The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The trust model is widely used in the opportunistic social network to solve the problem of malicious nodes and information flooding. The previous method judges whether the node is a cooperative node through the identity authentication, forwarding capability, or common social attribute of the destination node. In real applications, this information does not have integrity and does not take into account...
In the pattern recognition system, when selecting the optimal set of attributes, we need a lot of features from the screening properties, so often there will be omissions, therefore, to use the rough set (RS) on the support vector machine (SVM) for encapsulation method of screening set of attributes, the use of RS and SVM to find the optimal combination of the characteristics of attribute combinations.
Extended feature models enable expressing powerful constraints by involving feature attributes in cross-tree relations. However, most of the existing methods for the automated analysis of feature models are not devised to handle such models. In this paper we define a transformation to remove such cross-tree relations, which is applicable when certain restrictions hold. This transformation takes an...
In this work, we present a 3-layer segmentation scheme for automatic erythema detection. First, a skin region is detected with a histogram-based Bayesian classifier. Next, the extracted skin image is represented in terms of melanin and hemoglobin components based on Independent Component Analysis (ICA). At last, a trained Support Vector Machine (SVM) is applied to identify erythema areas using feature...
A detailed discussion on contributions from feature attributes to the classifying attribute in the nonlinear classification model based on the Choquet integral is given in this paper. The work provides a new understanding to the geometric structure of the model with contribution rates from the feature attributes towards the classification, as well as the interaction among them.
One of the most active threats we meet on the Internet is cyber-crime. Fast-flux is a kind of DNS technique used by botnets to hiding the malicious activities. In this paper we use data mining techniques to detect the fast-flux service network (FFSN) which is newly emerging and still not perceiving widely. From the data mining perspective, the detection of cyber-crime is viewed as kind of imbalanced...
Mining the web for customer opinion on different products is both a useful, as well as challenging task. Previous approaches to customer review classification included document level, sentence and clause level sentiment analysis and feature based opinion summarization. In this paper, we present a feature driven opinion summarization method, where the term ldquodrivenrdquo is employed to describe the...
A compressed domain color-based image indexing method that avoids overheads associated with full decompression and color space transformation by operating in the YCbCr space has been presented. The proposed method performs a hard segmentation of the color space into predefined clusters based on perceptual similarity. A three dimensional color descriptor is generated by extracting the average intensity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.