The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, based on a web page to determine similarity is proposed which is based on semantic web similarity judgments. First on the web page of text extraction, is text segmentation, also taking stop words to go out, Similarity judgments for the Web page provides a basis. Then based on Vector Space Model using TF-IDF method similar to the Chinese website text judgment, In the process of judging,...
Analysis of dissolved gases content in power transformer oil is very important to monitor transformer latent fault and ensure normal operation of entire power system. Analysis of dissolved gases content in power transformer oil is a complicated problem due to its nonlinearity and the small quantity of training data. Support vector machine (SVM) has been successfully employed to solve classification...
Iris Recognition has emerged as one of the best biometric authentication techniques in recent years. However, a significant drawback of this biometric modality is the constrained environment in which the user is enrolled and recognized. It typically requires the user to be very cooperative for good quality images to be captured. If this limitation could be effectively addressed, it would be possible...
We present a system for miRNA classification that implements a wide variety of miRNA features found in literature: structural, thermodynamical, information-theoretical, statistical, and comparative. A total of 1485 features are computed and various tests are performed. The classifier of choice used is Random Forests, which is also employed along with various feature selection strategies to determine...
Aiming at those problem that it was difficult to improve the processor performance only by improving the single core frequency, as well as superscalar pipeline stall when process a branch instruction, the architecture of heterogeneous multi-core processor which used B-Cache structure and C-Core processor controller was introduced in this paper. The new architecture avoided the pipeline flushed due...
For the robot vision system in apple harvesting robot, a new image segmentation method based on entropy clustering is proposed in HSI color space. Firstly, noise was wiped off by using weighted algorithm of median filtering in HSI color space instead of traditional algorithm in RGB model; secondly, Hue and Saturation components were extracted to do entropy clustering with their independence with Intensity,...
In this paper a multi-resolution analysis based on Independent Component Analysis (ICA) for face recognition is examined. We extract image features of facial images from various wavelet transforms (Haar, Daubechies, Coiflet, Symlet, Biothogonal and Reverse Biorthogonal) by decomposing face image in subbands 1 to 8. These features are analyzed by ICA and Euclidean distance measure. A series of experiments...
Recent advances in Wireless Sensor Networks (WSNs) make them more important to apply. Therefore, security issues are more significant in WSNs. WSNs are susceptible to some types of attacks since they are consisted of cheap and small devices and are deployed in open and unprotected environments. In this research, an Intrusion Detection System (IDS) created in cluster head is proposed. The proposed...
A prospective buyer interested in a particular item may find out information about the item from various sources, including product reviews. With interactive information sharing facilitated by Web 2.0, a lot of product reviews are available on the web. For a popular item with a large number of reviews, a prospective buyer could use some help in selecting only reviews of interest, such as, only positive...
In this paper the study is on multi-dimensional economic evaluation of corporate, proposed a multi-dimensional evaluation system of indicators. From the traditional business,etc. To start from five dimensions, person, financial, management, administration and development for three-dimensional evaluation, which jumped out of the company itself, increased people the key dimension of business stakeholders,...
Software quality is evolving beyond static measurement to a wider scope of quality definition. Previous studies have indicated the importance of human aspect in software quality. But the quality models have not included comprehensively this aspect together with the behavioural aspect of software quality. This research has proposed a Pragmatic Quality Factors (or PQF) as a software quality measurement...
This paper describes an adaptive grid-point detector for the feature detection task in a pseudo-random structured light pattern. In the algorithm, a local entropy map is firstly constructed to evaluate the distribution of the projected pattern elements in the captured image. A mask in the shape of a cross is then used for the preliminary detection of grid-point candidates. With reference to the entropy...
The prediction of software defect-fixing effort is important for strategic resource allocation and software quality management. Machine learning techniques have become very popular in addressing this problem and many related prediction models have been proposed. However, almost every model today faces a challenging issue of demonstrating satisfactory prediction accuracy and meaningful prediction results...
An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behaviour as specified in attack descriptions (referred to as signatures). Many studies report that IDSs have problems accurately identifying attacks. Therefore, it is important to precisely...
The air-conditioning equipment and other structures attached to railway rolling stock are plate objects joined by a spot or an intermittent welding. The finite element (FE) modeling of such plate objects is very time-consuming due to the large number of spot and intermittent welds that must be modeled. We developed automatic weld modeling technology, with the aim of reducing the procedures for FE...
Currently, there are some paradigm shifts in medicine, from the search for a single ideal biomarker, to the search for panels of molecules, and from a reductionistic to a systemic view, placing these molecules on functional networks. There is also a general trend to favor non-invasive biomarkers. Identifying non-invasive biomarkers in high-throughput data, having thousands of features and only tens...
Particle swarm optimization (PSO) is an optimization algorithm that has received much attention in recent years. PSO is a simple and computationally inexpensive algorithm inspired by social behavior of bird flocks and fish schools. However, PSO suffers from premature convergence, especially in high dimensional multimodal functions. To improve PSO performance on global optimization problems, this paper...
The cancer classification through gene expression patterns becomes one of the most promising applications of the microarray technology. It is also a significant procedure in bioinformatics. In this study a grid computing based evolutionary mining approach is proposed as discriminant function for gene selection and tumor classification. The proposed approach is based on the grid computing infrastructure...
In order to more accurately predict industrial emissions, the paper selected BP and GA-BP neural network to establish the prediction model between the foreign trade and industrial waste discharge. Compared of different forecasting methods and examples of analysis of results, it shows that GA-BP neural network had higher accuracy, tolerant and excellent generalization ability than other model on ecology...
This paper designs an RFID IP core by utilizing FPGA technology, which has advantages of internal task scheduling and high-speed encoding & decoding. The RTL design of base-band communication IP core based on modular method is presented. The RFID simulation model is established and the experiment results show that the proposed communication simulation model has a good performance, and the IP-core...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.