With the development of information science and modern technology,it becomes more important about how to protect privacy *** this paper,a novel privacy-preserving support vector machine(SVM) classifier is put forward ...
详细信息
With the development of information science and modern technology,it becomes more important about how to protect privacy *** this paper,a novel privacy-preserving support vector machine(SVM) classifier is put forward for arbitrarily partitioned *** proposed SVM classifier,which is public but does not reveal the privately-held data,has accuracy comparable to that of an ordinary SVM classifier based on the original *** prove the feasibility of our algorithms by using matrix factorization theory and show the security.
The notion of a knowledge graph was proposed by Google to enable semantic search with information gathered from different sources. Formally, a knowledge graph is a knowledge base with graph structure, where the nodes ...
详细信息
The notion of a knowledge graph was proposed by Google to enable semantic search with information gathered from different sources. Formally, a knowledge graph is a knowledge base with graph structure, where the nodes are entities(which can be instances or concepts) and the edges are relations between entities. It can be also considered as a special kind of semantic network which is a directed and labeled graph used to encode knowledge. The construction of a knowledge graph is a complex task as it involves requirement engineering, source identification, knowledge extraction, knowledge cleaning, knowledge fusion, knowledge reasoning, etc. Recently, many techniques have been developed to the construction of a knowledge graph, especially extracting knowledge from encyclopedias, such as wikipedia. Information extraction techniques, such as relation extraction, have been widely used to construct knowledge graphs from plain texts, and ontology reasoning techniques are applied to infer implicit knowledge from a knowledge graph. In this talk, we will introduce the techniques for knowledge graph construction, formal languages used to represent knowledge and techniques for reasoning with knowledge. We will first give an overview of knowledge engineering and knowledge graph. Then some key techniques for extracting knowledge from the Web will be introduced. Techniques for reasoning with knowledge and tools for large scale reasoning will also be introduced. After that, we will talk about some typical applications of knowledge graph techniques. Finally, we will give some advice on future direction of knowledge graph techniques.
In this paper,we present a novel mesh-guided texture replacement tool using intrinsic *** system begins with indicating the region of interest by the user's interactive segmentation,then decomposes the segmented r...
详细信息
In this paper,we present a novel mesh-guided texture replacement tool using intrinsic *** system begins with indicating the region of interest by the user's interactive segmentation,then decomposes the segmented region into the reflectance and illumination components using intrinsic image recovery *** that,we generate a triangle mesh to guide the computation of texture coordinates with the interest *** texture coordinates for retexturing are further ***,when the target sample texture is specified,the retexturing image is created by multiplying the modified reflectance component by the original illumination component within the replaced *** demonstrated later, our mesh-guided approach can produce high quality texture editing results such as image retexturing and texture transfer, while the lighting and shading effect on the original image is well preserved.
Cooperative communication is proved to effectively mitigate fading,achieve high spectrum efficiency and improve transmission capacity for wireless networks by means of spatial *** increasing work is extended to cooper...
详细信息
Cooperative communication is proved to effectively mitigate fading,achieve high spectrum efficiency and improve transmission capacity for wireless networks by means of spatial *** increasing work is extended to cooperative medium access control(MAC) protocol design.A relay preselection and contention-based cooperative MAC(RPCB-CMAC) protocol is proposed to alleviate the negative effect of low rate nodes which take more time to transmit the same data than high rate *** the protocol,the sender preselects two candidate relays through its local relay-information table,and sets different priorities to these two candidate relays by relay utility which reflects how much time can be saved per *** the handshake between the sender and the receiver,two candidate relays can obtain rate information among the sender,the receiver and themselves to judge whether they can provide cooperation *** they can,then they contend to become the final relay based on their *** results show that compared to basic RTS/CTS scheme and CoopMAC,the proposed protocol can improve the network performance.
Linear discriminant analysis has gained extensive applications in supervised classification and dimension reduction. In LDA formulation,original patterns with high dimension can be projected to lower dimension through...
