Now a days, user rely on the web for information, but the currently available search engines often gives a long list of results, much of which are not always relevant to the user39;s requirement. Web Logs are import...
详细信息
ISBN:
(纸本)9781467345279
Now a days, user rely on the web for information, but the currently available search engines often gives a long list of results, much of which are not always relevant to the user's requirement. Web Logs are important information repositories, which record user activities on the search results. The mining of these logs can improve the performance of search engines, since a user has a specific goal when searching for information. Optimized search may provide the results that accurately satisfy user's specific goal for the search. In this paper, we propose a web recommendation approach which is based on learning from web logs and recommends user a list of pages which are relevant to him by comparing with user's historic pattern. Finally, search result list is optimized by re-ranking the result pages. The proposed system proves to be efficient as the pages desired by the user, are on the top in the result list and thus reducing the search time.
As the kernel component of scientific documents, mathematical expressions are becoming a new object of searching engines. Different from normal text, mathematical expressions are composed of various kinds of symbols a...
详细信息
ISBN:
(纸本)9781479905607
As the kernel component of scientific documents, mathematical expressions are becoming a new object of searching engines. Different from normal text, mathematical expressions are composed of various kinds of symbols arranged in nonlinear mode, which results in the limitations of traditional full-text information retrieval used for expression searching. In this paper, we discuss the existing search engine of mathematical expressions and introduce the two-dimensional characteristics of mathematical expressions firstly. Then, a data structure of expressing mathematical formulas is designed which contains not only the symbol code but also the mathematical information among symbols. Finally, the indexing algorithm of mathematical expressions is put forward on the basis of the expression data structure. The experimental result shows the effectiveness of the indexing method proposed in this paper.
In order to further illustrate similarity concept and fuzzy method structural,we consider the problem of estimation stump test dynamics parameters in the concrete from data set described in UCI machinelearning *** co...
详细信息
In order to further illustrate similarity concept and fuzzy method structural,we consider the problem of estimation stump test dynamics parameters in the concrete from data set described in UCI machinelearning *** consider this is important for monitoring mixture concrete mechanics in civil engineering by patternrecognition of behavioral(curvature and slope features) of compressive strength and cement–water *** example,to assess aggregates mixture conditions for which the interpretability of the local model parameters is of vital importance and to automatically control or optimize the stump test settings for which the global model.
In the process of describing the degradation process of battery of electric vehicle,degradation models under dynamic running conditions need to be analyzed in order to effectively forecast the remaining useful mileage...
详细信息
In the process of describing the degradation process of battery of electric vehicle,degradation models under dynamic running conditions need to be analyzed in order to effectively forecast the remaining useful mileage and life of *** paper proposed a new method of patternrecognition based on ART2 network to distinguish the degradation mode of the battery of electric ***,the degradation mechanism is analyzed of the battery to extract the features of degradation *** the learning process of ART2 is designed for recognition of the degradation *** that,HMM is applied to research the dynamic changes of the degradation mode and predict future degradation mode ***,experimental analysis based on battery’s charge and discharge data proves the effectiveness of the proposed approach.
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other th...
详细信息
ISBN:
(纸本)9781467345279
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other than an individual's thumb and documented identification proofs. Till date for efficient net banking to be initiated, one has to provide the appropriate user name and password for purpose of authentication. This project introduces a vehicle to take a step forward in easy and more reliable authentication of an individual by providing Face Image along with User Name and Password to the system. In this an individual's face is identified by biometric authentication support with which, only a person whose account is, can access it. However while transferring this sensitive data of user image, from client machine to bank server it has to be protected from hackers and intruders from manhandling it, hence it is transferred using covert communication called Wavelet Decomposition based steganography. As face images are affected by different expressions, poses, occlusions, illuminations and aging over a period of time and it differs from the same person than those from different ones is the main difficult task in face recognition. Whenever image information is jointly co-ordinated in three aspects viz. image space, scale and orientation domains they carry much higher clues than seen in each domain individually. In the proposed method combination of Local Binary pattern (LBP) and Gabor features are used to increase the face recognition performance significantly to compare individual's face presentations. Hence face recognition and representation of Gabor faces are done using E-GV-LBP and CMI-LDA based feature recognition method. Gabor faces uses space, scale and orientation to support accurate face recognition, making net banking easier, authentic, reliable and user friendly.
