The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data-driven analytics and decision-making have been essential for numerous applications in our society. To transform the data into a source of rich intelligence and support decision-making, data-driven analytics often need to aggregate intelligence from multiple sources and disaggregate signals into significant constituents. Though many existing approaches perform these two tasks respectively, there...
Multi view technology is a hot spot in research of the current display, multiple viewpoints of freedom stereo display technology not only can let the viewer's feel lifelike three-dimensional effect, still can make the viewer from wearing the aid equipment trouble, which makes more and more colleges and universities, research institutes and companies engaged in multiple viewpoints freedom stereo display...
Most real systems consist of a large number of interacting, multi-typed components, while most contemporary researches model them as homogeneous information networks, without distinguishing different types of objects and links in the networks. Recently, more and more researchers begin to consider these interconnected, multi-typed data as heterogeneous information networks, and develop structural analysis...
In this study, we focus on extraction of latent topic transition from POS data. POS analysis is conducted to obtain the frequent pattern of customer's behavior. The fundamental method for POS analysis is to conduct market basket analysis. By doing Market basket analysis, the sets of products that are often bought at the same time can be extracted. In market basket analysis, however, the effect of...
Scripts have been used in different disciplines to characterize how individuals conceptualize the conduct of goal-oriented tasks. Cornish introduced this modelling approach to the field of environmental criminology as a more systematic way to identify offenders’ decisions during the commission of crime. Despite the growing number of articles about crime scripts, there is limited information about...
The total number of webpages has grown substantially since the birth of the Internet. So too have the number of webpages dedicated to radical yet subtle content. As these new circumstances have necessitated a guided data collection method, one that can sidestep the laborious manual methods that have been classically utilized, simple keyword analysis has not been sufficient to identify radical sites...
Provenance captured from E-Science experimentation is often large and complex, for instance, from agent-based simulations that have tens of thousands of heterogeneous components interacting over extended time periods. The subject of study of my dissertation is the use of E-Science provenance at scale. My initial research studied the visualization of large provenance graphs and proposed an abstract...
Association Rules is one of the data mining techniques which is used for identifying the relation between one item to another. Creating the rule to generate the new knowledge is a must to determine the frequency of the appearance of the data on the item set so that it is easier to recognize the value of the percentage from each of the datum by using certain algorithms, for example apriori. This research...
In microgblogs, a user usually follows or is followed by many other users. The content updating and reading is a complex process involving intensive interactions among publishers and readers. It also forms the basis of information diffusion in social networks. In the situation of massive followers, tweets reading would heavily depend on user behaviors and interactions. The tweets reading probability...
Summary form only only given. We consider the problem of assessing the significance of groups in high-dimensional data. In the case of supervised classification where there are data of known origin with respect to the groups under consideration, a guide to the degree of separation among the groups can be given in terms of the estimated error rate of a classifier formed to allocate a new observation...
In this paper, through by using the AHP (Analytic Hierarchy Process) method's basic theory analysis in online-teaching platform, analyzing ability of students' self-learning, and establishing the evaluation index system, according to expert criteria derived the value of influence factors. With it calculated every level index's weight by using the square root method, and implements the weight by given...
As meta-synthesis approach is proposed to deal with complex system problem, the problem solving process under the meta-synthesis workshop is of importance. This paper discusses the working process of the meta-synthesis workshop which could be expressed as a three-dimension process consists of problem solving, expert collaboration and knowledge discovery (PS-EC-KD). Then, we propose a framework of...
One of the key activities needed to construct a quality service-oriented solution is specification of the architectural elements. Selection of an appropriate and proven method for specification of the elements consisted of services, flows, and components is thus fundamental to successful service-oriented system development in an enterprise. Existing methods for service specification ignore the automation...
General network attack graph has a large state space. It affects the efficiency of network attack graph generation greatly. In order to solve this problem, a reverse search based network attack graph generation method is proposed. It starts from the target hosts that the goal of attackers, by analyzing the vulnerabilities and connectivity of them, finds all the middleman hosts, then repeats the search...
Department of Defense Architecture Framework (DoDAF) as a common integrated system architecture specification has already gained the widespread acceptance in the world. However, the limitations of its static descriptive form render it unable to support the further analysis for the dynamic behaves of complex integrated system. Therefore, an executable model is needed to fulfill the requirement of analysis,...
Archive is a collection of historical records which have been accumulated over the course of an individual and institution's lifetime. Archive is considered as an invaluable asset which provides us with an insight into the lives and circumstances of past generations. In this paper, we describe the workflow model of an archival management system adopted by Macau Historical Archives. To further analyze...
In this paper, papers about grey system recorded by CSSCI (1998 ~ 2007) are collected and analyzed with statistical analysis and bibliometric analysis such as year distribution, journal distribution, subject distribution, the core author and the geographical distribution of the author. So we can identify the core author, core journals, research institutes and the law of research on grey system in...
Active database systems integrate event-based rule processing with traditional database functionality. The model most widely used to represent event-based rules is the event-condition-action rule (ECA rule) model. However, the relationships among rules in the development of a base of ECA rules can fall in an infinite rule triggering: the No termination problem. In this article, an approach based in...
Most monitoring or tracking applications require the localization information in wireless sensor network. The DV-Hop provides a basic scheme to retrieve the localization without GPS information. DV-Hop scheme only uses the localizations of the reference nodes and the hop-count, so the fundamental estimation may cause the larger error than range-based schemes. The proposed scheme uses the neighbor...
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this context, concerns about meta-modeling and analysis techniques need to be augmented by technical concerns about how to reuse and how to build upon the efforts of previous research. MOOSE is an extensive infrastructure for reverse...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.