The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The core theory of this article is solving the problem of marking examination papers using Fuzzy similarity selection of Fuzzy mathematical theory. The method considers not only the scores given by every teacher but also every teacher's weigh value. We can give a reasonable and fair method of marking examination papers using this method.
In this paper, we propose a volume rendering method using grid computing for large-scale volume data. Grid computing is attractive because medical institutions and research facilities often have a large number of idle computers. A large-scale volume data is divided into sub-volumes and the sub-volumes are rendered using grid computing. When using grid computing, different computers rarely have the...
LUC cryptosystem is a public key cryptosystem based on Lucas functions. The encryption of this cryptosystem is relatively easy since we have the knowledge of public key e, two primes p and q and also the message M. Meanwhile, decryption process is difficult without the knowledge of private key d. In this paper, we are presenting a technique that can be used to compute private key for LUC cryptosystem...
Pictures are one of the important elements of which the application is composed. A programmer is able to choose suitable treatment according to the system requirement. In PowerBuilder picture control and ole control are the most commonly-used methods; blob data type field is used to access picture files in database and function of data window is used to display pictures dynamically. Each method has...
We present a method for the synthesis of non-linear ranking function of a program loop. Based on the region-based search, it reduces the non-linear ranking function discovering to the inequality checking. The inequality prover BOTTEMA then can be utilized to check validity for inequalities. In contrast to other approaches, the new approach can also discover the ranking function with the radicals due...
Calculating the core of a decision information system is the start of information reduction and a key step of decision rule making. In this paper, we analyze essential characters of core attributes of decision information system according to rough set theory. Then researching the relationship between discernibility matrix' single attribute element and a core attribute. As algorithms, which were given...
Grid information service is an inherent component of a grid system which collects resource data and provides search functionality. In addition to efficiency, fidelity in discovering desired resources is also an important metric to evaluate the service quality. Recently, a number of grid information service systems have been proposed based on DHTs. However, these systems either achieve high fidelity...
Technology of automatic text summarization plays an important role in information retrieval and text classification, and may provide a solution to the information overload problem. Text summarization is a process of reducing the size of a text while preserving its information content. This paper proposes a sentences clustering based summarization approach. The proposed approach consists of three steps:...
Nowadays the enterprise informatization is more and more important in the development of an enterprise. With the development of enterprises' informatization construction, more attention than ever before is paid to the security of information management RBAC, as a substitute of traditional access control mechanism Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the concept can...
In many-valued logic theories, the decision and construction for Sheffer functions is an important problem. The decision for Sheffer functions is interrelated to the decision for completeness of functions set, and the solution can be reduced to determining the minimal coverings of precomplete. It's well known that each precomplete set is a function set, T(Gm), preserving the relation Gm, therefore,...
Recent advances in program verification indicate that various verification problems can be reduced to semialgebraic system (SAS for short) solving. An SAS consists of polynomial equations and polynomial inequalities. L.Yang invented new theories and algorithms for SAS solving and partly implemented them as a real symbolic computation tool in Maple named discoverer. In this paper, we first introduce...
This paper presents a study aiming to investigate the way in which concept mapping could assist students to improve their technical systems understanding concerning computer science, on the basis of Denhiere-Baudet text comprehension model structures. The results of the study indicate that concept mapping supports students in two levels: (i) those, who have superficial comprehension on the underlying...
Informationazition construction is one of necessary conditions for enterprise to participate in international competition, and finance sale software is the important part of informationazition construction. However there are seldom domestic finance sale softwares supporting the finance sale management of small and middle enterprises (SME). Therefore, the paper designed and developed a set of finance...
This paper describe a method to calculate the concept similarity in taxonomy ontology and help searching system of e-commerce to answer users query more effectively. Instead of using the current ontology mapping methods which are focus on analyzing the terms relationship based on some thesauruses and special construction definition of terms, in this paper we firstly show the creation of taxonomy ontology,...
The algorithm is being developed with a view to reduce the time of going through entire document. The tool will be able to summarize textual documents automatically using statistical as well as linguistic techniques. It will provide the much needed method for creating concise and yet precise documents.
The sentence similarity computation plays an significant role in the fields of Chinese language processing. The paper presents a new approach to calculate the Chinese question semantic similarity, which is divided into two steps: the first step is to disambiguate the word sense in the question, and the second step is to compute the question semantic similarity based on the word sense. This paper uses...
Existing clustering ensemble algorithms for partitioning categorical data only apply to know the generating process of clustering members very well. In order to broaden the application of clustering ensemble, a fuzzy clustering ensemble algorithm for partitioning categorical data is proposed in this paper. The proposed algorithm makes use of relationship degree between different attributes for pruning...
Rule extraction is an important issue of data mining and many efficient algorithms based on rough sets have been presented for obtaining rules from decision tables. However, little work has been focused on extracting rules from the incomplete decision tables. In this paper based on an improved discernibility matrix an efficient method for obtaining all optimal credible decision rules from an incomplete...
This paper presents a method of engineering equipment process optimization based on process algebra from the from the decision analysis perspective. In the new method, maintenance process described process algebra formula is presented and analyzed; then, the process evaluation criterions are made; finally, the method is proved to be effective in a practical example.
Phishing is an attempt to fraudulently acquire userspsila sensitive information, such as passwords or financial information, by masquerading as a trustworthy entity in online transactions. Recently, a number of researchers have proposed using external online resources like the Google Page Rank system to assist phishing detection. The advantage of such an approach is that the detection capability will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.