The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatically generating unit tests is a powerful approach to exercise complex software. Unfortunately, current techniques often fail to provide relevant input values, such as strings that bypass domain-specific sanity checks. As a result, state-of-the-art techniques are effective for generic classes, such as collections, but less successful for domain-specific software. This paper presents TestMiner,...
Index tracking has become one of the most common strategies in asset management. The index-tracking problem consists of constructing a portfolio that replicates the future performance of an index by including only a subset of the index constituents in the portfolio. Finding the most representative subset is challenging when the number of stocks in the index is large. We introduce a new three-stage...
Linkage of routine and administrative databases from multiple sources provides an advantageous form of understanding chronic diseases, such as arthropathy conditions. Data mining classification algorithms can be a cost-effective approach to identify patients' cohorts with certain disorders within these complex databases. However, selecting good potential predictors, given a certain condition from...
Data mining is to extract the potentially useful knowledge and information from large amounts of data. How to dig up effective, reliable, understandable, and interesting association rules from vast amounts of information to help people make decisions has become an urgent problem to be solved. People want to use a reasonable evaluation method to measure reliability or validity of association rules,...
One key issue encountered in endmember extraction is to determine the number of endmembers, p, required to be extracted. Virtual dimensionality (VD) has been widely used for this purpose. However, VD was originally developed and defined as the number of spectrally distinct signatures which are not necessarily pure signatures. So, on some occasions the VD estimated value for p may not be accurate to...
Along with the development of electronic and intelligence in the world's stock market advances, the accumulation of the stock data grows larger over time. It is of great concern on the ways to find the hidden rules of information in the mass of data. Given the background above, this paper explores the methods of data mining by using the combination of Decision tree algorithm and Clustering algorithm...
Based on the initial achievements made in Internet of Things, the hierarchical model of learning assessment will be constructed, applying both quantitative and non-quantitative evaluation standards, extracting key information that influences learning efficiency through data mining technique, formulating the weight of evaluation standards through analytic hierarchy process, diminishing the anthropogenic...
Two damage anomalous filters which were set up by BP neural network have been used to alarm the damage in structural members. After dealing with eigenparameter extracted from damaged and intact structure, different input data is considered for setting up different damage warning anomalous filters. Filter □: the first eight natural frequencies are chosen as input data of network. Filter □: one mode...
This paper tested relationship between corporate governance and audit fees in China Capital Market based on data mining technology. Using 232 observations by the end of 2009, the paper designed special applied regression of data mining to investigate the question. Final conclusions of data mining show that audit fees are positively relative to proportion of controlling stockholder and are negatively...
This survey paper categorizes, compares, and summarizes the data set, algorithm and performance measurement in almost all published technical and review articles in automated accounting fraud detection. Most researches regard fraud companies and non-fraud companies as data subjects, Eigenvalue covers auditor data, company governance data, financial statement data, industries, trading data and other...
As one of the most important problems in data mining, many studies have been done on mining outliers. However, mining outliers in high-dimension has not been well addressed. In this paper, the concepts of reference radius and local deviation index are defined. A novel algorithm OMHKLD based on single-parameter-k local density in high-dimension for mining outliers is proposed. According to a new clustering...
First, this article looked back upon the channels that the stock market affects the real estate's disbursement and made a brief literature summary on the effect that the stock market brings about to the real estate's disbursement. Next, the article put up a linear model on the basis of Modigliani life cycle model, which shows the stock market's effect on the real estate's disbursement, and carried...
In view of the problem of the non-uniform on bibliographic information standardization existed in the field of book publishing informationization construction, this paper brings forward a new method of automatic generation of test cases based on CNMARC standard. By using the principle of automatic machine to analysis the rules series based on CNMARC standard, and taking use of both decision table...
Theoretical bases are considered and the structure of the software package for calculation of queuing systems with the substantial role of the factor of time is grounded. Versions of a package are described.
Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to deploy new signatures without...
Better orderings of test cases can detect faults in less time with fewer resources, and thus make the debugging process earlier and accelerate software delivery. As a result, test case prioritization has become a hot topic in the research of regression testing. With the popularity of using the JUnit testing framework for developing Java software, researchers also paid attention to techniques for prioritizing...
Service life prediction is an important aspect of structural safety evaluation. Based on periodical or non-periodical testing results of existing structures, some comprehensive evaluation indices of time series can be obtained by reliability assessment or other evaluation methods. For the problem of remaining service life prediction, existing structures can be regarded as grey systems. Combined with...
This article has employed herein comprehensive variable DEA and traditional DEA to conduct comparative study of performance assessment of hospitals in various regions of China in 2007 to reflect the validity of DEA for hospitals of various regions. Studies indicate that comprehensive variable DEA has integrated advantages of traditional DEA and also made up for intrinsic disadvantages and defects...
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
With conventional regression test tools for Web applications, it is difficult to specify the values to be verified that are repeatedly output inside loop statements. This paper presents a method that automates a regression test of a Web application on the server side. This method makes it easy to specify values to be verified when we develop Web applications, and enables us to directly check the verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.