The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Field soil investigation prior to the foundation design of any structure is a must for the design engineer. Since the cost of such operation is rather high, then it is sometimes impractical. The design and the preliminary cost estimation of the construction are then impossible to be prepared. This paper applies Geographical Information System - GIS all over Bangkok area thus enable engineer to retrieve...
The amount of speaker specific information in speech signal varies from frame to frame depending on spoken text and environmental conditions. A frame selection at the preprocessing stage can be an added advantage in this context. In pre-quantization (PQ) we select a new sequence of frames Y from the original frames X such that length of Y is less than X. In this paper, we first analyze a number of...
We apply a new bootstrap statistical technique to distinguish between dasiaskillpsila and dasialuckpsila for individual funds. This methodology allows for non-normality in the idiosyncratic risk of the funds-a major issue when considering those funds which appear to be either very good or very bad performers, since these are the funds which investors are primarily interested in identifying. Our bootstrap...
According to the actual situation in the integrated statistical work of coal enterprise in our country now, we determined using the exploitation method of combining SAD and object oriented by analyzing the system's function characteristic, has established the composite structure model which C/S and B/S unify. The system has realized many essential functions such as the technical specification dynamic...
Support Vector Machine has the convenient superiority in the classification. Recently it has been extended to the domain of regression problems. However, due to the increasing index, excess input data and complicated system structure, it is difficult to achieve good accuracy in results. This paper adopts combination method of rough set and support vector machine so as to establish rough set attribute...
In this paper, first raised the possibility of such a tendency on services framework - a degree of dependence. The framework and support-confidence framework completely different. D database is the tendency of the incident and the extent of the incidents linked to the degree of measure contains rules. Comparatively speaking, more direct causal relationship between the events described, a more effective...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
We present a novel method, which reads the database at regular intervals as in dynamic itemsets counting technique and creates a tree called dynamic itemset Tree containing items which may be frequent, potentially frequent and infrequent. This algorithm requires less time to discover all maximal frequent itemsets since it involves a method for reducing the size of the database. This method prunes...
Generally, link analysis is based re-ranking Web-page retrieval in current Web search engine. The primary reason lies in the difference of link structures and data scale between global Web and Web site. In this paper, we propose a framework to construct implicit link structure by using frequent sequence miner (FS-Miner) in the user Web log. And then, the page rank algorithm is applied to re-ranked...
In a typical peer to peer system, each node is owned and operated by an independent entity, and the nodes collectively form a self-organizing, self-maintaining network with no central authority. The peer to peer technology has attracted a significant amount of interest because of its capacity for resource sharing and content distribution. The existence of high degree of free riding is a serious threat...
Majority information promulgators adopt the messages deliver technology to achieve coverage rates, simultaneously have also caused the massive trash short messages. This paper presents an algorithm of mining the leading users in the network and sends them the user-targeted SMS message. First, build the SMS network, and define the relations, then analyze the network and mining the users who have more...
In traditional ways, the quality and schedule of Web-based information publishing system development cannot be guaranteed due to the rapid change of requirement. In this paper, the requirement of system is translated into information through the requirement manage model, document of system can be accomplished automatically. This model customizes information publishing neatly, relieves the developers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.