The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to meet the needs of China higher education of training students with strong foundation ability and innovation in the filed computer science, in recent years, the computer basic teaching team of Beijing Jiaotong University has carried out a series of scientific and effective educational reforms research and practice: 1. Carrying out “MOOC + SPOC + Flipped classroom” practice; 2. Construction...
An improved KNN text classification algorithm based on Simhash has been proposed by introducing Simhash and the average Hamming distance of adjacent texts as a unit, which solves the problems caused by data imbalance and the large computational overhead in the traditional KNN text classification algorithms. Experimental results demonstrate that the proposed algorithm performs a higher precision, a...
Large-scale streaming URLs are the norm in many commercial software products that aim to filter URLs based on their sensitivity or risk level. In such problem scenarios, filtering is typically done by classifying a URL using either its webpage content or certain additional contextual information. However, such approaches are slow and computationally expensive, as they require gathering and processing...
Many telecommunication companies today have actively started to transform the way they do business, going beyond communication infrastructure providers are repositioning themselves as data-driven service providers to create new revenue streams. In this paper, we present a novel industrial application where a scalable Big data approach combined with deep learning is used successfully to classify massive...
Zero shot learning (ZSL) provides a solution to recognising unseen classes without class labelled data for model learning. Most ZSL methods aim to learn a mapping from a visual feature space to a semantic embedding space, e.g. attribute or word vector spaces. The use of word vector space is particularly attractive as compared to attribute, it offers vast auxiliary classes with free parts embedding...
Teaching in university engineering departments is currently facing a number of challenges, especially for those involved in the most innovative and dynamic areas of information and communication technology. Learning model developments that place greater weight on laboratory activities require investment in specific equipment that is often very expensive, difficult to manage, and soon obsolete. This...
With the development of Internet, the amount of Information has been rapidly growing which is spread widely. In order to improve the value and accuracy of science information that is pushed in this paper, an intelligence dichotomous method for science information categorization to identify science information from massive Web news is presents. During the experiment, 85.3% recognition rate of the recognition...
Smoothing is one technique to overcome data spar-sity in statistical language model. Although in its mathematical definition there is no explicit dependency upon specific natural language, different natures of natural languages result in different effects of smoothing techniques. This is true for Russian language as shown by Whittaker [2]. In this paper, We compared Modified Kneser-Ney and Witten-Bell...
Hierarchical models becomes one of the most widely-adopted and effective solutions in organizing large volume of documents. Although there are general taxonomies on the Web, we observe that in most cases there will be many inconsistencies between general taxonomy and specific resources as the generation of taxonomies is independent of the resources. Besides with the newly available resources into...
This paper presents the experience in implementing the curriculum of the Training Program in Computer Science Degree for the Social Management of the Bolivarian University of Venezuela which is based on project-based learning as a means of integration of training university in accordance with the needs of the country. The axis modular curriculum is integrated into the basic unit, called the project,...
This paper implemented a network traffic classification method on the basis of Guassian Mixture Model-Hidden Markov Model using packet-level properties in network traffic flows (PLGMM-HMM). Our model firstly builds PLGMM-HMMs via two packet-level properties, inter packet time and payload size, respectively; then, we construct the estimation function by computing the F-Measure value through classifying...
As the teaching reform of basic computer science grows, the course requirements have become increasingly higher. This paper analyzes the necessity for implementing individualized teaching models and introduces the process of carrying out the individualized teaching of basic computer in the past two years. We have explored and experimented with a three-scaled individualized teaching model from the...
Detecting anomalous traffic on the Internet has remained an issue of concern for the community of security researchers over the years. Advances in computing performance, in terms of processing power and storage, have allowed the use of resource-intensive intelligent algorithms, to detect intrusive activities, in a timely manner. Naïve Bayes is a statistical inference learning algorithm with promise...
With the high development of Internet, e-commerce websites now routinely have to work with log datasets which are up to a few terabytes in size. How to remove messy data timely with low cost and find out useful information is a problem we have to face. The mining process involves several steps from pre-processing the raw data to establishing the final models. In this paper we describe our method to...
We propose in this paper a new contextual modelling method for combining syntactic and structural information for the recognition of online handwritten mathematical expressions. Those models are used to find the most likely combination of segmentation/recognition hypotheses proposed by a 2D segment or. Models are based on structural information concerning the layouts of symbols. They are learned from...
After a brief analysis to the information spreading mode under internet-based micro-blog platform, it quickly classifies and audits the related mirco-blog content in the spreading process in this paper. Then, by analyzing the sender's mood tendency to some specific topics in the content of micro-blog message, it proposes a content audit model under the micro-blog service platform. Furthermore, by...
Nowadays, college English teaching and learning is attached greater and greater importance. In 2004 and in 2007, the Ministry of Education issued "College English Curriculum Requirements" respectively. Both versions emphasize the importance of applying modern information technology into college English teaching and more attention is paid to students' main position and teachers' leading role...
News event modeling and tracking in the social web is the task of discovering which news events individuals in social communities are most interested in, how much discussion these events generate and tracking these discussions over time. The task could provide informative summaries on what has happened in the real world, yield important knowledge on what are the most important events from the crowd's...
Wireless and in particular 802.11 is one of the major technologies for accessing the Internet at home, in coffee shops or other public places, and in enterprises and university campuses. While most recent work on modeling wireless sites focuses on user mobility, this paper presents and compares a number of models for characterizing access point (AP) usage; moreover, rather than looking at throughput...
The emergence of mashup is gaining tremendous popularity and its application can be seen in a large number of domains. Along with the development of mashup technology, several mashup editors have been produced by the industry which can assist users to build mashups. However, with the increasing service and information sources distributed across the entire web space, even an easy to use mashup editor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.