The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We seek to extract and explore statistics that characterize New York City traffic flows based on 700 million taxi trips in the 2010–2013 New York City taxi data. This paper presents a two-part solution for intensive computation: space and time design considerations for estimating taxi trajectories with Dijkstra's algorithm, and job parallelization and scheduling with HTCondor. Our contribution is...
Bodies of Knowledge (BOK), contain the relevant knowledge for a disciplines as example Software Engineering (SE), System Information (SI), Information Technology (IT), Computer Science (CS), Medicine, Economics, and others areas of knowledge. BOK describes relevant knowledge for a discipline, and will need show the consensus in the Knowledge Areas (KA), and related disciplines. The development of...
We present the first version of an electronic dictionary( http://vis.upf.edu/CDVS/dic2.aspx ) where designers can find pictures to represent abstract concepts. It aims at the expressiveness and variety of visual expressions for abstract concepts. This dictionary is driven by an automatic knowledge extraction method, which elicits pairs of abstract concept and picture from corpus. The extracted visual...
The paper presents City Flow, an urban traffic visualization prototype based on real post streams captured from Sina Weibo, the most popular social networking site in China. With the increasingly pervasive use of online social networks in China, these new channels attract more users than conventional social media. People use them to seek comments and points exchanges about urgent event and popular...
Compared with the traditional data mining system algorithms library, the introduction of Web Service technology into data mining system algorithm library realizes the separation of data, algorithm and interface. The loose and interconnected mode greatly reduces the complexity of the development for the algorithms library in data mining system and is convenient for the dynamic management of data mining...
Based on intelligent control technique, this paper carries on research on college financial intelligent system framework, financial analysis models, and financial analysis results and gives advices on stimulating the university informatization development.
Compared with the traditional data mining system algorithms library, the introduction of Web Service technology into data mining system algorithm library realizes the separation of data, algorithm and interface. The loose and interconnected mode greatly reduces the complexity of the development for the algorithms library in data mining system and is convenient for the dynamic management of data mining...
Complex Systems on Chip are developed by large design teams integrating various different blocks. Typically, no single person in the design team understands all details of such a design. Integrating new designers into the team as well as debugging failures or performance problems becomes a time-consuming cost-generating threat to the overall project. We envision tool support for these critical steps...
Book logistics has developed rapidly under the E-commerce environment. This design attempts to use ASP.NET (C #) in the structure of an online bookstore to make customers buy books easily through the Internet. This paper describes the design and implement of an on-line bookstore system with data mining function, and the main pages of it, database, application design and implementation are also introduced...
In recent years the kind of nerve network's analysis technique was on the rise, this technology's discovery was when the information project department made Data Mining was born, this program had from the huge data discovers the regularity or correlation formidable ability, therefore this article will study the case to focus in the traditional PCB industry Micro-drill system regulation process capability...
Business intelligence is a key means to promote core competence of enterprise. However, the enormous construction cost of business intelligence severely limits the popularization and development of business intelligence. The multi-agent technology provides a feasible solution for construction of low-cost business intelligence system. Firstly, this paper introduces the current applied status of business...
Network and host Intrusion Detection Systems (IDS) have become a standard component in security infrastructures. As the action of intrusion represents variable, complicated, and uncertainty characteristic, they face so many problems to resolve for intrusion detection. Each approach has its strengths and weaknesses. We propose a hybrid IDS, which combines network and host IDS, with anomaly and misuse...
The proliferation of mobile devices as well as the convergence of mobile communications and handheld devices offers the opportunity to design technology that will assist individuals and groups to learn anytime, anywhere. Therefore, mobile technologies are increasingly used to facilitate learning process and the use of these technologies creates new opportunities and challenges. However, designing,...
The selection of project delivery systems is a critical problem for project owners, because it will directly affect the achievement of owner's project objectives. At the beginning, this paper proposes the project objectives of Design-Bid-Build and Design-Build project, and also the factors influencing the selection of Design-Bid-Build and Design-Build. Then, Reliability Analysis and Non-parametric...
The template design problem is a constrained optimization problem originated from the printing industry. It involves printing several variations of a design onto one or more stencil sheets, where the aims are to minimize the number of stencils as well as the overproduction of prints of a particular design. Over the years, exact solution methods have been used to solve the problem. These methods could...
The domain of artificial intelligence (AI) progresses with extraordinary vicissitude. Whereas prior authors have divided AI into the two categories of analysis and synthesis, Raine and op den Akker distinguish between four types of AI: that of appearance, function, simulation and interpretation. These subdomains of AI are differentiated by user goals, creator methodologies, and environmental constraints...
This paper presents a study on the significance of length of remediation time, on the optimal groundwater remediation design by considering two possible groundwater remediation scenarios. The objective of this problem is to minimize the total remediation cost conditioned by some constraints. Flow and transport simulators MODFLOW and MT3DMS are coupled with a genetic algorithm (GA) based optimization...
This paper makes a study of survivability of network based on biological immune principles. The definition of survivability of network is discussed and a new definition on the premise of staying alive is made. The inspiration of biological immune system to the network survivability is analyzed, and at this basis, a method for the second development of survivable network system is presented. The survivability...
From the related analysis and comparison to a lot of award-winning testing papers in educational software, this paper expounds the unique functions of testing paper design in their respective teaching software, and bring significance that we can learn from it.
This paper explores the experimental design and identifiability problems for both closed and open quantum systems. In general, the identifiability of quantum systems depends on both the choice of model sets and experimental design. The limits of identifiability in certain experimental settings and ways to improve the identifiability of model parameters by changing experimental conditions are investigated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.