The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information explosion brings too much trouble to human lives. In order to improve the query efficiency of big data, we focus on the research ofa parallel algorithm, top-k query based on MapReduce. Firstly, we introduce the classic top-k algorithms and the basic theory of parallel programming MapReduce Model. Secondly, we put forward to the improved top-k algorithm and describe two core modules: word...
Combined with the Moon exploration, it builds the simulation scenario about the communication between Deep Station and Moon Detector. It analyzes the problems in the deep communication, such as: the big path loss, large delay and intermittent communication. Based on the analysis, it provides the methods to solve the problems and analyzes the effect for using the appropriate measures which can enhance...
With the analysis on hospital medical devices management operation, find the medical devices management style of many hospitals are still on the manual side, in lending, returning, warehousing and it bring many problems such as heavy workload, low efficiency, lack of intelligence. Combined with the technology of radio frequency identification (RFID) can rapid, high-volume, non-contact read the tag...
An improved RSA cryptosystem based on chaotic synchronization is newly presented in this paper. First, the design of a discrete sliding mode controller (DSMC) is proposed to make the master and slave chaotic systems synchronized, then a modified RSA encryption algorithm is proposed. In the traditional RSA cryptosystem, the public key needs to be open or transmitted in the public channel which provides...
An algorithm for link prediction in bipartite network is presented. In the algorithm, we first map the bipartite network onto a unipartite one called projected graph. Based on the projected graph, we define the concept of candidate node pair (CNP). We perform the link prediction only within the CNPs so as to reduce the computation time. We also define the pattern covered by the CNPs and the weight...
Tracking target in a long-term is still a big challenge in computer vision. In recent research, many researchers pay much attention on updating current appearance of tracking target to build one online appearance model. However, one appearance model is always not enough to describe historical appearance information especially for long-term tracking task. In this paper, we propose an online multiple...
Text theme is the key of text clustering, while the co-occurrence words can be very stronger to express text theme in document. This paper proposes a text clustering algorithm based on the text semantic representation and the graph structure of word co-occurrence on the basis of in-depth studying text theme mining and word co-occurrence. First, the algorithm constructs the text graph-structure according...
The software was developed to realize the braking calculation of self-designed low-floor trams throughadjusting parameters, such as the bogie number, the bogie type, vehicle parameters, electro-hydraulic braking parameters, foundation braking parameters and so on. In this software, the calculation of braking force, the brake cylinder pressure, the braking distance, braking time can be achieved. Thedistribution...
Haze is a common phenomenon in major cities in recent years, image taken in foggy weather are blurred inview, which seriously impact the application of traffic system and outdoor visions system. The haze image frequency, intermediate frequency, low frequency and spectrum image are analyzed separately first in the paper, and then by fixed Retinex light reflection model, a new haze image enhancement...
In order to mine the abnormal learning behavior of learner in virtual learning community and carry on personalized supervision and guidance, behavior filtering model based on the factor analysis of the behavior is constructed to solve the problem of the relationship between behavior factors in the learning behavior vector space model. In view of the disadvantage of neglecting local abnormal points...
Traditional classroom teaching is difficult to satisfy students' personalized learning. The main work of the thesis constructs knowledge point model which using relational model and constructs student model according to the students' interest characteristics, it uses improved k-means algorithm to analyze students' learning interest characteristics to dig out the interests of different students, and...
The maneuvering target tracking with the tracking in military and civil fields has important application value. Based on the design of single maneuvering target tracking algorithm the problem for the following research work. By preliminary analysis of the data to determine the target for frequent low-speed movement of maneuvering targets, in the actual movement model under the premise of the unknown,...
With the rapid development of information technology, the trend of media content production high-definition, media service mode diversification and intelligent terminal is gradually accelerated. The era of Ultra-High-Definition Television (UHD) video content production, distribution and consumption has arrived. In the proposed paper, we elaborate the new requirements UHD content protection in detail...
In order to research the properties of campus traffic networks, the paper designs the model of campus traffic network by the primal approach to describe five typical campus road traffic networks in China. Based on complex network theory, the averaged-degree, averaged-clustering coefficient, averaged-path length, network density, betweenness, network closeness and so on are computed and analyzed. The...
In this paper, a method is put forward to implement the automatic syllable segmentation of continuous Pumi speech with GABPNN, based on the two features of DWPTMFCC and fractal dimension. Concretely, speech signal is at first denoised by wavelet packet transform. Afterwards, for speech and non-speech frames, fractal dimension of each frame is extracted and labeled respectively. The same is also done...
Due to the huge scale and great diversity of large-scale mail archives, the extraction methods should not only be able to extract signatures and roles accurately without any training data, but also be general enough to work well with large-scale mail archives with different characteristics. To address this problem, first, we proposed an unsupervised language model based method to identify signatures...
ELM (extreme learning machine) algorithm has the advantages of fast learning speed, good generalization performance. It is not only suitable for regression, fitting problem, but also applies to the field of classification and pattern recognition. In this paper, ELM algorithm is applied to nonlinear function fitting. The performance and running speed with other algorithms are comparison, show the superiority...
This paper proposes a novel retinal vessel segmentation based on supervised method in color fundus images. To determine whether a pixel is the vessel pixel or not, 30 features are extracted for each pixel in the fundus image which consisting of features in Gaussian scale space, features by multi-scale Gabor filter and divergence of vector fields. Then we use the features obtained by the previous process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.