The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
P2P has become an important traffic form of current Network, and P2P identification has been a hot research in Network monitoring & management area. In order to tackle the problem of P2P data encryption persecuting P2P identification, in this paper, a traffic identification method for specific P2P based on multilayer tree combination classification BP-LVQ Neural-Network was proposed, baseing itself...
Early ID3, C4.5, CART and the other decision tree algorithms are no longer met the situation of massive data analysis for the time being. Those algorithms has the same limitations that they can not handle the updated data sets dynamically and the decision tree generated by these algorithms need to be purned. These weaknesses limit the use of the above-mentioned algorithms. So a novel parallel decision...
Text Classification is an important research area in Chinese information processing, whose goal is on the base of analyzing the text content to give the allocation of one or more of the text to more appropriate classes to enhance the text retrieval, storage, applications such as processing efficiency. In this paper, text dataset is transformed to information system without attribute of decision making...
Traditional Mining Frequent Pattems algorithms will construct lots of projected databases and generate lots of patterns with short length in the process of mining which cause the low efficiency of mining. In order to overcome the shortcomings of traditional algorithms, a fast and efficient algorithm SSPM was proposed. We used longer pattems for mining, which avoided producing lots of patterns with...
Based the analysis of the deficiency existing in current neural network ensemble method, a new method based on sort learning algorithm was proposed, which contains several predictors. This is true provided the combined predictors are accurate and diverse enough, which posses the problem of generating suitable aggregate members in order to have optimal generalization capabilities. According to the...
In order to classify the disease from the clinical database, according to the characteristic of disease in rough relational databases, a method to classify the disease was put forward. Firstly, to collect the disease symptom model information table from the clinical database; secondly, symptom typical characterizing using accuracy; thirdly, classify the disease based on a novel rough distance. The...
In 2009 China Enterprise Informatization composite index 40.46, China's overall informatization companies in the lower-middle maturity state. At present, most Chinese enterprises are in the transition period which means from the informatization critical application phase to the expansion of integration and optimization phase. The transition period is the critical period of the improvement of the maturity...
In the current thinking of the Chinese text clustering, most clustering algorithms are limited by the data's scalability and the results' interpretability. This paper presents an efficient Chinese text clustering method based on semantic concepts. This method, proceeding from the text itself, by using classified hierarchy Subject Word in Thesaurus of Modern Chinese, extracts the conceptional tuple...
To solve the problem of huge computation in the solution process of using Hough Transform (HT), an improved HT algorithm based on Freeman criteria has been presented and used to locate window region for the envelope image successfully. The improved algorithm detects the whole image using a template with size of N*N and the center pixel of template, replacing other pixels in template, is calculated...
Malicious web pages are a widely-recognized threat to the security of the web. Malicious web pages launch so-called drive-by download attacks that are able to gain complete control of a user's computer for illegitimate purpose. Even a single visit to a malicious web page enables an automatically download and installation of malicious malware executables. In this paper, we propose a novel approach...
Aiming at the problems of partial occlusion and background clutter in the examination room, we propose a method for behavior detection using spatial-temporal shape and flow correlation. The method first extracted training templates using interactive video cutout technique, and automatically segmented the video into 3D spatial-temporal volumes using improved Mean Shift algorithm. Then we slide the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.