This book constitutes the refereed proceedings of the 13th internationalconference of the Italian Association for Artificial Intelligence, AI*IA 2013, held in Turin, Italy, in December 2013. The 45 revised full paper...
详细信息
ISBN:
(数字)9783319035246
ISBN:
(纸本)9783319035239;9783319035246
This book constitutes the refereed proceedings of the 13th internationalconference of the Italian Association for Artificial Intelligence, AI*IA 2013, held in Turin, Italy, in December 2013. The 45 revised full papers were carefully reviewed and selected from 86 submissions. The conference covers broadly the many aspects of theoretical and applied Artificial Intelligence as follows: knowledge representation and reasoning, machinelearning, natural language processing, planning, distributed AI: robotics and MAS, recommender systems and semantic Web and AI applications.
datamining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machinelearning, patternrecognition, databases and high performance computing. In whi...
详细信息
ISBN:
(纸本)9781467356930
datamining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machinelearning, patternrecognition, databases and high performance computing. In which Privacy Preserving datamining has the potential to increase the reach and benefits of datamining technology. This allows publishing a micro data without disclosing private information. Publishing data about individuals without revealing sensitive information about them is an important problem. k-anonymity and I-Diversity has been proposed as a mechanism for protecting privacy in microdata publishing. But both the mechanisms are insufficient to protect the privacy issues like Homogeneity attack, Skewness Attack, Similarity attack and Background Knowledge Attack. A new privacy measure called "(n, f)-proximity" is proposed which is more flexible model. Here first introduction about datamining is presented, and then research challenges are given. Followed by privacy preservation measures and problems with k-anonymity and l-Diversity are discussed. The rest of the paper is organised as (n, f)-proximity model, experimental results and analysis followed by conclusion.
Phasor measurement units can provide high resolution and synchronized power system data, which can be effectively utilized for the implementation of datamining techniques. datamining, based on patternrecognition al...
详细信息
ISBN:
(纸本)9781467325950;9781467325967
Phasor measurement units can provide high resolution and synchronized power system data, which can be effectively utilized for the implementation of datamining techniques. datamining, based on patternrecognition algorithms can be of significant help for power system analysis, as high definition data is often complex to comprehend. In this paper three patternrecognition algorithms are applied to perform the datamining tasks. The deployment is carried out firstly for fault data classification, secondly for checking which faults are occurring more frequently and thirdly for identifying the root cause of a fault by clustering the parameters behind each scenario. For such purposes three algorithms are chosen, k-Nearest Neighbor, Naive Bayes and the k-means Clustering.
machinelearning and patternrecognition contains well-defined algorithms with the help of complex data, provides the accuracy of the traffic levels, heavy traffic hours within a cluster. In this paper the base statio...
详细信息
ISBN:
(纸本)9781467325882;9781467325875
machinelearning and patternrecognition contains well-defined algorithms with the help of complex data, provides the accuracy of the traffic levels, heavy traffic hours within a cluster. In this paper the base stations and also the noise levels in the busy hour can be predicted. J48 pruned tree contains 23 nodes with busy traffic hour provided in east Godavari. Signal to noise ratio has been predicted at 55, based on CART results. About 53% instances provided inside the cluster and 47% provided outside the cluster. DBScan clustering provided maximum noise from srikakulam. MOR (Number of originating calls successful) predicted as best associated attribute based on Apriori and Genetic search 12: 1 ratio.
Rule-based systems like learning Classifier System are widely used in areas where datamining, data classification and patternrecognition tasks are essential. It is often difficult to address the knowledge base of th...
详细信息
ISBN:
(纸本)9781479908530
Rule-based systems like learning Classifier System are widely used in areas where datamining, data classification and patternrecognition tasks are essential. It is often difficult to address the knowledge base of these complex classifier systems, which is usually a set of classifiers. Therefore we use evolutionary processes like genetic algorithms to develop their knowledge *** provide modified learning Classifier System enriched by probability model to help build an appropriate knowledge base more effectively. We included a neural network into the action selection process and therefore action can be determined accordingly with a probability model. We provide simulation results which demonstrate efficiency of learning processes to compare these approaches.
暂无评论