The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visual (V) surveillance systems are extensively deployed and becoming the largest source of big data. On the other hand, electronic (E) data also plays an important role in surveillance and its amount increases explosively with the ubiquity of mobile devices. One of the major problems in surveillance is to determine human objects' identities among different surveillance scenes. Traditional way of...
Firstly, according to the Hadoop platform the novel data-analysis architecture is designed, then the paper builds the Item-based clustering collaborative filtering algorithm based on Hadoop. And it takes advantage of the MapReduce parallel programming model to improve the traditional collaborative filtering recommendation algorithm, and resolves the problems of poor system performance of traditional...
Risk Analysis of electricity bill charge has been both challenging and important in the field of electricity power supply in China. In this paper, a novel electricity bill charge risk predicting method is proposed. The SMOTE (synthetic minority oversampling technique) algorithm is first used to under-sampling the majority class and over-sampling the minority class, and then it is combined with some...
According to the requirements of IEC61850-9-2LE, digital energy metering devices mainly adopt 80×fr fixed sampling rate. When the harmonic analysis is carried out under asynchronous sampling, it will produce large errors due to spectral leakage. Quasi-Synchronous Algorithm has high accuracy, but the calculation process is complicated and the hardware overheads are high. Based on the characteristics...
The image thresholding approach based on the basis of 2-D maximum entropy has better segmentation performance by the use of local space information of pixels, but it is unpractical for heavy computation required by this method. In the paper, an image segmentation technology based on cuckoo search and 2-D maximum entropy is presented, which views the seeking of 2-D maximum entropy of the image as a...
In big data analytics, clustering plays a fundamental and decisive role in supporting pattern mining and value creation. To help improve user experience and satisfaction level of clustering algorithms, one important key is to let users define the quality of the aggregated clusters (e.g. In terms of the homogeneity and the relative population of each resulting cluster) they prefer instead of to fix...
Information safety is significant for state security, especially for intelligence service. OSIA (open source intelligence analyzing) system based on cloud computing and domestic platform is designed and implemented in this paper. For the sake of the security and utility of OSIA, all of the middleware and involved OS are compatible with domestic software. OSIA system concentrates on analyzing open...
This paper motivates and describes the use of Response Surface (RS) with Probability Collectives (PC) to handle large-scale optimization problems. The main characteristic of PC is that it optimizes the probability distribution of the variables rather than their values, thus different types of variables may be integrated into optimization procedure. The RS is used to approximate the utility evaluation...
In a large-scale wireless sensor traffic network, collecting and processing of the global real-time traffic information are often unreliable. Making real-time navigation decision becomes an arduous task. To address this issue, an efficient real-time vehicle navigation algorithm is proposed, in which multiple local traffic information are considered to make navigation decision in a quick and accurate...
Designated verifier signature, was proposed by Jakobsson, Sako and Impagliazzo, is an important cryptographic primitive which can be used to convince a single third party, i.e. the designated verifier, and only the designated verifier who can be convinced to the fact that the designated verifier can always construct a signature intended for himself that is indistinguishable from an original signature...
In this paper, we first present a classification for existing GPS positioning algorithms based on their features of mathematical operations in the calculating process and the accuracy of the solutions solved. Then we systematically evaluate and compare the performance of GPS algorithms for practical environments. Performance metrics include normalized execution time and the absolute error. We examine...
Clustering is an important technique for intelligence computation such as trust, recommendation, reputation, and requirement elicitation. With the user centric nature of service and the user's lack of prior knowledge on the distribution of the raw data, one challenge is on how to associate user quality requirements on the clustering results with the algorithmic output properties (e.g. number of clusters...
The premise of effective use of clean energy is to correctly determine malfunction zone of distribution network with distributed generation. Based on the matrix algorithm in the location of feeder terminal unit (FTU) to the malfunction of distribution network, a new adaptive matrix algorithm for the fault location in distribution network is proposed. According to flowed over-current through the FTU...
Aiming at the drawback of being easily trapped into the local optima and premature convergence in quantum-behaved particle swarm optimization algorithm, fuzzy quantum-behaved particle swarm optimization algorithm was proposed. In fuzzy quantum-behaved particle swarm optimization algorithm, the center of potential of particle was influenced by more than two particles in the neighborhood and the influence...
Aiming at the drawback of being easily trapped into the local optima and premature convergence in quantum-behaved particle swarm optimization algorithm, clustering coefficient and characteristic distance is proposed to measure diversity of the population by which quantum-behaved particle swarm optimization algorithm is guided. The population is divergent to increase population diversity and enhance...
A major problem with text classification problems is the high dimensionality of the feature space. This paper investigates how genetic algorithm and k-means algorithm can help select relevant features in text classification. which uses the genetic algorithm (GA) optimization features to implement global searching, and uses k-means algorithm to selection operation to control the scope of the search,...
Linear array antennas (LAA) synthetic aperture radar (SAR) three-dimensional (3D) imaging has received a vibrant identification in recent years. This paper proposes a digital-beam forming (DBF)-based three-dimensional imaging algorithm for linear array antennas downward-looking synthetic aperture radar with single-transmitting and multiple-receiving (STMR) configuration. To establish the radar echo...
E-learning online system which is well-known as its convenient, flexible mode and cheap investment is becoming a new way for people to receive education. How can build an intelligent and personalized learning platform for learners is required today. Web usage mining (WUM) by analyzing the potential rules hidden in Web logs can help personalize the delivery of Web content and improve Web design, customer...
Besides functional dependencies, multivalued dependencies are also important integrity constrains in XML documents. So far, the definitions for multivalued dependencies are oriented to XML documents, rather than schemata. At present, DTD is accepted to be a major schema for a XML document, and most of XML documents are designed to have DTDs. So, it is necessary to propose a definition about multivalued...
For the signal containing the inter-harmonics, if the sample number is not equal to integer times of the signal period, the spectral leakages will occur in harmonic analysis based on DFT and affect the measurement accuracy. To improve the accuracy, different from other correction methods in which the long-range leakages are reduced by windowing the signal, a new interpolation algorithm is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.