Many attempts on improving entity grid model have been made and boost the research on text ***,only a few of them applied it to noisy data domain and students' ***,we proposed a novel discourse coherence model,whi...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Many attempts on improving entity grid model have been made and boost the research on text ***,only a few of them applied it to noisy data domain and students' ***,we proposed a novel discourse coherence model,which is based on entity grid model,to evaluate coherence on Chinese students' *** allusion to the feature of Chinese students' essay,frequently using lexical repetition and coreference methods in coherence essay,we designed a coreference module,instead of clustering algorithm or knowledge base search methods,to integrate with the enhanced coherence *** addition,we fully merged coreference feature into similarity assessment of adjacent sentences,and the semantic *** show that our model outperforms entity-based model and LSA methods and has an ideal effect on students' essay automatic assessment.
In this paper, a blind image deconvolution method which is derived from Bayesian probabilistic framework is proposed. A robust prior named Gaussian Scale Mixture Fields of Experts(GSM FoE) and a prior that is constr...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In this paper, a blind image deconvolution method which is derived from Bayesian probabilistic framework is proposed. A robust prior named Gaussian Scale Mixture Fields of Experts(GSM FoE) and a prior that is constructed with the l-norm( p≈1.5) are adopted to regularize the latent image and the point spread function(PSF) respectively. We use a two phase optimization approach to solve the resulted maximum a-posteriori(MAP) estimation problem, and a simple gradient selecting method is incorporated into the alternating minimization to improve the accuracy of the estimated PSF. Experiments on both synthetic and real world blurred images show that our method can achieve results with high quality.
We formulate the deconvolution problem by combining the negative logarithmic Poisson likelihood with the total variation(TV) regularization, and present a fast algorithm which is based on the method of Lagrange multip...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
We formulate the deconvolution problem by combining the negative logarithmic Poisson likelihood with the total variation(TV) regularization, and present a fast algorithm which is based on the method of Lagrange multiplier to solve it. In the proposed algorithm, the original problem is converted into two sub-problems. One is a simple convex optimization problem which has a closed-form solution. While the other is a conventional deconvolution problem based on the Gaussian noise model, which can be solved efficiently with the variable splitting and penalty technology. The minimizer is reached by alternately solving the two problems for only a few iterations. Experimental results show that the algorithm runs very fast and can achieve restored image of high accuracy.
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this resea...
详细信息
ISBN:
(纸本)9781467390880
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations. Further potential research topics are also discussed with case study and simulation.
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,th...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,the process of which is called role *** have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment(UPA) relationships are *** this paper,we define the evaluation criterion and the 8-Approx Important Role Mining Problem(δ-IRMP) which is proved to be NP-complete first,then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions ***,we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover, the capacity of the port cold storage is of great importance to the cold chain network as most of catch is handled and temporarily stored at seaports. Here, a multi-product, three-echelon and multiperiod network model is applied to a distant-water fishery cold chain design problem based on capacities. This network-design includes optimal cold storage facility locations and optimal flow amounts. And a two-stage stochastic programming method is used to handle the uncertainties.
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objecti...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objectives, and derives futures of comment distribution from three aspects, i.e., quantity, time and spa psychological rhythms and time arrangement. And the space of comment distribution is associated with regional economic levels, geographical locations and statuses. The study also finds that news with different themes or events has remarkable differences in comment distributions.
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are l...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are less than satisfactory because of many complex factors. Therefore, in order to find these factors and improve the classification accuracy, we describe the details of classification methods with logistic regression and support vector machine algorithm, then discuss the impact of different methods on classification results and the factors that affect the classification accuracy in one *** that we briefly introduce the image feature extraction which plays a necessary role of image classification.
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family ...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family of software *** this paper,we propose a framework to detect the missing common requirements in the context of software product *** framework mainly consists of two parts:a set of rules to extract the common requirements,the dependency relationships among them and a procedure for detecting the omission in an incoming set of *** experiments are conducted on a group of medical applications to validate our *** results indicate that our proposed framework is effective.
Learning from fast data stream is one of the most challenging tasks in data stream mining. The fact that data streams are unbounded sequences, highlights exclusive challenges in contrast to classifiers from batch data...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Learning from fast data stream is one of the most challenging tasks in data stream mining. The fact that data streams are unbounded sequences, highlights exclusive challenges in contrast to classifiers from batch data. Most of methods aren't naturally parallel and thus their scalability is limited. This paper proposes a scalable data stream Bayes classifier utilizing a new estimation(DIB). The new estimation takes conjugate Dirichlet prior as parameter's prior distribution and thus improves the predictive accuracy. Meanwhile, this paper proposes a new distributed implementation of DIB on Flink. Experiments show that DIB classifier significantly outperforms Na?ve Bayes in terms of accuracy. Also, the experiment proves parallel DIB running on Flink enhances the throughput and reduces execution time.
暂无评论