The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intelligence is extremely critical for firms to evaluate competitive environment, grasp opportunities, gain advantages and cope with crisis. The emergence of big data has created new opportunities and more challenges for firms to identify and use intelligence effectively. This paper attempts to explore a multidimensional intelligence presentation method based on knowledge element. By respectively...
With economics developing rapidly and social economic booming, the rapid development of society turns to have both sides. Emergencies also easily set a more serious impact on society, ecological environment and people's life and property safety. Using resources allocation in emergency decision of incidents as the researching object, the article analyses essences and features of resources allocation...
The development of cloud computing philosophy and technology offers new direction to e-government. First, introduced and analyzed current situation of government cloud computing at home and abroad. Then, discuss the research contents from the aspects of migration mode and architecture of government cloud, popular government cloud solutions. Finally, indicated the problems to be solved urgently.
We propose a game theoretical approach to multi-type fair resource allocation algorithms in a distributed heterogeneous environment. Distributed approaches can benefit large scale computing systems, especially if the hardware computing resources in the system are organized in a decentralized manner as in federated clusters and cyber physical systems. The simulation results show that our approach has...
Some plan recognition approaches represent knowledge about the agents under observation in the form of a plan library. Although such approaches use conceptually similar plan library representations, they seldom, if ever, use the exact same domain in order to directly compare their performance. For any non-trivial domain, such plan libraries have complex structures representing possible agent behavior,...
Trust and uncertainty are important aspects of many distributed systems. Managing them together forms a complex problem, even more in the domain of the Internet of Things (IoT), where having multiple sources of information is very common. The devices of the IoT face two-fold problems of managing trust on sources and the presence of uncertainty in the information. We propose a solution to these problems...
The agent technology arises as a solution that provides flexibility and robustness to address dynamic and complex domains. Such flexibility can be achieved by the adoption of existing agent-based approaches, such as the BDI architecture, which provides agents with the mental attitudes of beliefs, desires and intentions. This architecture is highly customisable, leaving gaps to be fulfilled in particular...
The scheduling problem in real factory manufacturing systems is comprised of number of parallel machines. Each machine is capable of processing several tasks, but it may need extra costs if the current machine state should be changed to perform a different task with the current performing task. In that case, minimizing such changes with maintaining some desired performance is recommended for maximizing...
When given multiple models it is often useful to combine them for improved reliability or performance over the individual models. Over the years many outlier metrics and detection methods have been developed for the purposed of finding data incongruous with the rest of the data. Inspired by the successes of supervised ensemble machine learning, many have proposed combining multiple anomaly detection...
Online advertising is dominated by traditional techniques such as pop ups, banners, emails etc. Users are more likely to engage with content they find relevant and interesting, and ads generally disrupt their browsing experience. Hence an effective advertisement is one that simultaneously satisfies the marketing goals of the advertiser and also seamlessly embeds into the user experience. Such advertisements...
It is important for artificial agents to accurately infer human emotions in order to provide believable interactions. However, there is currently a lack of empirical results supporting affective agent to propose effective computational models for this purpose through analyzing individual profile information and the interaction outcomes. In this paper, we bridge this gap with a game-based empirical...
In recent years, blogs have become a very popular way to publish information, express opinions and hold discussions. Hence researchers and industry have interest in analyzing the blogosphere. Due to the increasing diversity of blog usage, the initial categorization into web genres is the first necessary step before any analyses. In this research, we focus on the distinction between traditional blogs,...
In ordinal classification problems, data objects are grouped into at least three different classes by an appropriate classification model, which can be arranged in a total ordering. Performance evaluation of such problems will actually be performed using imprecise evaluation metrics. This paper proposes WOC, a novel evaluation metric for ordinal classification problems and shows, that this metric...
This paper introduces a concept for the classification of social media posts using twitter as an example. Thereby tweets are classified solely based on their metadata. We hereby use findings of network analysis and determine the strategic position, activity and reputation of a twitter user in order to classify his tweets into SPAM or HAM. Furthermore the next step of development for this concept,...
Unwanted content on web pages can take many forms, be it ads, malicious code, pointless clutter, or specific topics that the user does not want to read about (yet). Unlike most other work, we focus on the latter. The user can define terms based on which we prevent the disclosure of undesired information (e.g., the latest sports result) and warn the user before it is revealed. The user can decide if...
It is necessary to take much time and resources for compiling an input-output table, and there inevitably exists time lag in all the finished tables, which has greatly weakened the analysis and application function of input-output table. Though the development of techniques of adjusting input coefficient has relieved disadvantage of time lag to some extent, yet this kind of methods is still inapplicable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.