In multidimensional data analysis, the facts have different granularities, the membership relation of dimension levels are partially contained, such factors will affect the results39; veracity and validity. This pap...
详细信息
ISBN:
(纸本)9781424455379
In multidimensional data analysis, the facts have different granularities, the membership relation of dimension levels are partially contained, such factors will affect the results' veracity and validity. This paper describes the imprecise information caused by the above factors, espectially analyses the impact on group and aggregate operaters, and gives pessimism, optimism and compromise three different approaches to handle with these imprecise information.
The design meta-intent information is a kind of information about design rationale for design intent objects such as features, parameters and constraints. Based on the design meta-intent representation model this pape...
详细信息
ISBN:
(纸本)9781424455379
The design meta-intent information is a kind of information about design rationale for design intent objects such as features, parameters and constraints. Based on the design meta-intent representation model this paper explores an ontology-based semantic query and reasoning method for design meta-intent information. A Jena-based semantic query process framework is presented. The user's queries for features, parameters and constraints about design rationale are converted into design meta-intent semantic queries which can be input by text and interactively selecting from visual feature model. A better query results can be achieved for different query terms by semantic reasoning in the process of design modification, design reuse or collaborative design.
Semantic interoperability challenges emerged when comes to financial system integration and information exchange. This paper presents a component-based approach for financial information semantic interoperability. In ...
详细信息
ISBN:
(纸本)9781424455379
Semantic interoperability challenges emerged when comes to financial system integration and information exchange. This paper presents a component-based approach for financial information semantic interoperability. In the approach, taxonomies in XBRL GL have been modeled as core components in CCTS, which act as common understandings for interoperability participants. Additionally, guidelines for selecting and reusing these component-based XBRL GL taxonomies would be introduced to instruct users to assemble contextualized financial information.
in recent years, greenhouse technology in agriculture is to automation, informationtechnology direction with the IOT (internet of things) technology rapid development and wide application. In the paper, control netwo...
详细信息
ISBN:
(纸本)9781424455379
in recent years, greenhouse technology in agriculture is to automation, informationtechnology direction with the IOT (internet of things) technology rapid development and wide application. In the paper, control networks and information networks integration of IOT technology has been studied based on the actual situation of agricultural production. Remote monitoring system with internet and wireless communications combined is proposed. At the same time, taking into account the system, information management system is designed. The collected data by the system provided for agricultural research facilities.
Students are poorly motivated in university ideological and political course for the complex theory and obsolete teaching method. To use the multimedia technology appropriately in the teaching of ideological and polit...
详细信息
In this paper, four typical phenomena in the Integration of information Communication technology (ICT) into Curriculum were introduced and analyzed based on the specific cases of classroom teaching and the teachers3...
详细信息
ISBN:
(纸本)9781424455379
In this paper, four typical phenomena in the Integration of information Communication technology (ICT) into Curriculum were introduced and analyzed based on the specific cases of classroom teaching and the teachers' description. The reasons were deemed to be: the unclear guidelines, the lack of teachers' inner driving force, no form of the integration of ICT into curriculum from system point of view. Besides, the integration of ICT into curriculum could be effectively facilitated if we could help teachers use technology to establish the inner driving force through "samples" and encourage teachers to become researchers.)
The failure recovery issue in Ethernet technology is becoming more important than it used to earlier, reason being now Ethernet is not restricted to LAN level only. Very widely it is getting used in the MAN level also...
详细信息
ISBN:
(纸本)9781424455379
The failure recovery issue in Ethernet technology is becoming more important than it used to earlier, reason being now Ethernet is not restricted to LAN level only. Very widely it is getting used in the MAN level also. So network administrator can't handle if it takes the same time to recover the failure as in the LAN level This paper presents a dynamic algorithm named "Dynamic Spanning Tree Recovery" protocol (DSTR protocol) that gives fast recovery from the link failure and at the same time it is allowing the sender to go on with its normal execution.
as the classical algorithm of the decision tree classification algorithm, ID3 is famous for the merits of high classifying speed easy, strong learning ability and easy construction. But when use it to classify, there ...
详细信息
ISBN:
(纸本)9781424455379
as the classical algorithm of the decision tree classification algorithm, ID3 is famous for the merits of high classifying speed easy, strong learning ability and easy construction. But when use it to classify, there does exist the problem of inclining to chose attributions which has many values, which affects its practicality. This paper for solving the problem a decision tree algorithm based on attribute-importance is proposed. The improved algorithm uses attribute-importance to increase information gain of attribution which has fewer attributions and compares ID3 with improved ID3 by an example. The experimental analysis of the data show that the improved ID3 algorithm can get more reasonable and more effective rules.
To help handle battlefield information superiority to decision superiority (i.e. to rapidly arrive at better decisions than adversaries can respond to), many scientific, technical and technological challenges must be ...
详细信息
ISBN:
(纸本)9781424455379
To help handle battlefield information superiority to decision superiority (i.e. to rapidly arrive at better decisions than adversaries can respond to), many scientific, technical and technological challenges must be addressed. The most critical of those are information fusion and management at different levels, communication. This paper decribes battlefield information as data streams and mining it using ensemble classifiers, and focusing on handling noisy and concept drift datas. Our theoretical and empirical study shows that our framework is superior and more robust to averaging ensemble for noisy battlefield information data streams.
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance ...
详细信息
ISBN:
(纸本)9781424455379
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective risk measurement. This paper presents an enterprise level IT risk assessment framework and a tool that is based on the framework which organizes IT risks into five categories: infrastructure development and support, operations and maintenance of business process, office level support, software development and outsourcing management. The approach helps assess and identify IT risks at the enterprise level.
暂无评论