首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The IIP conference series provides a forum for engineers and scientists in academia,university and industry to present their latest research findings in any aspects of intelligent information processing.IIP 2012 attempts to meet the  相似文献   

2.
The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests.  相似文献   

3.
Tree Expressions for Information Systems   总被引:1,自引:0,他引:1       下载免费PDF全文
The discernibility matrix is one of the most important approaches to computing positive region, reduct, core and value reduct in rough sets. The subject of this paper is to develop a parallel approach of it, called "tree expression". Its computational complexity for positive region and reduct is O(m^2 × n) instead of O(m × n^2) in discernibility-matrix-based approach, and is not over O(n^2) for other concepts in rough sets, where rn and n are the numbers of attributes and objects respectively in a given dataset (also called an "information system" in rough sets). This approach suits information systems with n ≥ m and containing over one million objects.  相似文献   

4.
This paper makes a brief introduction of the principle of Principal Component Analysis (PCA). Then according to the information entropy theory, and making full use of the inherent characteristic of eigenvalues of correlation matrix of data, the 2^nd information function, the 2nd information entropy and geometry entropy under PCA are proposed firstly, by which the information features of PCA are metricized. In addition, two new concepts of Information Rate (IR) and Accumulated Information Rate (AIR) are proposed, which are used to illustrate the degree of information feature extraction of PCA. In the end, through simulated application in practice, the results show that the method proposed in this paper is efficient and satisfactory. It provides a new research approach of information feature extraction for pattern recognition, machine learning, and data mining and so on.  相似文献   

5.
NTIS (National Science & Technology Information Service) collects national R&D information through the connection system in real time with specialized institutions under government ministries for R&D information service. However, because the information connection between the research management systems in each ministry (institution) and the NTIS is different, it is not easy to operate the connection system, and immediate data collection is thus not ensured. This study aims to propose an information connection model to be applied on the NTIS-like systems. To do this, we examine methods or styles of information connection and compare strength and weakness of connection methods. In this paper we also understand issues or characteristics of the methods through analyzing current information connection methods applied on the NTIS. Therefore, we design a rule-based information connection platform to minimize the information connection issues. Based on the platform, we also propose an information connection model.  相似文献   

6.
CM (contelat management) is a strategic discipline that should support the information assets of a company. Although there are some technological instruments structuring this work, the methods that have been used must have improvement to a better use. In this sense, IA (information architecture), as a process that helps users to manage and find information, can collaborate with the organization of this assets allowing the best identification and categorization of information, as well as providing improvements in the website navigation in Intranets and Internet. This article introduces part of a research that deals with the use of IA for developing and structuring the project of Dataprev about the content management for Brazilian social security system.  相似文献   

7.
Web Service is a standard-based software technology. It sets service-oriented development, deployment and integration as its basic jumping-off place, and has become the primary publishing mechanism and organization framework in the environment of distributed computing and services in Internet. Currently, especially in distributed applications of large scaled spatial information, due to user's strong dependence on data formats and platforms of certain GIS(Geographical Information Systems) manufacturer, there are obvious difficulty and complexity in inter-platform spatial information exchange and system development. In this paper, the concrete design and implementation of an integration and interoperation platform that aims to solve heterogeneity and on-line service for geographical information is presented first. This platform concentrates on implementation to shield heterogeneity among spatial data sources and services through a common spatial data transmission and exchange format-GML. In addition, QoS control for WebGIS Services of the integration and interoperation platform is expatiated from different aspects: cache mechanism, GML(Geography Markup Language) data compression, map on-line generation, etc.  相似文献   

8.
The recent rapid development in information systems (ISs) has resulted in a critical need for integration and interoperability between heterogeneous ISs in various domains, using specific commonalities. However, stovepipe systems have been caused due to inconsistencies in planning IS architecture among stakeholders. So far, there has been no research on an enterprise architecture framework (EAF) that can satisfy with the coefficient factors of system architecture (SA) and enterprise architecture (EA). This paper proposes a new EAF that can resolve the problems inherent in existing legacy EAFs and their features. EAFoC (Enterprise Architecture Framework based on Commonality) is based on commonality that can be satisfied as the coefficient factors in both SA and EA within a common information technology (IT) domain. Thus, it should be possible to integrate an established heterogeneous framework for each stakeholder's view. Consequently, the most important contribution of this paper is to establish the appropriate EAFoC for the development of consistent IS architecture, smooth communication among stakeholders, systematic integration management of diversified and complicated new IT technologies, interoperability among heterogeneous ISs, and reusability based on commonality with other platforms.  相似文献   

