The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Outlier detection in high-dimensional data presents various challenges resulting from the “curse of dimensionality.” A prevailing view is that distance concentration, i.e., the tendency of distances in high-dimensional data to become indiscernible, hinders the detection of outliers by making distance-based methods label all points as almost equally good outliers. In this paper, we provide evidence...
In this paper we provide a framework useful to define and measure the perceived “smartness” of learning eco-systems of any kind and, more in general, of cities and territories. The proposed framework, inspired by Maslow's pyramid of needs [18] and by the “flow” concept [6] helps to integrate bottom-up approaches and top-down ones and to develop a more person in place center vision of smart learning...
Early analysis does not support a link between students' motivation levels and their survey participation rates, suggesting that repeated sampling throughout a semester may be more capable of documenting a representative cross-section of student experiences than we originally expected.
There are many semantic inconsistencies between domain concepts, which made it difficult to model, to interoperate and also to compose models semantically in software engineering, M&S (modeling and simulation) or semantic web. Thus we described the domain concepts and concepts taxonomy by hypernetwork (concept hypergraph), whose nodes set is the concepts set and edge is consisted of the correlative...
This article addresses trust in computer systems as a social phenomenon, which depends on the type of relationship that is established through the computer, or with other individuals. It starts by theoretically contextualizing trust, and then situates trust in the field of computer science. Then, describes the proposed model, which builds on what one perceives to be trustworthy and is influenced by...
In this paper, we propose an explicit signaling of RDPCM scheme for a lossy intra-coded block, and achieve a significant coding gain over the HEVC Range Extension reference software in the screen contents coding. We define three RDPCM modes, and transmit the side information so that the best RDPCM mode can be applied to residual signals after all available angular directional predictions. Contexts...
Over the past forty years, significant research has been done on story/narrative generation in which the computer is the author. Many existing systems generate stories by filling in a template or copying an analogous story (and changing the time, place, etc.) or by prompting the user to provide a start to the story. Very few systems generate variable stories without these techniques. While it is impossible...
In this presentation, we describe how field-field correlation functions may be efficiently propagated using ideas based on ray propagation. The key point is to make a connection between the field-field correlation function and the corresponding Wigner function, which is obtained from it by Fourier transformation.
This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such evasive...
To support the whole business process compliance lifecycle, one also needs to monitor the actual processes and not just check their design. Recently, many approaches have been proposed that utilize a broad range of constraint languages and techniques to realize compliance monitoring solutions. Due to this diversity, the comparison of existing approaches is difficult and consequently hampers the evaluation...
Theory and prior research suggest linkages between mental health and self-evaluation. In the present study, we examined the relationship between mental health (depression, nervousness, and anxiety) and self-evaluation (satisfaction, confidence, hopelessness, uncapability, and meaninglessness) among 84 renters through the Chinese Family Panel Studies (CFPS). Renters from Beijing, Shanghai and Guangdong...
The mechanism that team conflict on organizational citizenship behaviors is far from conclusive in the context of Chinese culture. In order to further clarify this mechanism, this study examines the role of organizational justice in the relationship between two types of team conflict and organizational citizenship behavior. Drawing on the samples of 138 management team members in the 14 colleges and...
Cellular systems operate under restrictive constraints of resources including radio channel capacity and network processing capability. The tremendous growth in the cellular data network usage brings operators with unprecedented signaling overloads and threatens the stability of the network. Understanding the characteristics of the subscribers who are resource inefficient has an important significance...
Virtual citizen science (VCS) uses technology like the Internet to give volunteers the chance to participate in real scientific research. The success of VCS projects has prompted researchers to understand what motivates volunteer participation. 199 registered users of Zooniverse, a successful collection of VCS projects, completed a web survey assessing various possible motives for their participation...
Indian universities broadly follow an entrance process for undergraduate engineering process in which physics, chemistry and mathematics based questions are asked. Either the individual scores or some combination of these scores is used to set the admission criterion for different engineering streams. However, it has not been analyzed whether this is a good predictor of undergraduate performance or...
The type of motivation that a student evinces can shape such outcomes as academic engagement, performance, and satisfaction. In this paper we explore student motivation using cluster analysis, a quantitative method that has been proven useful in examining group-based motivational profiles within academic settings. We apply a range of clustering techniques to a data set comprising motivational survey...
Sharing information and resources on the Internet has become an important activity for education. The use of ubiquitous devices makes possible for learning participants to be engaged in an open and connected social environment, and also allows the learning activities to be performed at any time and any places. In this study, the discovery of correlation among shared resources is concentrated. A hypothetical...
In this study, a computerized collaborative concept-mapping approach is proposed. To evaluate the effectiveness of this innovative approach, a learning activity has been conducted on an elementary school natural science course. Two hundred and twenty fifth graders from seven classes were divided into an experimental group, in which the students learned with the proposed approach, and a control group,...
Online dating is one domain, which would benefit from the application of computational trust. One of the problems with the application of traditional computational trust models, as identified in our previous work, is authenticity of information provided by parties which helps other users ascertain whether they want to go on dates. In this position paper, we suggest a solution: a concordance based...
This paper proposes a context priority scheduling algorithm based on correlation. The correlation between low-level contexts of reasoning task will be considered as the base of priority distribution. Its purpose is to speculate emergencies that about to happen next and provide the better reflect and the high efficiency in the smart home system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.