The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decision tree is a good model of Classification. Recently, there has been much interest in mining streaming data. Because streaming data is large and no limited, it is unpractical that passing the entire data over more than one time. A one pass online algorithm is necessary. One of the most successful algorithms for mining data streams is VFDT(Very Fast Decision Tree).we extend the VFDT system to...
Construct one kind of new strengthening buffer operator which is close to the law of indices, and the examples have shown that the new strengthening buffer operator can enhance the forecasting simulation precision of GM(1,1) in shock disturbed system. When disturbance from the factor of the shock disturbed system affect to the primary data, then can use the new strengthening buffer operator to eliminate...
Naxi pictograph is a Tibeto-Burman, and it is the only pictograph in use nowadays. The traditional national minority language network information processing downloads through the ActiveX technology the typeface as the card the client side, after the installment only then can browse normally contains the national minority language homepage, this mode efficiency low also takes the massive networks resource...
As CMOS technology enters sub-micron era, a large number of intelligent properties (IPs) are integrated on a single chip (SoC). The communication patterns become difficult to model. At the same time, as transistors become small and wires become narrow, delays are becoming more and more unpredictable. The factors greatly challenge traditional on-chip buses and point-to-point interconnects because of...
The purpose of this paper is to design a scheme for building an integrated information system for urban transportation which is based on the existing Metropolitan Area Network, road camera and other existing urban transportation facilities. First of all, the system adopts and integrates the technology of computer vision, digital image processing technology, database technology, communications technology,...
Residuated lattice is an important non-classical logic algebra, and L-fuzzy rough set based on residuated lattice can describe the information with incompleteness, fuzziness and uncomparativity in information system. In this paper, the properties of L-fuzzy rough sets based on residuated lattice are given as the expansion of ref.
Clothing comfort is a state of satisfaction indicating physiological, psychological and physical balance among the person. Subjective experiment is rated an end-use performance test to collect the comfort sensation of wears. In this paper, 20 samples are chosen including 10 kinds of coolmax/cotton double-faced effect knitted fabrics for sportswear developed by Textile Institute of DongHua University...
Through extensive simulations, we found that the mobility in mobile ad hoc networks (MANET) can induce persistent packet reordering. In this paper, we present a set of simple modifications to the TCP protocol to improve its performance to mobile-induced packet reordering in MANET. The new protocol based on the simple idea of delaying the triggering of congestion response algorithms for a short time...
Peer-to-Peer (P2P) technologies are considered as one of the fundamental technologies for the next generation Internet. P2P systems are classified into unstructured P2P systems or structured P2P systems depending on their topological structure of network. Most structured P2P systems are based on Chord protocol that is designed by using Distributed Hash Tables (DHTs). However, some issues have not...
DOD architecture framework (DODAF) can describe not only operation activities in military field, but also composition of system in non-military field. By studying DODAF, description and analysis methods of it are abstracted in this paper, and information system architecture framework is proposed from view of non-military. In this framework, fourteen products that describe information system architecture...
An improved cost proxy model is established in the following, where the extreme imbalance between urban and rural area as well as complicated geographic environment of China was taken into consideration. On the one hand, new parameters were introduced into scene variant vector so as to prescribe urban and rural differences and also topographical differences. On the other hand, in order to analyze...
This paper discusses the application of open community for the emergency information services during a disaster with the lessons learned from the 2008 Sichuan earthquake. An open community approach enables open participation for information collection and sharing. The suggested ldquodual modelrdquo allows a two-way-traffic from citizens to officials and from officials to citizens. The latest Web services...
This article introduces a new intelligent online test system, whose obvious difference with the traditional test system is that this test system does not based on the question bank, all test questions are produced automatically by questions-providing algorithm, providing explanation process of test question automatically by questions-solving algorithm simultaneously. The test questions that the system...
We introduce the problems existed in the traditional networks, analyze the reasons of causing these network problems and pint out the key reason is that there is permeable vulnerabilities in the network system. The concepts and the attributes of tru-network are given. The tru-network is that the behaviors and the results of network are predictable. The three attributes of tru-network are trustworthiness,...
Certificateless public key cryptosystem overcomes the problem of the certificate management in the certificate-based public key cryptosystem and the inherent key escrow problem in the identity-based public key cryptosystem. Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step with lower computational costs...
Image fusion technique has been widely applied to remote sensing image analysis and processing and the aim of the image fusion is to integrate the characteristic information of each image. By uniting the useful information a new image can be formed to improve the visual impression, and one can get a more accurate, comprehensive and reliable description for the same scene. In the traditional IHS transform...
Based on the models of image motion blurring and restoring, the element of image blurring caused by rotation motion is analyzed. Three widely used methods for the identification of blurred extent from the rectilinear motion blurred images, Fourier transform, error-parameter curve, and autocorrelation, are introduced in rotation motion blurred image analysis. The feasibility and effectiveness of the...
In recent years, many new technologies have been developed for fault diagnosis of marine main engine, including intelligent fault diagnosis. This paper focuses on the application of support vector machine (SVM) on fault diagnosis of marine main engine mechanic shafting system, and we use simulation to test the effectiveness of such application.
Supplier selection is a multi-criteria decision making problem which includes both qualitative and quantitative factors. In order to select the best suppliers, it is necessary to make a trade-off between these tangible and intangible factors some of which may conflict. When business volume discounts exist, this problem becomes more complicated, in these circumstances, buyer should decide about two...
In content-based image retrieval, the method based on salient points detection is one of the most active research areas for it can represent the local properties of the image. This paper proposes an improved salient points detector based on wavelet transform which can extract salient points more exactly. Then, an annular segmentation algorithm based on salient points distribution is designed, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.