The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ability to extract frequent pairs from a set of baskets (or frequent word co-occurrences from a set of documents) is one of the fundamental building blocks of data mining. When the number of items in a given basket is relatively small the problem is trivial. Even when dealing with millions of baskets it is still trivial providing that the number of unique items in the basket set is small. The...
Distributed and Parallel algorithms have attracted a vast amount of interest and research in recent decades, to handle large-scale data set in real-world applications. In this paper, we focus on a parallel implementation of KD-Tree based outlier detection method to deal with large-scale data set. As one of the state-of-the-art outlier detection methods, KD-Tree based has been approved to be an effective...
To meet the needs of desire of using natural language to describe data analysis, this paper combines ideas of both fuzzy query language and linguistic summaries, introduces fuzzy set theory and presents a more powerful algorithm based on relational database, which can find fuzzy rules among crisp data. As a result, an automatic fuzzy rule extraction system is developed, which can support users extract...
It is a frequently encountered problem to calculate the area of target region in image processing. Based on an improved algorithm of contour extracting, a method for calculating the area of target region was advanced. First, the contour is extracted from the binary image, while note the location and type information of the contour points. Next, the area of target region is calculated by weighting...
Online hot topic detection is a significant research field in web data mining, which can help people make policy decision or benefit to people's daily life. Actually, in recent years more and more hot topics are arising from BBS, often referred as online forum. BBS provide a communication platform for people to discuss and express their views. It's obvious that forecasting the hotness topics on BBS...
This article did some innovations and exploration in the planning and exploiting course of individuation study system: in the subjective judgment module, we present the prefix and suffix BM algorithm. This algorithm imported the prefix comparative thought and the next character's information in QS algorithm, and when there are no matched characters in the matching course from right to left, it will...
The new generation of high-performance decimal floating-point units (DFUs) is demanding efficient implementations of parallel decimal multipliers. In this paper, we describe the architectures of two parallel decimal multipliers. The parallel generation of partial products is performed using signed-digit radix-10 or radix-5 recodings of the multiplier and a simplified set of multiplicand multiples...
In this paper we present a sorting algorithm, which uses the methodology of indexing in insertion sort efficiently to give a much better performance than the existing sorting algorithms of the O(n2) class. We prove the correctness of the algorithm, detailed time complexity analysis and applications of the algorithm.
An algorithm for computing the convex hull of scattered plane point set through the extreme points on the boundary of plane is proposed. According to the extreme points, the plane point set is divided into five zones. The four zones on the boundary contain all convex vertexes. By computing extreme points of subsets in the four marginal zones, a polygon that contains all convex vertexes is obtained...
Ontology definition is the base of ontology engineering, however, ontology definition currently seldom provides the accurate mathematical characteristics, namely, most of the ontology definitions cannot be described in a formal way, and the existing ontology definitions aren't complete enough. In this paper, it reviews and sums up the ontology definitions and the formal descriptions of ontology. And,...
Aiming at the cultural relic exhibition problem in virtual museum, the tactile rendering technology for epigraph and inscription exhibition is suggested. With the tactile display technology, one can not only see the real relic, hear explication, but also touch the cultural relic with his finger when he explores the virtual museum. The principle of the virtual tactile rendering system is illustrated,...
The data structure diagram is abstracted from the diagram of railway yard signal arrangement. HBACA (hybrid behavior based ant colony algorithm) is presented to search the shortest route of railway yard. The route searching program based on HBACA is developed. The graphical representation of railway yard is given on the console. According to the designated beginning node and the designated ending...
In wireless sensor networks, the preloaded program code and data on sensor nodes often need to be updated due to changes in user requirements or environmental conditions. Sensor nodes are severely restricted by energy constraints. It is especially energy consuming for sensor nodes to update code through radio packages. To efficiently update code through wireless radio, we propose an algorithm, reprogramming...
A mouse or keyboard is widely used as an input device for operating computers. However, because these devices are hand controlled, handicapped people who can hardly move their hands are unable to operate computers. In this study, we propose a novel interface that controls the cursor on a screen with a 3-dimensional voice pointing device. This pointing device can estimate the 3D position of the user's...
In this paper the authors propose a novel method for tracking the maximum power point of a PV array. This method is derived by the well known incremental conductance method and the novelty consists in varying the duty cycle of the DC-DC switching converter used as MPPT tracker using a variable step size instead of a fixed step size. A practical way to determine the minimum and the maximum values of...
A new discrete array signal is proposed, which is punctured binary array pair with two-level autocorrelation (PBAPT). The spectrum characters and some combinatorial admissibility conditions for PBAPT searching are given. The research results show the fact that PBAPT extends the scope of discrete array signal and enrich the theory of punctured array pair signal.
This paper analyses the expression of digital symbol and calculation of number system, and develops 2n based number system whose digital symbol can be easily expressed with built-in data type variable in high-level programming language. By researching the characteristic of scalable queue templates in Visual C++ template library, it gives the implementation scheme of unlimited integer class based on...
Artificial intelligence chatbot is a technology that makes interaction between man and machine using natural language possible. In this paper, we proposed the architectural design of virtual dietition (ViDi), a chatbot that will function as virtual dietitian for diabetic patients. A general a history of a chatbot, a brief description of each chatbots is discussed. We proposed the use of new technique...
The article introduced the structure and technology method of the auto test system based on PXI bus, for the core equipment of the aircraft telemetry system, requiring high work reliability. The article detailed the key technology about PCM decoding, data recording and real-time display. The validation of the final technology index was realized by computer making real time analysis and post analysis...
The protection mechanism of natural immune system brings us great inspiration for the design of computer intrusion detection and it supports an information security technology which can solve complex intrusion problem. All of above made computer immune become an attentive problem. In this paper, we offer a new anomaly intrusion detection algorithm which can generate effective detectors and detect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.