This paper presents a new shaped reflector antenna for wide beam azimuthal patterns and a cosecant squared elevation pattern. Elliptical strips instead of parabolic strips are used in horizontal planes of the reflecto...
详细信息
This paper presents a new shaped reflector antenna for wide beam azimuthal patterns and a cosecant squared elevation pattern. Elliptical strips instead of parabolic strips are used in horizontal planes of the reflector surface to achieve this purpose. Simulation and measurement results of the shaped reflector fed by a ridged horn antenna are presented.
Deep parsing of Chinese sentences is a very challenging task due to their complexity such as ambiguous word boundaries and meanings. An alternative mode of Chinese language processing is to perform shallow parsing of ...
详细信息
Deep parsing of Chinese sentences is a very challenging task due to their complexity such as ambiguous word boundaries and meanings. An alternative mode of Chinese language processing is to perform shallow parsing of Chinese sentences in which chunk segmentation plays an important role. In this paper, we present a chunk segmentation algorithm using a combined statistical and rule-based approach (CSRA). The decision rules for refining chunk segmentation are generated from incorrectly segmented chunks from a statistical model which is built on a training corpus. Experimental results show that the CSRA works well and produces satisfactory chunk segmentation results for subsequent processes such as chunk tagging and chunk collocation extraction.
A novel text segmentation method from complex background is presented in this paper. The idea is inspired by the recent development in searching for the sparse signal representation among a family of over-complete ato...
详细信息
A novel text segmentation method from complex background is presented in this paper. The idea is inspired by the recent development in searching for the sparse signal representation among a family of over-complete atoms, which is called a dictionary. We assume that the image under investigation is composed of two components: the foreground text and the complex background. We further assume that the latter can be modeled as a piece-wise smooth function. Then we choose two dictionaries, where the first one gives sparse representation to one component and non-sparse representation to another while the second one does the opposite. By looking for the sparse representations in each dictionary, we can decompose the image into the two composing components. After that, text segmentation can be easily achieved by applying simple thresholding to the text component. Preliminary experiments show some promising results.
Abstraction provides cognition economy and generalization skill in addition to facilitating knowledge communication for learning agents situated in real world. Concept learning introduces a way of abstraction which ma...
详细信息
Abstraction provides cognition economy and generalization skill in addition to facilitating knowledge communication for learning agents situated in real world. Concept learning introduces a way of abstraction which maps the continuous state and action spaces into entities called concepts. Of computational concept learning approaches, action-based conceptualization is favored because of its simplicity and mirror neuron foundations in neuroscience. In this paper, a new biologically inspired concept learning approach based on the Bayesian framework is proposed. This approach exploits and extends the mirror neuron's role in conceptualization for a reinforcement learning agent in nondeterministic environments. In the proposed method, an agent sequentially learns the concepts from both of its successes and its failures through interaction with the environment. These characteristics as a whole distinguish the proposed learning algorithm from positive sample learning. Simulation results show the correct formation of concepts' distributions in perceptual space in addition to benefits of utilizing both successes and failures in terms of convergence speed as well as asymptotic behavior. Experimental results, on the other hand, show the applicability and effectiveness of our method for a real robotic task such as wall-following.
There may be great degradation in service level management (e.g., an email server) due to dynamical variants of real systems and measured disturbance in the network. An adaptive predictive congestion control is presen...
详细信息
ISBN:
(纸本)7900719229
There may be great degradation in service level management (e.g., an email server) due to dynamical variants of real systems and measured disturbance in the network. An adaptive predictive congestion control is presented for service systems to prevent oscillation and delay induced by highly stochastic behaviors of computing system which can not be got rid of by conventional control. We analyze the controller in detail and prove the error can be reduced to zero in steady state. The effectiveness of the proposed methods is demonstrated bv the simulation results.
Assurance Based Development (ABD) is an approach to the construction of critical computing systems in which the system and an argument that it meets its assurance goals are developed simultaneously. ABD touches all as...
详细信息
Naive-Bayes and k-NN classifiers are two machine learning approaches for text classification. Rocchio is the classic method for text classification in information retrieval. Based on these three approaches and using c...
详细信息
ISBN:
(纸本)9780662478300;0662478304
Naive-Bayes and k-NN classifiers are two machine learning approaches for text classification. Rocchio is the classic method for text classification in information retrieval. Based on these three approaches and using classifier fusion methods, we propose a novel approach in text classification. Our approach is a supervised method, meaning that the list of categories should be defined and a set of training data should be provided for training the system. In this approach, documents are represented as vectors where each component is associated with a particular word. We proposed voting methods and OWA operator and decision template method for combining classifiers. Experimental results show that these methods decrese the classification error 15 percent as measured on 2000 training data from 20 newsgroups dataset.
Association rule mining is one of the most important techniques in data mining. It extracts significant patterns from transaction databases and generates rules used in many decision support applications. Many organiza...
详细信息
Association rule mining is one of the most important techniques in data mining. It extracts significant patterns from transaction databases and generates rules used in many decision support applications. Many organizations such as industrial, commercial, or even scientific sites may produce large amount of transactions and attributes. Mining effective rules from such large volumes of data requires much time and computing resources. In this paper, we propose a parallel Fl-growth association rule mining algorithm for rapid extraction of frequent itemsets from large dense databases. We also show that this algorithm can efficiently be parallelized in a cluster computing environment. The preliminary experiments provide quite promising results, with nearly ideal scaling on small clusters and about half of ideal (15 fold speedup) on a thirty-two processor cluster.
In this paper, the problem of finding the set of Proportional Integral Derivative (PID) controllers that can robustly stabilize a system based on its frequency response has been solved. The model of the system is not ...
详细信息
In this paper, the problem of finding the set of Proportional Integral Derivative (PID) controllers that can robustly stabilize a system based on its frequency response has been solved. The model of the system is not necessary for this problem. A band of uncertainty is assumed in the frequency response of the plant. The controller is so designed that it can robustly stabilize this plant in the entire range of its uncertainties. Interval coefficient linear inequalities are used to arrive at the final result.
Web database security is a very important issue in e-commerce. This paper presents a new Web database security model. It utilizes the host identity protocol (HIP), which is being defined by the IETF, and a proposed us...
详细信息
Web database security is a very important issue in e-commerce. This paper presents a new Web database security model. It utilizes the host identity protocol (HIP), which is being defined by the IETF, and a proposed user identity exchange, to achieve authentication of host identity and user identity, and combines it with the database system itself and encryption to guarantee Web database security and confidentiality of the data. For these purposes, we define a new concept of the user identity namespace for the user, and using it to realize the binding-authentication of the host identity and user identity of the client, and build a relationship between the host and the user. In the new model, we set up a high strength shell of security for the database.
暂无评论