The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the consistency prediction of data view in information systems and actual data, data quality is of vital importance to decision making and the development of banking industry. In this paper, we firstly analyze the influence of data quality on the banking industry, and make researches on the current situation of banking industry data quality automated management. Then five evaluation dimensions...
Collaborative Filtering (CF) is one of the most successful recommendation techniques. Regardless of its success, it still suffers from some weaknesses such as data sparsity and user cold-start problems, resulting in poor recommendation accuracy and reduced coverage. Trust-based recommendation methods incorporate the additional information from the user's social trust network into collaborative filtering...
Selecting accurate and simple association rules that efficiently cover all data samples is very important in knowledge discovery. There are several measures to assess accuracy and relations in a rule. This poses a challenge for researchers to select effective measures. Combining different measures via multi-objective evolutionary algorithms is an effective method to select suitable association rules...
Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we put forward a static analysis method of XSS defect detection of java web application by analyzing data flow reversely. This method first converts the JSP file to a Servlet file, and then...
Demand Response(DR) is a common practice used by utility providers to regulate energy demand. It is used at periods of high demand to minimize the peak to average consumption ratio. Several methods have been proposed over the previous years on how to formulate and deal with the problem of excess demand. Following these methods automated systems for initiating and regulating demand response events...
Many important network security areas, such as Intrusion Detection System and Next-Generation Firewall, leverage Traffic Classification techniques to reveal application-level protocols. Machine Learning algorithms give us the ability to identify encrypted or complicated traffic. However, classification accuracies of Machine Learning algorithms are always facing challenges and doubts in practical usage...
Recommendation systems suggest useful information to the end users. They predict the information demands of online users and offer recommendations to facilitate their navigation. There are many approaches to construct such systems. Most of the recommendation systems use data mining techniques on the web access log or the database of the site and discover user's access patterns. Afterwards, the recommendation...
Grammar Induction (GI) is the problem of extracting hidden regularities and syntactic patterns in languages. Not only the manner of extraction is intricate but also the definition of meaningful patterns is a challenge. Alignment Based Learning (ABL) is one of the research endeavors targeting such challenges in GI. Our present research on applying ABL to POS sequences in English, Persian and Arabic...
Method of improving the safety of autonomous vehicles are diverse. In particular, Path Tracking phase which is the last step and important to operate an autonomous vehicle. Method of Path tacking are diverse. Kinematic and dynamic methods is typically methods. In this study, Among Kinematic method, Pure pursuit is used by using the path tracking. Commonly pure pursuit is used to path tracking of mobile...
Cross validation method has been widely used for estimation of perfomance of classifiers and statistical method. However, compared with other resampling methods, cross-validation has not yet theoretically investigated since the sampling scheme is based not only on stochasticity but also on set-based processing. This paper proposes a new framework for evaluation of cross-validation methods based on...
The imbalance data problem in classification is a significant research area and has attracted a lot attention in recent years. Rebalancing class distribution techniques such as over-sampling or under-sampling are the most common approaches to deal with this problem. This paper presents a new method so called Diversity and Separable Metrics in Over-Sampling Technique (DSMOTE) to handle the imbalanced...
Collaborative filtering (CF) is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it suffers from several inherent deficiencies such as data sparsity and cold start. To better show user preferences for the cold users additional information (e.g., trust) is often applied. We describe the stages based on which the ratings of an active...
Onset detection is one of the main issues towards self-paced BCIs that can be used outside research settings. For this reason, this paper suggests a potential solution for onset detection problem by discriminating between speech related events. In this study, overt, inhibited overt and covert states were tested to classify from idle state in an off-line setting. Autoregressive model coefficients were...
In mobile ad hoc networks (MANETs), locationbased service (LBS) is a typical application. In a LBS, it is valuable for each node to grasp the convex hull of nodes which compose a network by using a convex hull query. However, if the query-issuing node acquires the information on all the nodes, the information on nodes which are not the vertexes of the convex hull is replied, which is unnecessary for...
In a previous paper, we reported on the initial development of KneeRobo, which replicates knee joint troubles experienced by patients in order to enable students studying to become physical or occupational therapists to gain practical training/testing virtually. We also developed a control algorithm that enabled KneeRobo to realize involuntary internal/external rotation during knee flexion and extension...
The purpose of the present paper is to determine recommendations for complex surface finishing operation with ball end mill. The parameters that influence the roughness are: (i) technological parameters (such as step), (ii) geometrical (radius of milling cutter, angle of surface inclination or tilt angle) and (iii) cutting strategy. Paper presents roughness calculation theory and provide comparison...
We present the indoor positioning system applying the multi-level TSS(Transmission Signal Strength) technique based on the RSS(Received Signal Strength) positioning algorithm and the Zigbee wireless communication modules. Especially, the Probabilistic algorithm is effectively adaptable for indoor spaces are applied to the suggested position system to increase the reliability for the position accuracy.
Rules inferring the memberships to single decision classes have been induced in rough set approaches and used to build a classifier system. Rules inferring the memberships to unions of multiple decision classes can be also induced in the same manner. In this paper, we show the classifier system with rules about the union of multiple decision classes has an advantage in the accuracy of classification...
Many practical engineering applications require the numerical solution for the analysis of the EM field by a moving source and/or a moving body. We have previously proposed the Overset Grid Generation method coupled with FDTD method for the analysis of the EM field with moving boundaries considering Doppler Effect. By overlapping one moving sub-mesh on a static main mesh, each mesh is calculated alternately...
The histogram specification turns a shape of a histogram into that we want to specify. This technique can be applied usefully in various image processing fields such as machine vision. However, the histogram specification technique has its basic limits. For instance, the histogram does not have location information of pixels. Also, the accuracy of specification drops because of quantization error...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.