The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A generic e-homework system, PDFeH, was proposed and prototyped to replace traditional paper homework electronically. With pre-created PDF form documents as templates, teachers and students can complete main e-homework phases using free Adobe Reader. That is, composing questions, entering answers, commenting and markup and grading, and viewing finally archived documents. Digital signatures are used...
In this paper a global optimization algorithm is proposed for solving minimax linear fractional programming problem (P). By utilizing equivalent problem ( Q ) and linearization technique, the relaxation linear programming (RLP) about the (Q) is established. The proposed branch and bound algorithm is convergent to the global minimum of (Q) through the successive refinement linear relaxation of the...
The relationship between two members in a team is studied by using game theories and methods in this paper. The results show that each member's work amount, which is regarded as each member's decision variable, has a reasonable upper bound, the two members can achieve certain a Nash equilibrium, and may become "industrious" or "lazy" simultaneously while they are playing a non-cooperative...
In a retrieval system for vast amounts of image data, the primary storage cannot hold all image feature vectors because a huge data capacity would be required. Therefore, it is necessary to handle a slow-access secondary storage effectively as well as a first-access primary storage. In this paper, we propose a data-alignment optimization method in the secondary storage to access fast. Our idea is...
In practice, in order to improve its revenue, hotel cooperates with travel agency, website, government, corporation, etc., and provides them with low room rate. This paper does research on the pricing problem of hotel for long-term cooperative travel agency. Through building pricing model, this paper proves that cooperation is beneficial to hotel and travel agency, derives the optimal pricing strategy...
In order to complete maintainability design and prediction in design stage, case based reasoning (CBR), as an artificial intelligence (AI) method, is used in this paper. The maintainability of structure is considered in design stage. So the cases of structure including not only function factors but also maintainability factors are presented by frame. The retrieval algorithm about similar cases is...
In this paper, the notion of an three-band Generalized Multiresolution Structure(GMS) of L2(R) is introduced. The properties of affine pseudoframes for subspaces with three-scale is characterized. The construction of a GMS of Paley-Wiener subspaces of L2(R) is investigated. The pyramid decomposition scheme is derived based on such a GMS. As a major new constribution the construction of affine frames...
Based on the optimization problem of the number and size in coal mine equipment the principle and procedure of genetic algorithm is introduced. The case of application proves that the genetic algorithm can better optimize the number and size of equipments in coal mine.
The ground subsidence process induced by underground longwall coal mining is a complicated process of subsidence-induced damage to the ground and the surface buildings. Based on the study of the surface movement and deformation regulation on overburden strata of the mining field, a new predicting analysis of surface movement and deformation is provided based on GIS. By using the method of spatial...
In this paper we describe the design and implementation of a framework for declarative XML languages-SMPL. The framework is intended to support the semantic structure, annotation and control of SMIL documents. SMPL is supported by all browsers de-facto. Unlike perhaps other Web standards, where adding functionality has to be included in a release of a new version for a plug-in or a Web browser, SMPL...
SVDD has been proved a powerful tool for outlier detection. However, in detecting outliers on multi-distribution data, namely there are distinctive distributions in the data, it is very challenging for SVDD to generate a hyper-sphere for distinguishing outliers from normal data. Even if such a hyper-sphere can be identified, its performance is usually not good enough. This paper proposes an multi-sphere...
In this paper, we consider a recently proposed supervised learning problem, called online multiclass prediction with bandit setting model. Aiming at learning from partial feedback of online classification results, i.e. ??true?? when the predicting label is right or ??false?? when the predicting label is wrong, this new kind of problems arouses much of researchers' interest due to its close relations...
While data mining aims to identify hidden knowledge from massive and high dimensional datasets, the importance of dependence structure among time, space, and between different variables is less emphasized. Analogous to the use of probability density functions in modeling individual variables, it is now possible to characterize the complete dependence space mathematically through the application of...
Code clones (duplicated source code in a software system) are one of the major factors in decreasing maintainability. Many code clone detection methods have been proposed to find code clones automatically from large-scale software. However, it is still hard to find harmful code clones to improve maintainability because there are many code clones that should remain. Thus, to help find harmful code...
As a program written in multi-staged language can generate and execute code fragments in execution time, it is hard to predict how many code fragments will be generated in execution time. Therefore, current test coverages are not likely to give right answers when they are apply to a program written in multi-staged language because the program size could not be estimated easily. In this paper, we present...
Different method calls may have different contributions to the precision of the final application when abstracted into the call strings. The existing call string based pointer analysis algorithms do not consider such contribution difference and hence often can not achieve best cost-effectiveness. To solve the problem, this paper firstly proposes a contribution-based call stack abstraction method which...
In this paper an improved genetic algorithm is proposed to solve optimal problems applying fixed-point algorithms of continuous self-mapping in Euclidean space. The algorithm operates on an J1 subdivision of searching space and generates the integer labels at the vertices, and then crossover operators and mutation operators relying on the integer labels are designed. In this case, whether every individual...
The managerial incentive under network externality is studied by using game theory. The result shows that, the optimal managerial incentive is influenced by network externality. The larger network externality is, the smaller optimal managerial incentives will become. Moreover, network externality always increase equilibrium quantity and profit, but may decrease, increase or not change the equilibrium...
Hard constrained optimization problems in science and engineering are common computationally very expensive. This leads to serious impediment to the successful application of evolutionary optimization techniques. A modified Differential Evolution with hybrid mutation and new selection rules was proposed to solve the hard constrained optimization problem. The hybrid mutation is the linear combination...
It is an all-important and pivotal technology to translate dosage of each herb in a prescription into effect intensity measured by some models. In this paper, we present relevant Chinese medicine (short in CM) knowledge used for mining of prescription efficacies, and studying necessity of measuring "how effect of any herb depends on dosage" for CM AI systems, and discuss relevant issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.