The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we applied two methods of process mining techniques (from Discovery class/approach) in order to extract knowledge from event logs recorded by an online information system. The event log was created via information received from an online proceedings review system in Thailand. Accordingly, Alpha and Heuristic algorithms were used with the objective of automatically visualizing the models...
Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. The query results are presented in dynamically generated web pages, usually in the form of data records, for human use. The automatical web data extraction is critical in web integration. A number of approaches have been proposed. The early work are most based on the source code or the...
Data mining is the process of extracting knowledge from the huge amount of data. The data can be stored in databases and information repositories. Data mining task can be divided into two models descriptive and predictive model. In Predictive model we can predict the values from different set of sample data, they are classified into three types such as classification, regression and time series. Descriptive...
In this paper, we present a novel ensemble method random projection random discretization ensembles(RPRDE) to create ensembles of linear multivariate decision trees by using a univariate decision tree algorithm. The present method combines the better computational complexity of a univariate decision tree algorithm with the better representational power of linear multivariate decision trees. We develop...
Millions of geo-tagged photos are becoming available due to the widespread of photo-sharing websites. These social medias capture attractive points-of-interest and contain interesting photo-taking patterns. Massive amount of these user-oriented data produces new challenges and understanding people's photo-taking behavior is of great importance for local tourism-related businesses. This paper analyzes...
User generated contents service is a social service because users not only enjoy contents but also provide feedback on content by commenting, tagging and book marking. The authors are interested in social service ranking and categorization methods for online novels. Many readers comment and bookmark there favorite novels in online novel services. Comments and book marking are facilitated by readers,...
The real-time data stream clustering and the detection of clustering boundary is an interesting research work. This paper proposes a clustering algorithm named DDBound with boundary detection ability for grid clustering based on distance and density. DDBound firstly calculates the densities of all grids, and divides them into high-density grids and low-density grids. From all grids, the algorithm...
This paper proposed LSB Information Hiding algorithm which can Lift wavelet transform image. Furthermore, made the objective evaluation of image quality by the peak signal to noise ratio and normalized cross correlation coefficient. Achieving the purpose of information hiding with the secret bits of information to replace the random noise, using the lowest plane embedding secret information to avoid...
A new algorithm of fuzzy support vector machine based on niche is presented in this paper. In this algorithm, through comparing samples niche with class niche, the method of simply using Euclidean distance to measure the relationship of samples and class in the traditional support vector machine is changed by using the minimum radius in class niche, and the disadvantages of traditional support vector...
A pattern discovered from a collection of data is usually considered potentially interesting if its information content can assist the user in their decision making process. To that end, we have defined the potential interestingness of a pattern based on whether it provides statistical knowledge that is able to affect one's belief system. In previous work, we proposed two novel algorithms, Discovering...
The core idea of LLE is that high-dimensional data can be seen near-linear dependency from the local perspective. That is, at a local scale, a data point can be linear representation by its nearest neighbor interpolation, but for noisy data, its local linear representation will produce deviations, as result, the error of dimension reduction is greater. To address the problem, this article determines...
Focuses on the demand of the opening administration for the laboratory in high school, combined with the fingerprint recognition technology, this paper designs a universal laboratory management system, which contains checking on work attendance, students information management, querying, printing report sheet and course management functions. The fingerprint recognition technology is analyzed in detail...
To improve the precision of land-cover change detection and remedy the shortage of single change detection technique, an integrated correspondence analysis (CA) differencing method was developed, which combined CA method with image differencing. After the spectral transformation of the individual date images into component space using CA, the first component (PCI) of the date 1 image was subtracted...
This study demonstrates the existence of noise assisted transport in the Fenna-Matthew-Olson (FMO) complex, a light-harvesting complex found in photosynthetic green sulphur bacteria. Result shows how local dephasing enhances the transport process in the FMO complex. In addition, the robustness of the mechanism under local disorder reveals that energy transport in nature is not sensitive to the finer...
This paper study a PDE variational model to image denoising and restoration. The existence and uniqueness of the solution is discussed. A new model of image denoising and restoration is deduced by gradient descent flow method. Then, A new numerical analysis model is obtained. The model can preserve the edge feature and smooth the image. The numerical experiments show that the model delivers better...
This paper proposes a matching template based on first order differential coefficient for fast edge extracting after analyzing and synthesizing the traditional algorithm of edge detection. The method is able to effectively thinning the image edge and increase the accuracy and efficiency.
In recent years, with the development of high range resolution radars, the desire to be able to identify targets under all weather and clutter conditions has become of great importance. This is an activity carried out with great success by echolocating mammals such as nectar feeding bats that are able to detect and select flowers of bat-pollinated plants even in a dense clutter environment. In this...
Automatic identification technologies have been used to reduce the time and manpower to input data manually i.e. Barcode, smart card, radio frequency identification (RFID), biometric technology and optical character recognition. Currently RFID has become one of the hottest technologies implemented in a wide range of application i.e.; these include road tolls, bus and trains payment, security tags...
In this Paper we have presented a Fingerprint verification system based on hybrid approach which combines both the Feature extraction by applying a set of different wavelet families (functions) and minutiae information available in the fingerprint image by fusion rule method. The Core Point (CP) of the input Fingerprint is detected. Keeping the CP in the center,the image of size w x w is cropped and...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.