The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present analyzing mass data in network by data mining technology in order to detect intrusion has become focus of anomaly detection research. In order to improve quality of intrusion detection, an improved anomaly detection algorithm is proposed in this paper. Firstly the training data set is converted to the standard unit features metric space, then the improved algorithm is used to divide the...
Aiming at the problem of low efficiencies for frequent item sets mining based on FP-Tree, which need a great lot of recursion call. This paper proposes another mining algorithm which uses a improved data structure named node linked list FP-Tree (NLFP-Tree). NLFP-Tree compresses the FP-Tree greatly by record the node's prefix path using node linked list. And mines frequent item sets by bottom-to-up...
Low support makes dramatic increase in the number of itemsets and brings less efficient frequent itemset mining. Correlation measures introduced to restrict the number of frequent itemsets generated in order to improve the efficiency of mining under certain conditions. An improved FP-Tree algorithm using node linked list FP-Tree is proposed. This algorithm exploits efficient pruning strategies using...
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper proposed a new secret sharing scheme. In the scheme, the participants themselves select the private keys, which can avoid the distributor's fraud and reduce the distribution's burden...
The theory and statistics of clustering are introduced. The clustering based on the weighted distance is applied to cluster hydraulic press. This clustering method is proved applicable by the analysis of example. Clustering by longest distance is compared to clustering by shortest distance and the former is more suitable to solve the clustering task of hydraulic press.
There are a large number of accessible deep Web sites on the Internet. However, even if identical entity has different representation formats on different Web sites. So entity identification plays a crucial role in deep Web data mining. This paper proposes an entity identification method in the field of Chinese books. First, using improved Jaccard coefficients to calculate similarity of text attributes...
In this paper, we provide the degree reduction algorithm for negative degree Bezier curves. By the uniform parameterization of control polygons and the definition of discrete derivatives of piecewise linear functions, we prove that the degree reduced control polygons and their discrete derivatives converge in the limit to the original negative degree Bezier curve and its continuous derivatives.
The characters of FLASH memory are low-power, long-lived, deep storage density, adapted to strict environment, nonvolatile and the price is decreased, because of these reasons, it is wildly used. However, there are some inherent particularities: low writing speed, bad blocks exist when produced and could generated with using and so on. A new bad block management algorithm is proposed in this paper...
Computer aided language teaching model for College English is considered and demonstrated in this paper. Based on the 5-year teaching reform experiment, the experience and data are mentioned and analyzed to confirm the effects of computer-based teaching model. The results of the teaching reform indicate that the new model is acceptable, feasible and effective in the process of College English teaching...
Metaphor as part of the cognitive linguistic theory has penetrated into different fields and different styles of discourses. It can be found in almost all kinds of styles of writing discoursed. By studying the developing stages of metaphor, especially by analyzing different kinds of usage of the conceptual metaphor in cognitive linguistics, this paper finds that conceptual metaphor in cognitive linguistics...
Negotiations are among the most common ways that agents in a multi-agent system use to reach agreements. Because negotiations commonly are multi-lateral and multi-issue, these processes become more difficult. In the real world applications this becomes more important where the autonomous agents involved in a negotiation should reach maximum payoff in minimum time. In this work a new negotiation mechanism...
Based on the p-ary subdivision rules for B-splines, we show how to design more general subdivision schemes that preserve the B-spline smoothness exactly or almost. We illustrate the technique with new 4-point C5 binary, 4-point C3 ternary and C4 ternary subdivision schemes.
Extenics is a new discipline, it uses formal model research the possibility of expand thinking and the rules and methods of opening innovation and uses to solve the paradoxical problem of science. Extension data mining is a product combining Extenics with data mining. It explores to acquire the knowledge about extension transformations in databases, which is called extension knowledge, taking advantage...
Ontology mapping has been widely used in ontology application, but the similarity calculation becomes a thorny issue in the process of ontology mapping. In this paper, the different elements of ontology are considered. Semantic similarity and concept similarity are integrated to get the ontology similarity. During the similarity calculation of the concept attributes, filter strategy is used to reduce...
A new algorithm for clipping a line segment in two dimension against a rectangular window is presented in this paper. The algorithm are different to the others of line clipping algorithms. This algorithm use the affine transformations (Shearing transformations) to transform the line segment and the window, which make the process of clipping the line segment very simple and avoid solving the equations...
With biomedical literature continually expanding, searching PubMed for information about specific genes becomes increasingly difficult. Not only are thousands of results returned, but gene name ambiguity leads to many irrelevant hits. As a result, it is difficult for life scientists and gene curators to quickly get an overall picture about a specific gene from the literature. To alleviate this problem,...
The forecast system of water atomized alloy powder's quality is an incomplete information system because of its incomplete original data. In view of the incomplete system, based on the analysis of variable rough set and set pair analysis, a new kind of generalized rough set based on set pair situation tolerance relation was proposed in this paper, and was used in the system modeling. By regulating...
With the operator representation of Bezier curves, we first derive the sufficient and necessary conditions of a ruled surface being a developable surface, where the ruled surface is generated from two Bezier curves of degree m and n respectively as its boundary curves. Then we present a new method for designing the developable surface of degree (2, 3) with four corner points and one free control vertex...
In isotonic regression we always suppose that the means are restricted by center order. But if the order imposed on the alternative is in question, one may wish to test this order restriction as the null hypothesis with an unrestricted alternative. So this paper study this problem.
Ontology as the hot point in information field, it is always discussed and researched widely in the academic area. The research of converting thesaurus to ontology is going on for many years. In this paper, we mainly discussed the relationship between thesaurus and ontology, and the application of thesaurus in building ontology. The four essential elements relating to ontology research are also mentioned...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.