The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, it has become more and more popular to recommend friends on the location-based social network (LBSN), which is combined with the user's behavior in the real world. LBSN has three attributes including temporal, spatial and social correlation. However, the combination situation of the three cannot be solved in previous algorithms. For instance, the problem of recommending friends with...
Blog is becoming an increasingly popular media for information publishing. Besides the main content, most of blog pages nowadays also contain noisy information such as advertisements etc. Removing these unrelated elements can improves user experience, but also can better adapt the content to various devices such as mobile phones. Though template-based extractors are highly accurate, they may incur...
In recent years, with the text, images, audio, video and other data doubled because of the rapid development of information technology, we have entered the era of big data. How to effectively analyze and use the data has been a hot research direction. So the research of distributed database came into being to adapt to this research requirement. Sometimes the traditional genetic algorithm can't generate...
Examination affairs management is a bottleneck of the examination management information system because of its complex process, many participants and its confidentiality requirements. To solve this problem, an automated management information system of the examination affairs is present in this paper. In the system the examination affairs is controlled by the workflow based on forms, and its security...
In this paper a new vulnerability detecting method is proposed to detect buffer boundary violations. The main idea is to use the metric of array index manipulation rather than using any heuristic method. We employ a SVM-based classifier to classify the vulnerable functions and innocent functions. Then the vulnerable functions are fed to function call graph guided symbolic execution to precisely determine...
Measuring the solid density of mass standard is very important factor for measuring its mass. There are different National Metrology Institutes (NMIs) designed a system to measure solid density in different ranges of mass standard. This paper will describe the system that used to measure the solid density in National Institute for Standard (NIS) -- Egypt. Additionally, a controlled system is designed...
The Patent Cloud Platform is under construction in Chongqing. As the most important part of the Patent Cloud Platform, the Patent Data Resource Service Center is urgent. Tens of millions of patent data from seven countries and two organizations would be shared for public. For the heterogeneous of patent data from different data sources, some essential pre-processing methods should be carried out to...
In this study, we applied reinforcement learning to actual quadrotor unmanned aerial vehicles (UAVs). It is expected that UAVs will contribute to multiple fields (e.g., rescue, sports, and entertainment). However, the autonomous control of UAVs is still a difficult problem to solve. We applied reinforcement learning to a UAV to achieve stable hovering. Q-learning, a common reinforcement learning method,...
In order to preserve more image original feature information in the process of image denoising, this paper proposes a novel image noise detection algorithm which makes use of 8 orientation fractional-order differential gradient. The main ideas are that we firstly detect image pixel gray value change using 8 orientation fractional-order differential gradient operator, secondly carry out logical AND...
Recently, the query on uncertain data attracts much attention and it is great significance for probabilistic reverse k neighbor query on uncertain data based on location-based services (LBS). However, the relevant research is less and immature. Probabilistic reverse k nearest neighbor (PRkNN) requests the query point of reverse k neighbor query and the probability is greater than the given threshold...
Spam emails has brought great distress to people and most of them spread in the manner of embedded spam images, which makes the traditional filtering difficult to detect. With the efforts of many scholars, spam recognition rate is getting better and better, but some researches ignore the importance of reducing the error rate. Thus an improved method of multiple features fusion is proposed in this...
Application of the particle swarm optimization (PSO) is studied for the prediction of passenger car 100 km fuel consumption, and the sample data is processed by the principal component analysis. The PSO is introduced to optimize the kernel function parameter and penalty factor parameter, which are predicted by the least squares support vector regression (LSSVR). In order to overcome the weakness of...
Because the traditional aircraft trajectory prediction methods are difficult to solve the complex trajectory fitting function and the accuracy of predicted trajectory is not high enough, aircraft trajectory prediction based on genetic programming is proposed in this paper. First of all, aircraft flight trajectory data is normalized processing. And then the reasonable set of function and fitting evaluation...
We use bigraph to represent each state in the bigraphical reactive systems (BRS) in which the problem of matching for bigraphs is extremely important. This problem has been referred in many papers, but in these papers only bigraphs with simple structure (i.e. a bigraph has no sites, outer names or inner names) were given as example, what's more, they gave no a specific algorithm. So, they do not make...
In order to increase the classification accuracy, the paper presents a novel feature grouping method, which is based on random forest variable importance measures. We applied the method to the classification of growing areas of tobacco and also compared it with other methods. The results showed that our proposed method efficiently got the optimal feature subset and can be used to identify the growing...
With memory information as characteristic, a classified method to detect APT (Advanced Persistent Threat)Trojans in cloud computing is proposed in this paper. Memory analysis and fuzzy C-means (FCM) algorithm based on the optimized initial cluster centers detects the similarity of the APT Trojans. Without influence normal operation of virtual machine in cloud, the classifier can determine whether...
In order to carry out high speed and effective digital image processing, the use of FPGA is a relatively reasonable choice due to the large amount of data in digital image. Thus we need a careful simulation test to verify the correctness of the VHDL code to achieve the corresponding algorithm. It is difficult to achieve the digital image processing algorithm simulation if we rely on the traditional...
Imbalanced data existed widely in various fields. The classification problem of imbalanced data is a hot issue in machine learning. Existing algorithms on imbalanced data classification processed data without putting enough attention on the positive boundary samples which were prone to misclassification, and the cost that the positive samples were misclassified is much larger than the cost that the...
There are more and more users to use mobile application to get the cooking recipe information, but to recommend right recipe for each user is challenging for the complex food and diet information. In this paper, a hybrid recommendation system is proposed for personalized recipe mobile application. We describe a scalable recommendation system to process the massive data from mobile applications based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.