The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The communication between the teachers and students is very important in network education. Question-answering system can resolve the problem. This paper proposes a question answering platform in network education and then introduces the kernel module which is the answer extraction based on FAQ and ontology in detail. The paper describes the similarity algorithm between the student question and the...
As the virus has been spread without restriction, there needs an effective method to detect the virus. After analyzing the current detection methods of the virus, one method, which is on the basis of jump state, is proposed to analyze the malice behavior. From four aspects, such as the element definition, the simple regulation, the formalized description and the mapping-relation description, the formalized...
In this paper, a design plan of distributed logging diagram system based on the latest Windows communication foundation (WCF) technology is proposed, which can satisfy the demand on graphic drawing, data preparation and presentation of the logging drawing, and also is service-oriented. The server side services are designed as based on template architecture which could change database in configuration...
Information acquisition is an important part in the competitive intelligence system. With the development of network technology, network information has become an important information source of competitive intelligence acquisition. However, the complex and chaotic information on the Internet result in inefficiency of artificial collecting and processing intelligence. This paper has discussed the...
In terms of the requirement of storing and processing medical temporal information, the temporal DBMS technology is applied to the medical field. Research on the valid-time indeterminacy in temporal information is focused. Its representation and storage structure is solved. The query and processing of indeterminacy temporal data is realized by introducing a concept of ambiguity and using the probabilistic...
13 kind of nationalities crowds' data classification using hierarchical cluster (HC), rough sets (RS), principal component analysis (PCA) and its combination, the result shows: first, rough sets and principal component analysis can dimensionality reduction and de-noising; second, hierarchical cluster after rough sets (RSHC), principal component analysis after rough sets (PCARS), principal component...
In distance education, the elementary function of data management system is to handle the related data in network teaching in filtering, sorting and classification, and make it to be the useful information for management and decision-making. Through the analysis and comparison of the commonly used data management modes that mainly used for calculating the learners' learning information in network...
Extenics is a new discipline, it uses formal model research the possibility of expand thinking and the rules and methods of opening innovation and uses to solve the paradoxical problem of science. Extension data mining is a product combining Extenics with data mining. It explores to acquire the knowledge about extension transformations in databases, which is called extension knowledge, taking advantage...
The main purpose of this study is to develop a computer system for University Malaysia Perlis (UniMAP) staff to make claims via electronic media. Since this system is Web-based, staff can make claims anywhere, anytime and at any locations. This method can overcome not only human errors but also more efficient, fast and accurate. Therefore, this system can also save time, effort, and administrative...
In this paper we explore the capabilities of a framework that can use different machine learning algorithms to successfully detect malware files, aiming to minimize the number of false positives. We report the results obtained in our framework, working firstly with cascades of one-sided perceptron and kernelized one-sides perceptrons and secondly with cascade of one-sided support vector machines.
The data file of downloading records in the P2P downloading software contain the rich personal information. So mining and analyzing the useful clues inside has become a significant means and research area for the computer investigation and forensics. The Thunder which is the typical representative of P2P downloading software and the most popular in China has been emphatically analyzed in this paper,...
This paper did research on computer-aided clothing color design. A style-driven clothing color design method was presented, which realized the emotional design of clothing color. A style clothing color database was established, using color psychology theory and semantics to divide the semantic style space. An original form of the style-driven clothing color design tools has been established with VC++...
In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed,...
For searching an unsorted database with N items, a classical computer requires O(N) steps but Grover's quantum searching algorithm requires only O(??N) steps. However, it is also known that Grover's algorithm is effective in the case where the initial amplitude distribution of dataset is uniform, but is not always effective in the non-uniform case. In this paper, we will consider the influence of...
SQLTutor is an intelligent teaching system for Structured Query Language. Not only can it organize the teaching program through the online experiment, but it also integrates the learning resource, case demonstration, online discussion, and comprehensive test onto its experimental platform. Moreover, the greatest advantage of SQLTutor is that it can openly allow students to use different query languages...
In this study, the framework of a concatenative text-to-speech system for Turkish is built and its evaluation techniques, namely MOS, DRT and CT have been considered. Naturalness and intelligibility of the Turkish TTS system is tested by MOS and CT-DRT respectively. Although the system uses simple techniques, it provides promising results for Turkish TTS, since the selected concatenative method is...
Many organizations today have very large databases which grow at very fast rate. Efficient mining techniques are necessary to extract useful information from them. Performing classification on data streams with traditional classification algorithm based on decision tree has relatively poor efficiency in time and space. We made an attempt to create a model which will improve accuracy of classifier...
This paper proposes a new image based CAPTCHA test, activity recognition CAPTCHA. In this test the user is presented with a set of distorted images depicting a randomly chosen activity. The user has to recognize the common activity associated with the images and annotate it from a given list of activities to pass the test. The user studies indicate that this CAPTCHA can be solved with 99.04% average...
Parallel computing gradually applies in all kinds of fields, so the technology of paralleled computing based on Linux Cluster becomes a research and applied hotspot. This article designs and realizes the parallel computing environment based on Linux cluster after studying the key technology of cluster and parallel. Finally, the performance of system environment is tested and proved well.
The goal of cyber security visualization is to help analysts increase the safety and soundness of our digital infrastructures by providing effective tools and workspaces. Visualization researchers must make visual tools more usable and compelling than the text-based tools that currently dominate cyber analysts' tool chests. A cyber analytics work environment should enable multiple, simultaneous investigations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.