详细信息
Linear discriminant analysis has gained extensive applications in supervised classification and dimension reduction. In LDA formulation,original patterns with high dimension can be projected to lower dimension through a transfer matrix which is fundamental to clustering,nearest neighbor searches,and *** transfer matrix is usually viewed as a distance metric. However,the classification accuracy under the LDA metric is neither optimal nor suboptimal because physical datasets often appear multimodal *** paper proposes a penalized scheme for LDA to improve the classification rate by using the information of misclassified *** method is evaluated to be robust and effective by a great number of datasets from the machine learning repository.
Based on the effective learning environment and multiple intelligence theory,by using a gaming concept in the learning environment,an education game design model to Teach Chinese as a Foreign Language can be proposed ...
详细信息
Based on the effective learning environment and multiple intelligence theory,by using a gaming concept in the learning environment,an education game design model to Teach Chinese as a Foreign Language can be proposed and the detailed steps of the design can be *** proposed design model is applied to design and implementation an education network game——East Leaning,and the questions of how to combine the characteristics of education game design,design model and game contents with curriculum content is ***,the game is developed using a game engine and the C++ *** successful development of the game not only allows players to complete various tasks in the virtual situations to achieve the educational purpose of learning Chinese language and culture, but also provides some reference for the future development of similar games.
A self-powered wireless ultrasonic flow sensor system has been designed and developed from a system level approach in this *** using small-sized hydroelectric generator as the source of power for commercial low power ...
详细信息
A self-powered wireless ultrasonic flow sensor system has been designed and developed from a system level approach in this *** using small-sized hydroelectric generator as the source of power for commercial low power microcontrollers, energy harvesting circuitry,and GPRS transmitters,the sensor is capable of detecting water flow in water pipelines network.A major feature of this sensor system is its power-management unit, able to recharge batteries with energy harvested from the smallsized hydroelectric generator installed in water *** allows the sensor to sustain operation as a general-purpose wireless acquisition device for remote sensing in large coverage areas,where the power to run the devices is always a *** addition to describing the overall architecture,hardware and software of the sensor,the paper also reports on the performance of the module in the water pipelines network,emphasizing the energy issues,crucial to obtain self-sustained *** testing was done in two stages:the first in the laboratory,to validate the management and solutions under particularly severe conditions,the second stage in a water pipelines *** measurements about the behaviors of the sensor confirm that the hardware and software solutions proposed do indeed lead to good performance.
In this paper,empirical investigation results on degree distribution and disassortativity of four open software systems have been presented with the view of reasonable description of software *** make use of a directe...
详细信息
In this paper,empirical investigation results on degree distribution and disassortativity of four open software systems have been presented with the view of reasonable description of software *** make use of a directed software coupling network to characterize and describe the macroscopic properties of four open software *** reviewing of the degree distribution of four open source software and find that the indegree distribution is of scale-free property but the out-degree distribution can be well described by stretched exponential *** then we examine disassortativity of the software coupling network,and draw a conclusion that software coupling network is disassortative mixing in undirected versions, and negative correlation between two classes of directed SCNs has existed.
Cloud architectures have become increasing common in the IT industry and academic circle. However, most cloud architectures only focus on availability but ignore economic effectiveness. Based on Eucalyptus, this paper...
详细信息
Cloud architectures have become increasing common in the IT industry and academic circle. However, most cloud architectures only focus on availability but ignore economic effectiveness. Based on Eucalyptus, this paper proposes an effective way to balance high availability and economic profits. We designed a forecast mechanism using three new modules: the forecast module, adjustment module, and collection module. The forecast module uses a set of machine learning techniques to improve forecast accuracy. We carried out a comparative experiment and the experimental results prove the efficiency of the proposed forecast mechanism.
It is an important issue for information system to make use of knowledge and experience of domain experts to encapsulate larger granular services with original services,thus it can quickly meet users' requirement ...
详细信息
It is an important issue for information system to make use of knowledge and experience of domain experts to encapsulate larger granular services with original services,thus it can quickly meet users' requirement changes and add value to *** this paper,we propose a service composition framework based on business process template named Service Composition Model Based on Business Process Template (SCMBPT),to define and encapsulate general business processes, so users can search a template and find a match according to their *** unified interfaces of template at design phase are bound to specific services by reading the service configuration file at run *** model is able to deal with changes of business process and solve the insufficiency of flexibility in enterprise information system to some *** the end,we validate SCMBPT with a concrete business scenario.
暂无评论