The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The literature review (LR) is a complex reading-writing task. It is arguably the most challenging and daunting element in project reports for the novice writer. Typically, the undergraduate engineering student first encounters the literature review in the capstone project. This paper shares a reading-writing tool, termed the summary-comparison matrix (SCM). The SCM is a data organizer that helps students...
The existing method of contour-based font description is difficult to meet the personalized need for various style font generations because of the large size of Chinese character set. In this paper, we propose a novel glyph description method which treats the Chinese character as a constitution of the stable part called "structure" and the mutable part called "style". The structures...
With the concepts of cloud computing springing up, the researches of data mining clustering algorithm which is based on cloud computing become a research focus for scholars both at home and abroad. This article aiming at the extensive data clustering problem, using cloud computing technology, according to Hadoop platform does a deep research based on cloud computing platforms Hadoop and parallel K-means...
The exponential growth in the number of web documents and the technological advancements in communication systems over the Internet has resulted in tremendous increase in users accessing those documents for their needs. They may search for documents or for data available in the web. In the former situation, the documents are ranked using different techniques to list the relevant documents in the beginning...
Proposed a model of web users access mode mining based on quantum self-organizing neural network, solved a variety of interest problems of web users mining, utilized related superposition features of quantum states, performed the operations of automatic classification and statistical analysis, output some neurons whose membership grade is greater than threshold value. Experimental results show that...
This work present brief reports on the summarization of the application of the previously published comprehensive digital forensics process model and the forensic teams responsibilities to two real world computer forensic cases. Moreover, the information flow between each step and each phase in the model is discussed and elaborated in the form of flow chart diagrams, which are then applied on the...
According to the data management of cloud computing and assign characters of dynamic resource in cloud services, we constructed a model of cloud user, cloud service and cloud status, which collects information of user status, service applications and resource pools. By taking advantage of intelligent analysis and collaborative computing technologies, we can get user habit patterns among users, services...
Focusing on the application of mixed data fuzzy clustering in network monitoring, based on a dynamic growth and delete self-organizing maps model (DGDSOM), an algorithm of fuzzy dynamic growth and delete self-organizing maps (FDGDSOM) is proposed. This algorithm introduces the triggering system and designs the triggering module, and makes the intelligent judgment and decision according to the real-time...
Aiming at the status quo that it is easy to have efficiency bottle neck when dealing with the problem of a large scale in traditional plan chart, combined with the massiveness of data set in cloud computing environment, the paper makes some improvements to the chart plan technology. Data information in the cloud computing environment is dynamically extracted and used. Heuristic function is used to...
With the appearance of electronic medical records(E_MRs), it is possible to acquire and retrieve the medical and diag_nosis information. A variable precision rough set(VPRS)-based approach for electronic medical record data mining is proposed in this paper, the method overcomes the limitation of rough sets, inducting error accuracy to the model, improving fault tolerance. Finally the data mining experiment...
Facing all kinds of attacks and destruction of campus network, we urgently need agood detection model to detecting all kinds of campus network attack with high detection rate and low false positive rate, which possesses the ability of recognizing unknown abnormal activities. With considering the characteristic of network data source, a new intrusion detection application model is proposed. With the...
According to the user's access sequence, whether clustering can extracte the effectively user's interest model is closely related to the algorithm of identifying user's access affairs and clustering. This paper fully consider the impact on user interest mining of the topology and order of web papers. So, this paper advanced AER algorithm, new similarity formula and FCR algorithm. Finally, this paper...
Process mining has been widely applied in lots of fields, which can discover workflow models from event logs, helps to design or re-design process models, and brings convenience to workflow management system. The main function of process mining algorithms is to provide us with valuable objective information hidden in event logs, which plays a crucial important role on the implementation of new operation...
Sub-pixel classification is essential for the successful description of many land cover (LC) features with spatial resolution less than the size of the image pixels. A commonly used approach for sub-pixel classification is linear mixture models (LMM). Even though, LMM have shown acceptable results, pragmatically, linear mixtures do not exist. A non-linear mixture model, therefore, may better describe...
With the high development of Internet, e-commerce websites now routinely have to work with log datasets which are up to a few terabytes in size. How to remove messy data timely with low cost and find out useful information is a problem we have to face. The mining process involves several steps from pre-processing the raw data to establishing the final models. In this paper we describe our method to...
Cellular Automata is one of the ways of performing computations which necessitates extremely the processing of data at a high speed. In cellular machine, a great deal of data should be processed in a short time in order to use the outcome results. There are different methods to implement cellular automata one of which is to implement cellular automata on serial bases. This article studies implementing...
In this work we present a software tool that allow identify tendencies that describe the evolution in a discipline of scientific knowledge, where information resources are classified. The tool search support the data mining as part of discovery knowledge process and the identification is supported by production analysis of information resources in science and technology and his visualization in graphs...
Intrusion Detection System (IDS) is the key technology to ensure the security of dynamic systems. We employ a sequential pattern mining approach to discover significant system call sequences to prevent malicious attacks. To reduce the computing time of generating meaningful rules, we design a weighted suffix tree structure to detect intrusive events on the fly. The experimental results show our method...
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
Recent research has shown that simple network user recognition is not enough for FOAF (Friend of a Friend) user analysis, and meanwhile more and more researchers focus on user interest analysis and products recommendation. Extremely dispersed mapping information of customer relationship and space storage dispersion make it a challenge to effectively mine and analyze the FOAF information. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.