9.
With the increasing popularity of Internet, more and more developers are collaborating together for software development. During the collaboration, a lot of information related to software development, including communication and coordination information of developers, can be recorded in software repositories. The information can be employed to construct Developer Social Networks (DSNs) for facilitating tasks in software engineering. In this paper, we survey recent advances of DSNs and examine three fundamental steps of DSNs, namely construction, analysis, and applications. We summarize the state-of-the-art methods in the three steps and investigate the relationships among them. Furthermore, we discuss the main issues and point out the future opportunities in the study of DSNs.  相似文献   

10.
Spatio-temporal databases aim at appropriately managing moving objects so as to support various types of queries. While much research has been conducted on developing query processing techniques, less effort has been made to address the issue of when and how to update location information of moving objects. Previous work shifts the workload of processing updates to each object which usually has limited CPU and battery capacities. This results in a tremendous processing overhead for each moving object. In this paper, we focus on designing efficient update strategies for two important types of moving objects, free-moving objects (FMOs) and network-constrained objects (NCOs), which are classified based on object movement models. For FMOs, we develop a novel update strategy, namely the FMO update strategy (FMOUS), to explicitly indicate a time point at which the object needs to update location information. As each object knows in advance when to update (meaning that it does not have to continuously check), the processing overhead can be greatly reduced. In addition, the FMO update procedure (FMOUP) is designed to efficiently process the updates issued from moving objects. Similarly, for NCOs, we propose the NCO update strategy (NCOUS) and the NCO update procedure (NCOUP) to inform each object when and how to update location information. Exten- sive experiments are conducted to demonstrate the effectiveness and efficiency of the proposed update strategies.  相似文献   

11.
In this report, we want to touch upon two aspects of teaching mathematics in middle and high school. The first of them is the eternal question of how to teach, to motivate students and make them involved in the educational process, particularly in mathematics, where the most important factor is the natural gifts. The second aspect concerns the question which became very urgent in the modern world: what, in fact, we want to teach the students in a world over-saturated with information of any kind. As a result of the information blowup, two aspects emerge. On the one hand, straight passing over the skills and knowledge to the students becomes irrelevant today (just like a teacher or lecturer, merely speaking to an audience, who is not that relevant for young people, accustomed from childhood to perceive information through dynamic color visuals). On the other hand, there is a change in emphasis in the objective function of the educational process from gaining knowledge to acquisition of skills of working with information, consideration and estimation, and choosing of the optimal strategy of a number of possibilities. This trend can be seen in the selection of problems in the international examination PISA (Program for international Student Assessment), in the new curriculum in mathematics and in the selection of problems in the matriculation exams. These considerations (along with others) make teachers took for rtew forms of teaming, more appropriate to the demands of modernity. In this report we suggest the idea of using a mathematical competition called "Mathematical debate" (mathematical fight) as an integral part of the educational process at different levels of learning mathematics, as an appropriate tool.  相似文献   

12.
We propose a mobility assisted spectrum aware routing (MASAR) protocol for cognitive radio ad hoc networks (CRAHNs), providing robustness to primary user activity and node mobility. This protocol allows nodes to collect spectrum information during a spectrum management interval followed by a transmission period. Cognitive users discover next hops based on the collected spectrum and mobility information. Using a beaeonless mechanism, nodes obtain the mobility information and spectrum status of their neighbors. A geographical routing scheme is adopted to avoid performance degradation specially due to the mobility of the nodes and the activity of the primary users. Our scheme uses two approaches to find either short or stable routes. Since mobility metrics have a significant role in the selection of the next hop, both approaches use a reactive mobility update process assisted by mobility prediction to avoid location errors. MASAR protocol performance is investigated through simulations of different scenarios and compared with that of the most similar protocol, CAODV. The results indicate that MASAR can achieve significant reduction in control overhead as well as improved packet delivery in highly mobile networks.  相似文献   

13.
Online social networks (OSNs) offer people the opportunity to join communities where they share a common interest or objective. This kind of community is useful for studying the human behavior, diffusion of information, and dynamics of groups. As the members of a community are always changing, an efficient solution is needed to query information in real time. This paper introduces the Follow Model to present the basic relationship between users in OSNs, and combines it with the MapReduce solution to develop new algorithms with parallel paradigms for querying. Two models for reverse relation and high-order relation of the users were implemented in the Hadoop system. Based on 75 GB message data and 26 GB relation network data from Twitter, a case study was realized using two dynamic discussion communities:#musicmonday and #beatcancer. The querying performance demonstrates that the new solution with the implementation in Hadoop significantly improves the ability to find useful information from OSNs.  相似文献   

