The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On the basis of comprehensive analysis of existing buy site, it proposes a knowledge library structure of group buying websites, which profit model is based on membership, members' behavior. And providing support to the group buying site decision-making by using data mining technology to analyze the conduct of its members and to predicting further member's behavior. This study is not only extremely...
The traditional lighting system in the workplace only sets the lighting according to different scenes, can not intelligent adjust lighting as required. This program using data mining techniques can adjust the light intensity according to the data of weather forecasting, geographic location, historical data, and default value at this time in such scene. Meanwhile, BP neural network is applied to complete...
Intrusion detection technology has developed over more than 30 years from the host-based to network-based and has become the indispensable security technology of information systems. On the basis of the study of the existing intrusion detection systems, this paper reviews the history of intrusion detection technology, and sum up the recent hot-spot problems researched. Then, six technical difficulties...
To obtain, understand and evaluate numerous factors of affecting network security with network security situation perception, it can predict the future development tendency, it is a kind of means of analyzing the network security quantitatively, and it is also a fine measurement of network security, studying the situation perception technology has the important meaning. This paper combining visualization...
For achieving the obstacle-avoidance of citrus picking robot and the prevision of obstacle in working scene, the virtual model of fruit tree branch was reconstructed by the binocular stereo vision system in natural scene. In the reconstruction, branch skeleton was extracted and trimmed to remove fake branches after thinning processing; branch's feature points were extracted through multi-segment approximation...
Relational database, data warehouse and data mining are three kinds of independent information technology, one of the most active branch of the development and application of Database research, by analysis of complementary prospects and connections of the three techniques, we can combining them to establish a more perfect database application system or a decision making system.
The paper establishes the knowledge complex mode of design rules of civil avionics Integrated Intelligent Flight Deck Displays aiming at its peculiarity of operation and being based on the experienced data being evaluated by the resourceful pilots, an algorithm is proposed which using rough set to reduce the data and give a knowledge reduction and rule extraction algorithm based on a comprehensive...
The emerging background for automatic extracting collocations is generally stated in this article. That How to extracting collocations as well as the advantage and disadvantage of existing methods are particularized. The review and comment for domestic and international present research status are given. And the problem of existing technic and solving methods are discussed.
The network security situation perception technology as active defense technology has become the new research direction of network security field. On the basis of analyzing and summarizing the basic concept and the model of network security situation perception, put forward a method of network security situation perception based on artificial life. This method builds an artificial life model which...
Currently, since the robustness and anti-interfernce performance of mining method of vehicle failure are weak, the accuracy of failure mining is low. To solve the problem, this paper put forward a new mining technology of vehicle failure based on resisting the interference from the exterior. Through accurately building vehicle model, establishing search model of vehicle characteristic point, dealing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.