even if identical entity has different representation formats on different Web sites. So entity identification plays a crucial role in deep Web data mining. This paper proposes an entity identification method in the field of Chinese books. First, using improved Jaccard coefficients to calculate similarity of text attributes...
In order to precisely procure the Chinese person information on the web, especially distinguish from the namesake, this paper propose a clustering algorithm based on latent semantic model. It establishes for every document a latent semantic model of sentence-word matrix based on central distance, central segment, document length, etc, by building the central word library of person attributes. It clusters...
Node localization which is determining where a given node is physically or relatively located is extremely crucial for most of the applications in wireless sensor network. In this article, we review and describe the taxonomy and fundamental localization methods. The current research in WSN localization algorithms are introduced, analyzed and concluded. The point is that no single algorithm performs...
How to improve the accuracy of the concept similarity computation is still an issue needed to be studied further. This paper proposes a new approach which combines concept similarity with the users' individual preference. The personal coefficients trained by artificial neural network are employed to adjust the initial concept similarities to get the actual concept similarities. The experimental results...
Traditional application identification based on port numbers has become increasingly inaccurate. A more accurate alternative is to inspect the application payloads of traffic flows. The main drawback of such method is that target applications must be manually analyzed beforehand. Another alternative is to exploit the distinctive statistical properties of traffic flows and apply machine learning techniques...
This paper presents a new method for the mining the hottest topics on Chinese Web page which is based on the improved k-means partitioning algorithm. The dictionary applied to word segmentation is reduced by deleting words is which are useless for clustering, and the dictionary tree is created to be applied to word segmentation. Then the speed of word segmentation is improved. Correspondence between...
Current approaches for generating wrappers for web page extraction suffer from the requirement of huge amount of labeled training pages to obtain satisfying results. On the other hand, the quality of data extracted by fully automatic methods is not reliable. In this paper, we propose a novel method to facilitate wrapper generation by combining wrapper induction and page analysis approaches. In addition...
A number of recent works have proposed using data mining and machine learning techniques to classify traffic flows based on statistical flow characteristics. Most of these classifiers work offline, since full-flow statistics are not available until a flow is finished. Therefore, it is usually too late to take actions for online deployment. In this paper, we propose a simple and effective technique...
Network traffic classification plays an important role in various network activities. Due to the ineffectiveness of traditional port-based and payload-based methods, recent works proposed using machine learning methods to classify flows based on statistical characteristics. In this study, we evaluate the effectiveness of machine learning techniques on the real-time traffic classification problem....
The localization algorithm in wireless sensor network is always a hot spot. Information collected by the sensors is meaningless without the position of the sensors. Now, paying little attention to 3-D space, most of the algorithms are for 2-D space. In this paper we introduce a novel algorithm for 3-D space called OBS (Optimal Beacon Selection) algorithm. In this algorithm we launched the concept...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.