14.
The relatively high percentage of people with disabilities in Europe combined with the facts of ageing population, strong relation of impairment to age, and as State of the Art shows, dissatisfaction or even unawareness of people with disabilities of available assistive technology are revealing the necessity to incorporate a user-centric approach that beyond 2nd generation practices will achieve to provide embedded and built-in accessibility solutions, as well as toolkits for developers, for "engraving" accessibility in existing and emerging mass-market ICT-based products, aiming to make accessibility open, plug and play, personalised and configurable, realistic and applicable in various contexts, keeping always the user in the loop. The AEGIS (Accessibility Everywhere: Groundwork, Infrastructure, Standards) IP (Integrated Project) of the 7th European Framework Programme seeks to determine whether 3rd generation access techniques will provide a more accessible, more exploitable and deeply embeddable approach in mainstream ICT (information and communication technologies). This paper presents the holistic UCD (user-centered design) implementation plan, upon which AEGIS has been based in order to achieve its targets, starting from modelling its target users, in the most efficient way possible.  相似文献   

15.
The advent of the time of big data along with social networks makes the visualization and analysis of networks information become increasingly important in many fields. Based on the information from social networks, the idea of information visualization and development of tools are presented. Popular social network micro-blog ('Weibo') is chosen to realize the process of users' interest and communications data analysis. User interest visualization methods are discussed and chosen and programs are developed to collect users' interest and describe it by graph. The visualization results may be used to provide the commercial recommendation or social investigation application for decision makers.  相似文献   

16.
The APP (Application) store at the Android market is very popular and attractive for most of current smart phone users. A rotary ring type of APP named as Loving SML (Loving Sun-Moon Lake--"爱上日月谭") is an instant information capturer to capture the instant traffic tourism information (info) services and serve as an interactive device for user to know the instant traffic information of SML area where you may want to go. The tourism service is specialized on i3 travel, which is identified as innovation, intelligent, and interesting for all of the visitors coming from all over the world. The captured instant information is provided by the sightseeing cloud from SML-NSA (National Scenic Area) with the integration of infrastructure of VD (vehicle detector), CMS or VMS (changeable (or variable) message sign), CCTV (closed circuit television), AVI (automatic vehicle identification). The technique of AR (augmented reality) is also used to identify how many sparkling places in front of you that you may visit. One can easily know the road performance ahead from you before you plan a trip.  相似文献   

17.
This paper presents the basic definitions for Information Asymmetry Degree (IAD), Information Potential Energy (IPE) and Information Difference (ID). It is discussed that IPE and ID existing dynamically is one of the indispensable conditions, which ensures the manufacturing system operating availability. Networked Mass Customization (NMC) is beneficial for information flowing smoothly across the stages in the system, which results in ID descending gradually and the IPE tending to meet the need of individuation and the diversification of the market.  相似文献   

18.
The Chinese Control Conference (CCC) is an annual international conference initiated by the Technical Committee on Control Theory (TCCT), Chinese Association of Automation (CAA). It provides a forum for scientists and engineers over the world to present their new theoretical results and techniques in the field of systems and control. The conference consists of plenary talks, panel discussions, invited sessions, pre-conference workshops, oral sessions and poster sessions etc. for academic exchanges. The conference proceedings have been selected for coverage in ISTP (Index to Scientific and Technical Proceedings) since 2005, included in the IEEE CPP (Conference Publications Program) since 2006, and cited by E1 since 2006.  相似文献   

19.
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector.  相似文献   

20.
The goal of infrared (IR) and visible image fu- sion is for the fused image to contain IR object features from the IR image and retain the visual details provided by the visible image. The disadvantage of traditional fusion method based on independent component analysis (ICA) is that the primary feature information that describes the IR objects and the secondary feature information in the IR image are fused into the fused image. Secondary feature information can de- press the visual effect of the fused image. A novel ICA-based IR and visible image fusion scheme is proposed in this paper. ICA is employed to extract features from the infrared image, and then the primary and secondary features are distinguished by the kurtosis information of the ICA base coefficients. The secondary features of the IR image are discarded during fu- sion. The fused image is obtained by fusing primary features into the visible image. Experimental results show that the pro- posed method can provide better perception effect.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号