Traditional English text chunking approach is to identify phrases using only one model and same features. It is shown that one model could not consider each phrasepsilas characteristics, and same features are not suit...
详细信息
Traditional English text chunking approach is to identify phrases using only one model and same features. It is shown that one model could not consider each phrasepsilas characteristics, and same features are not suitable to all phrases. In this paper, a multi-agent text chunking model is proposed. This model uses individual sensitive features of each phrase to identify different phrases. Through testing on the public training and test corpus, this multi-agent model is effective because F score of English chunking using this multi-agent model achieves to 95.70%, which is higher than the best result that has been reported.
RFID middleware collects and filters RFID streaming data to process applications' requests called continuous queries, because they are executed continuously during tag movement. Several approaches to building an inde...
详细信息
RFID middleware collects and filters RFID streaming data to process applications' requests called continuous queries, because they are executed continuously during tag movement. Several approaches to building an index on queries rather than data records, called a query index, have been proposed to evaluate continuous queries over streaming data. EPCglobal proposed an Event Cycle Specification (ECSpec) model, which is a de facto standard query interface for RFID applications. Continuous queries based on ECSpec consist of a large number of segments that represent the query conditions. The problem when using any of the existing query indexes on these continuous queries is that it takes a long time to build the index, because it is necessary to insert a large number of segments into the index. To solve this problem, we propose a transform method that converts a group of segments into compressed data. We also propose an efficient query index scheme for the transformed space. Comparing with existing query indexes, the performance of proposed index outperforms the others on various datasets.
In Cryptography, RC4 is one of the best known stream cipher from the last two decades in steam cipher family and it’s already achieved the trust of many organizations after its code become public. Many Eminent resear...
详细信息
While computing is entering a new phase in which CPU improvements are driven by the addition of multiple cores on a single chip, rather than higher frequencies. Parallel processing on these systems is in a primitive s...
详细信息
With the fast development of World Wide Web, the quantity of web information is increasing in an unprecedented pace, a great many of which are generated dynamically from background databases, and can't be indexed ...
详细信息
With the fast development of World Wide Web, the quantity of web information is increasing in an unprecedented pace, a great many of which are generated dynamically from background databases, and can't be indexed by traditional search engine, so we call them Deep Web. For the heterogeneous and dynamic features of Deep Web sources, classifying the Deep Web source by domain effectively is a significant precondition of Deep Web sources integration. In this paper, we consider the visible features of Deep Web and Maximum Entropy approach, and then on the basis of binary classification, we propose a new multivariate classification approach based on Maximum Entropy towards Deep Web sources. In addition, we propose a Feedback algorithm to improve the accuracy of classification. An experimental evaluation over real Web data shows that, our approach could provide an effective and general solution to the multivariate classification of Deep Web sources.
Question classification is an important step in a question answering system, the accuracy rate of question classification has great impact to a question answering system's following module. This paper proposed a q...
详细信息
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfe...
详细信息
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfeit imposes a menace to industry worldwide, and the problem is not specific for certain products or countries. In 2003, Koh et al. describe a RFID system based on "track and trace" solution to apply into pharmaceutical supply chain management to fight the counterfeit. Moreover, there are applications to solve malicious manner were presented. But there always still existed some disputes and not conform Class 1 Generation 2 (C1G2) standards. Unfortunately, the trick is changeable. The Koh et al.'s scheme is at premise rather primitive. In order to tackle this problem, we propose an anti-counterfeit ownership transfer protocol for low cost RFID system. We only use a tag to be a storage media. The proposed scheme can ensure a secure transaction.
The aim of the wafer defect inspection is to detect defective dies and discard them. The defective dies were usually identified through visual judgment with the aid of a scanning electron microscope. Dozens of enginee...
详细信息
The aim of the wafer defect inspection is to detect defective dies and discard them. The defective dies were usually identified through visual judgment with the aid of a scanning electron microscope. Dozens of engineers visually check wafers and hand-mark the defective regions leading to a significant amount of personnel cost. In this paper, a complete solution which consists of two Hopfield neural networks is proposed to detect the defective dies of wafer image. The experimental results show the proposed method successfully identifies the defective dies on LED wafers images with good performances.
Virtualization technologies are becoming more and more widely-used in the distributed computing area. In order to organize and manage various virtual machines in the SOA (Service-Oriented Architecture) environment mor...
详细信息
The producers and customers have difficulties in organizing, finding, retrieving and accessing 'right' media info, reasons for this problem stem from a lack of interoperability and semantic metadata share betw...
详细信息
暂无评论