The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce a method for learning to find the representative syntax-based context of a given collocation/phrase. In our approach, grammatical patterns are extracted for query terms aimed at accelerating lexicographers' and language learners' navigation through the word usage and learning process. The method involves automatically lemmatizing, part-of-speech tagging and shallowly parsing the sentences...
The Semantic Web is a project and vision of the World Wide Web Consortium to extend the current Web, so that information is given well-defined meaning and structure, enhancing computers and people to work in cooperation. Semantic technologies are being added to enterprise solutions to accommodate new techniques for discovering relationships across different database, business applications and Web...
We have implemented a systematic method that can improve cancer classification. By extracting significant samples (which we refer to as support vector samples because they are located only on support vectors), we can let the back propagation neural networking (BPNN) to learn more tasks. We call this approach the multi-task support vector sample learning (MTSVSL) technique. We demonstrate experimentally...
In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations between information granules including fuzzy sets formed both in the input and output spaces. The context within which such relationships are being formed is established by the system developer...
In order to improve the accuracy of network access selection in heterogeneous network, this paper presents a network access selection algorithm based on the Analytic Hierarchy Process (AHP) and Gray Relation Analysis (GRA), which is an integrated approach to multiple criteria decision making, from the whole take into account the various correlative parameters, ensure the mobile users accurately choose...
Context is a key factor for providing intelligent service in ubiquitous computing environment. The usefulness of context is based on its correctness. As the context plays a crucial role in service performance, it is necessary to guarantee the reliability of context. But, it is almost impossible to scan the full aspects of the environment for the limited computing capability and unlimited modality...
The Authorization Management in Grid Systems has various structures. This paper proposes an identity-based authorization mechanism which using IBE algorithm for key exchanging and PMI for policy decision. Our scheme could satisfy the demands of the process from access requests committed by users to the authorized access control. The security level of the scheme is lower than the systems based-certificates...
With the development of information technology, multimedia technology has been widely applied in the field of college English instruction in China. This paper makes an exploration of the theoretical background of multimedia application in educational field, followed by the analysis of its advantages and existing problems. Finally, the paper comes to the conclusion that we can fulfill the target of...
This paper examines the needs of custom robotics control software applications that share a commonality but require various operator GUI's and how to accommodate for those changes using power of Windows Presentation Foundation (WPF) framework and Model View ViewModel (MVVM) design pattern as a next step from traditional Model View Controller (MVC) pattern and its derivatives.
Knowledge and its management are considered as a foundation for creating competitive advantages in organizations. However, most of large companies have allocated plenty of resources to knowledge management; implementing knowledge management projects in an organization requires essential organizational changes. Organizational readiness in knowledge management leads to successful implementation of these...
In recent years, researchers have paid attention to image retrieval increasingly. By increasing the image volumes in databases, symbolic image that were used as summaries for physical images, seemed a good approach. This images are retrieved with shorter time than physical images and are cost-effective. In this research we introduce a new approach for symbolic image indexing and retrieving by using...
Spread of mobile penetration technologies and location independence of this tool has caused to increase the demand for mobile applications. Governments attempt to implement m-government and their applications to improve the efficiency and effectiveness of services provided for citizens significantly. in many countries M-government implementation is in its infancy.. only one model is presented for...
Service-oriented architecture provides effective techniques to build new commercial bank. An implementation program of the business, the semantics and a three-layer service-oriented architecture are proposed in this paper. The knowledge object of the banks' business domain is classified through knowledge modeling; the semantic description, the relationships and levels of business concepts are given;...
This paper proposes a classification method based on Complex Event Processing (CEP) for mammogram images. For breast cancer detection and early prevention, several factors must be considered. Mammogram is important and effective in breast cancer diagnosis. The Radiologist must analyze visually, based on his expertise, to determine whether it is cancer or not. We explore the use of CEP for breast cancer...
The use of Google's Android SDK provides the necessary programs to develop their own, has become the goal of the program designers. However, this phone offers the Google Map application, use the function rather limited, only provides a search, routes, maps, models, my location, location by adding features such as Google, but they cannot make use of this map we get a target-oriented The purpose, such...
Continuous Data Protection (CDP) techniques have received great interest both from academia and industry in recent years. Aiming at the challenges to design and implement a CDP system, this paper proposes GSP_BCDP: a novel continuous data protection architecture at block level. Compared with other approaches, it uses a global shared storage pool to actually store all the versions of data contents,...
In order to overcome deficient using character of skin segmentation and calculate much of template matching, The paper presents a method of Face Detection Based On Skin Segmentation and Template Matching. In the study of threshold in skin segmentation, the paper presents an adaptive threshold based on amount of pixels and presents a search method of mirror image. In the study of template matching,...
Distance Education retrieval is the most striking image retrieval and video retrieval, this paper presents a distance-oriented multimedia information retrieval system of multi-modal, and in the application of SVM support vector machine relevance feedback algorithm image classification conducted a preliminary attempt.
Distributed compression of multiple sources such as the nodes of wireless sensor networks has been focus of research to exploit spatial redundancy of the data being sensed by different sources. In sensor networks data gathered by the sensor nodes is spatially as well as temporally correlated. The scheme proposed in this paper exploits the temporal redundancy of the data gathered by single node by...
Image segmentation is an important image analysis technique, the segmentation result of which is critical to determine the performance of high-level modules in image processing system. After a brief introduction LLT image segmentation algorithm, focusing on analysis of the inadequacies of LLT algorithm, propose an improved ILLT image segmentation algorithm. Experiments show that the algorithm improves...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.