The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research aimed at integrating data from remote sensing resources and machine learning for developing a forecasting model of successful royal rainmaking operation in the upper north provinces of Thailand. The Support Vector Machine (SVM), neuron network method, and decision tree (C4.5) were used for data integration and forecast modeling. The data were collected between 1 January 2012 to 31 December...
In this paper, a T-LET planes measure is applied to manage the task scheduling for multiprocessors. First, a novel scheduling algorithm on T-LET planes is proposed, and it is based on the strategy that the biggest M tasks, within the current remaining execution time, are first selected. Secondly, the algorithm has proved as an optimal multiprocessor scheduling algorithm for assigning tasks and currently...
With the popularity of Internet applications, security issues of Web become increasingly prominent. The tampering contents and embedding Trojan in public Internet website will seriously affect the public image of the government and enterprises, and result in significant economic losses and adverse social impact. To solve the above problems, we researched and developed a Web tamper-resistant system...
In order to make the service composition with lower consumption resource and reduce execution time of service composition process, this paper proposes a method to optimize service composition model based on analysis of service composition execution log information and optimization of its Petri net model, which includes three steps: firstly, the log information and extracting related data are collected;...
With the continuous development of cloud computing, virtual desktop solutions are becoming more sophisticated. But the virtual desktop transmission system is still unable to guarantee the quality of remote video transmission service which has the characteristics of real-time and continuous. In order to improve the performance of remote video transmission system, an adaptive control mechanism for video...
Automobile bumper and energy-absorbing box are the most important parts for automobile passive safety and play an important role in the safety of automobile crash. In order to improve car crash safety and reduce fuel consumption of vehicle, in this study we analyze the deformation and endoergic process of energy-absorbing box during the collision based on the software ANSYS/LS-DYNA. Taking automobile...
Hadoop has become the de-facto big data processing framework. Since the success of Hadoop in large data set processing, more and more companies and organizations tend to build their analysis logics into Hadoop stack and share across different develop teams for cost-effective. Hadoop now undertakes not only the original batch computation but also lowlatency online queries. However the Hard Disk Drive...
In recent years, the application of quantitative investment in China stock market attracts more and more attention, and an important step in the quantitative investment is the acquisition of stock data, including each stocks daily data, markets daily data as well as the fundamental data, etc. There are more than two thousand shares in stock markets of Shanghai and Shenzhen, and each share's data information...
Processing of stream data attracts more and more attention of many big companies and organizations. Storm is a well-known distributed stream processing system that is often used for real-time analysis, online machine learning, continuous computing, distributed remote process call (RPC), etc. In this paper, we study the default scheduler of Storm and other implementations of customized scheduler to...
With the development of the Internet of things, more and more sensors appear in our lives. However, at present these sensors are mostly working in isolation. If sensors that have similar or overlapped function can be linked to work together, we can greatly increase the scope and accuracy of perception. This article mainly focuses on the research and implementation of collaborative linkage mechanism...
This article designs models and uses computer technology to examine three oscillators in stock market: the Moving Average Convergence Divergence (MACD), the Relative Strength Index (RSI) and the Stochastic Oscillator (KDJ). Based on the 8-year data of Shanghai (SH) Stock Index and Shenzhen (SZ) Stock Index, a buying and selling stock model is built by satisfying all of the three oscillators above...
I/O characteristics are vital to application development and orchestration of storage system. Users and system managers usually perform I/O optimizations to applications and file systems according to I/O characteristics of parallel applications. In this paper, we first investigate the overhead of FTracer, which is a I/O characterizing tool proposed in our previous work. Then we tune the parameters...
The conflicts between the miniaturization of optical remote sensor and the high resolution force us to build an end-to-end simulation system, and optimize the process of the image acquisition and processing. In this paper, based on the analysis of MTF models of each link in imaging chain, a scientific visualization method of end-to-end optical remote sensing process using MTF models is presented....
Based on the analysis of value chain, industry chain and stakeholders about the video service website, by building the profit pattern model, this paper analyzed the profit model of the existing main video websites. The video sites need to do something from the following aspects for profit: first, they should optimize the structure of profit model; secondly, they should extend the value chain and increase...
To improve the accuracy of prediction of sub-cellular location, a new method using kernel linear discriminant analysis with combinational kernel function which is made up of the Gauss kernel function and the polynomial kernel function is used to the predict the sub-cellular location. In order to confirm the reliability of the research, the data used in this paper are from the standard data set included...
The efficiency research about protein sub-cellular localization has become a hot topic recently. Feature extraction plays an important role in the accurate classification or location of proteins. Since the contribution of each feature dimension is different, this paper enlarges the contribution of feature dimensions which have great effect on classification by weighting with its Fisher linear discriminant...
This paper presents a model for location anonymous area estimation, which establishes the related Bayesian inference network by making full use of the time-varying characteristic of person traffic or vehicle traffic, thus implementing the dynamical estimation method of minimum anonymous area. Integrating the real data, the method makes the prediction, therefore it is more accurate. The model in this...
Starting from influential factors of fixed traffic bottleneck and choosing appropriate identifying indices for fixed transportation bottleneck, we get MapReduce parallelized processing method of K-means clustering algorithm after full investigations on parallel programming pattern and clustering algorithm; Finally, the recognition approach for fixed traffic bottleneck is proposed based on K-clustering...
The identification of high-obfuscation plagiarism seeds is one of the most difficult problems to be solved in plagiarism detection. Single feature type cannot identify the plagiarism seeds effectively because of the varied plagiarism methods used in high-obfuscation plagiarism. In this paper, a multi-features fusion method based on Logical Regression model for the high-obfuscation plagiarism seeds...
The relationship between med-long term load forecasting and socio-economic indicators is very difficultly described by an accurate mathematical model. So load forecasting needs to dig out few dominant factors from lots of socio-economic indicators. By introducing data mining technology into the association analysis of China's electricity consumption growth, many socio-economic indicators since 2000...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.