The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power Tools software is a linking of knowledge power electronics with the simulations. Through a graphical interface allows the search for Pq concepts in its own database. The idea arose because the information is not organized and the idea is to give a focus to the mining industry.
The technique of outlier detection is useful in many real world applications such as detection of network intrusion. It has been studied intensively on deterministic data. However, it is still a novel research field on uncertain data. To our best knowledge, this paper is the first one to focus on distance-based outlier detection on uncertain data, in which each data is affiliated with a certain confidence...
The process of marking up the syntactic structure of the sentences in a corpus is facilitated by having a graphical tree editor. A type specification constraints the nature of acceptable trees, and visual indication of non-conformities makes corrections easy. Projectivity checking can also be a useful way to notice errors, depending on the linguistic design of the tree type specification. A small...
The fast development of communication technologies brings a heterogeneous network environment, which makes it more complicated to guarantee end to end quality of service (QoS). As a result, an open QoS control and management framework is crucial for the service providers. In this paper, we propose a novel pricing-based end to end QoS control and management architecture, with some key functional blocks...
Password is a key to secret authentication data and is most widely used for security purposes therefore it is open to attacks such as phishing attack. Phishing is a form of Internet fraud, which phisher applies to steal online consumer's personal identity data and financial account credentials. In this paper, we analyze a technique of password hashing, to compute secure passwords. Using this mechanism,...
Iterative and incremental development (IID) is a staple of multiple software development methods, including Spiral development, Unified process and Agile development. However, a number of papers warn of possible pitfalls in application of this approach in examples of real-life development project. In this paper we will describe an (in our opinion) successful application of IID to a software project...
Respecting people's social spaces is an important prerequisite for acceptable and natural robot navigation in human environments. In this paper, we describe an adaptive system for mobile robot navigation based on estimates of whether a person seeks to interact with the robot or not. The estimates are based on run-time motion pattern analysis compared to stored experience in a database. Using a potential...
Despite the proliferation of database marketing in the marketing engineering literature, there is little research that focuses on how to segment customers and find out the valuable customers within a reward programs database. The paper develops a RFMG model, which based on RFM model by creating gap coefficient to consider purchases made at competitors, to target valuable customers. The validity of...
Speaker diarization systems attempt to assign temporal speech segments in a conversation to the appropriate speaker, and non-speech segments to non-speech. Speaker diarization systems basically provide an answer to the question "Who spoke when ?". One inherent deficiency of most current systems is their inability to handle co-channel or overlapped speech. During the past few years, several...
Semantic integration in the hidden Web is an emerging area of research where traditional assumptions do not always hold. Frequent changes, conflicts and the sheer size of the hidden Web demand vastly different integration techniques that rely on autonomous detection and heterogeneity resolution, correspondence establishment, and information extraction strategies. In this paper, we present an algebraic...
Research on machine translation has a long history and many methods and techniques have been proposed and developed. However, low quality of translation is still a major problem and many related problems remain unresolved. Super function based machine translation was proposed to perform translation without going through syntactic and semantic analysis as many machine translation systems usually do...
Requirements for which no recommendation can be calculated are unsatisfactory for the user. The detection and resolution of conflicts between those requirements and the product assortment is an important functionality to successfully guide the user to a solution. In this paper we introduce a new approach how to identify minimal conflict sets in over constrained problems through network analysis. Conflict...
There has been considerable interest in the recognition of affect from written and spoken language. In this paper, we describe an approach to lexical affect sensing that performs a semantic analysis of texts utilizing comprehensive grammatical information. Hereby, the proposed approach differentiates affect of many classes. In addition, this paper reports on obtained results and discusses them.
As an important branch of data mining, sequential patterns mining has been extensively studied. Based on sequential patterns mining, Structural Relation Patterns (SRPs) mining is proposed for mining relations among sequences, these relations are generally hidden behind sequential patterns. Upon the previous researches, the concepts of concurrent relation pattern and exclusive relation pattern are...
This paper presents a novel approach for off-line text-independent Arabic writer identification. The approach operates in four steps: 1) handwritten text is segmented into strokes after an image thinning step; 2)length, height/width ratio and curvature stroke features are extracted; 3) five feature vectors are computed: stroke length/ratio probability distribution function (PDF), stroke length/ratio...
In this paper, we propose a high performance face recognition system based on the probability distribution functions (PDF) extracted from discrete wavelet transform in different colour channels. The PDFs of the equalized and segmented faces in different subband images obtained from discrete wavelet transform (DWT) are used as statistical feature vectors for the recognition of faces by minimizing the...
The ontological concepts for 1,256 Mandarin metaphor types (such as cheng2zhang3 'grow/growth' and jian4she4 'construct/construction') were stored in a database in the form of metaphor-concept pairings. In each pair, a Mandarin metaphor type is paired with ontological concepts in English. Based on the relations given in these pairings, a database of relational concept was created. Calculation of co-appearance...
With the increased demand for English communication, various styles of learning support methods have been proposed and provided to the Japanese learners. However, there are still many learners finding it hard to read, write and speak in English. Regardless of language difference, understanding the other's intention and emotional status accurately and expressing what they think or feel to the others...
In recent years, a lot of cooperative document edit systems are proposed and some of them are running as useful system, such as Google documents and Wiki. Although most of them can be utilized as a general use by many sort of people, the features and functions of them are not provided enough in case that specialists achieve a certain purpose. In this paper, as one of enterprise of services, we propose...
KDD was applied to the knowledge mining of mechanical structure symmetry design, and a KDD process was established. The models and relational database tables of structure design knowledge and symmetric samples according with KDD technology were set up, and then the technologies of OLAP and associating analysis were applied to obtain bidirectional mapping relationship between structure symmetries and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.