The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developed modification data clustering algorithm for multispectral image segmentation based on their specific opportunities to allocate individual objects or spatial domain with specific spectral properties.
Association Rules is one of the data mining techniques which is used for identifying the relation between one item to another. Creating the rule to generate the new knowledge is a must to determine the frequency of the appearance of the data on the item set so that it is easier to recognize the value of the percentage from each of the datum by using certain algorithms, for example apriori. This research...
Aiming at the problem of low efficiencies for frequent item sets mining based on FP-Tree, which need a great lot of recursion call. This paper proposes another mining algorithm which uses a improved data structure named node linked list FP-Tree (NLFP-Tree). NLFP-Tree compresses the FP-Tree greatly by record the node's prefix path using node linked list. And mines frequent item sets by bottom-to-up...
The research on Information Extraction (IE) aims at providing more powerful information access tools to help people overcome the problem of information overloading. In this paper, the basic IE methods are summarized based on domain ontology. The ontology-driven IE model is elaborated in detail. Moreover, the features of ontology-driven IE are compared with those of document-driven IE. Then the performance...
Data mining techniques have been applied to educational research in various ways. Given a large sample of learning logs, it is common for sequential mining to return a large number of patterns, only a portion of which are educationally meaningful. In this paper, we proposed a constraint-based pattern filtering method to help researchers discover meaningful, interpretable, and relevant patterns by...
Knowledge discovery in Databases (KDD) frequently faces the need of making the granulized dataset consistent for the continuous database. Common techniques used in granulization are equal width interval (EWI) and equal frequency interval (EFI). However, they may produce different results in terms of the number of conflicting records in a granulized dataset. In Wu's research, the data inconsistency...
Controlling the space consumption and improving the precision of mining result is two challenges of frequent patterns mining in data stream. The parameter ?? which denotes the maximum error is widely used to reduce the space consumption. In this paper, we firstly propose a computational strategy for identifying maximum error, consist of resource awareness and polynomial approximate, and then propose...
We study the problem of substitution of components in a composite service, especially in the setting where the substitute is composed in an asynchronous fashion. By asynchronous composition, we mean that the participants in the composition are not required to synchronize on the input/output actions as long as the input to one participant always follows the corresponding output from another. We show...
In this paper, the framework of finding abnormal behaviors based on patterns was proposed, including preparing data, extracting patterns and finding abnormal behaviors. Then, data preprocessing was introduced in the process of finding patterns, the standard of patterns was defined, the mining algorithm of abnormal behaviors was put forward, and the implementation procedure was described in detail...
An early and prominent employee of Google, Georges Harik, recently made the assertion that pairs working together in startups are 20 times more productive than individuals working alone. The author has also personally experienced the boost of what is here termed pairwork in a university setting during the startup phase of several educational and interdisciplinary initiatives. The paper briefly explores...
Highlighting two higher education institutions that have been identified as exemplary in preparing engineering undergraduates for 2020, this work in progress paper focuses on what these institutions are doing to prepare their students. Using case study approaches, findings suggest that engineering undergraduate students gain contextual competence, design and problem solving, and interdisciplinary...
This paper examines the exact solution for combining multiple Gaussian mixture (GM) estimates of a state vector, methods for order-reduction of the resulting GM, estimating the likelihood of each source GM, and for classifying sources as good (in agreement) or bad (biased or false/spoofed). Together, these allow combining estimates from GM sources in a way that guarantees some false-rejection probability...
English learners typically have vocabularies that are dominated by nouns, whereas naturalistic observations, parental checklists and word mapping experiments reveal that verbs, primarily action words, are acquired early and in large quantities by learners of Mandarin Chinese. However, little research has examined whether English and Mandarin learners' early comprehension and production of nouns and...
The Opinion Detection from blogs has always been a challenge for researchers. However with the introduction of Blog track in TREC 2006, a considerable improvement has been seen in this field at document level. But now it is the time when researchers are thinking to shift their orientation from opinion finding at document level to opinion finding at sentence or passage level. In this paper, we investigate...
We refer to ‘Home Care Systems’ as the technology and services required to support and realise activities of the network of care. Such technology typically includes sensors, devices, displays, data, and networks, and computing infrastructures which provide the means to collect, distribute, analyse and manage care related information. Such home care support can range from simple stand-alone electro-mechanical...
We refer to 'Home Care Systems' as the technology and services required to support and realise activities of the network of care. Such technology typically includes sensors, devices, displays, data, and networks, and computing infrastructures which provide the means to collect, distribute, analyse and manage care related information. Such home care support can range from simple stand-alone electro-mechanical...
The strong limit theorems is one of the central questions for studying in the international probability theory. The purpose of this paper is to give a strong limit theorem for functions of two-ordered Markov chains indexed by a kind of non-homogenous tree.
Private-preserving shared dot product protocol is an important protocol of many secure multi-party computation problems. It has been the main building block of various data mining algorithms with privacy concerns, and providing fundamental security guarantee for many privacy-preserving data mining algorithms. In this paper, we construct a privacy-preserving two-party shared dot product protocol based...
Constraint-based mining has been proven to be extremely useful. It has been applied not only to many pattern discovery settings (e.g., for sequential pattern mining) but also, recently, on classification and clustering tasks (see, e.g., ). It appears as a key technology for an inductive database perspective on knowledge discovery in databases (KDD), and constraint-based mining is indeed an answer...
Event-based summarization extracts and organizes summary sentences in terms of the events which stand for complete meaning of sentences. However, the basic event-based extracting method does not take the similarity of events into account, which leads to data sparseness. As a way to solve the problem, we explored a new method, what we call the shallow semantic pattern, which extracts a semantic representation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.