We present a mechanism called the Markov model mediator (MMM) to facilitate the effective retrieval for content-based image retrieval (CBIR). Different from the common methods in content-based image retrieval, our sto...
详细信息
Simultaneous multithreading (SMT) attempts to attain higher processor utilization by allowing instructions from multiple independent threads to coexist in a processor and compete for shared resources. Previous studies...
详细信息
Understanding and learning the subjective aspect of humans in Content-Based Image Retrieval has been an active research field during the past few years. However, how to effectively discover users’ concept patterns wh...
详细信息
Traffic video analysis can provide a wide range of useful information such as vehicle identification, traffic flow, to traffic planners. In this paper, a framework is proposed to analyze the traffic video sequence usi...
详细信息
Analysis of microelectrode recordings (MER) of extracellular neuronal activity has gained increasing interest due to potential improvements to surgical techniques involving ablation or placement of deep brain stimulat...
详细信息
Analysis of microelectrode recordings (MER) of extracellular neuronal activity has gained increasing interest due to potential improvements to surgical techniques involving ablation or placement of deep brain stimulators, as is common in the treatment of Parkinson's disease. Critical to these procedures is the identification of different brain structures such as the globus pallidus internus (GPI). Evidence suggests that the spike trains from individual neurons contain enough information to identify the brain structure in which they are located. For the work reported here, spike train data gathered during surgical procedure from multiple patients is used. Using a moving window sampling approach, a novel feature extraction method for spike trains was developed. This method is then used in combination with a support vector classification algorithm. Results strongly indicate that the sampling methods reported here are able to extract the necessary information for highly accurate spike source identification.
We present a journey through successful applications of multimethod approach to induction of decision trees in knowledge extraction, discovery of new knowledge and early diagnosis on the cases of asthma, cardiovascula...
详细信息
Analysis of microelectrode recordings (MER) of extracellular neuronal activity has gained increasing interest due to potential improvements to surgical techniques involving ablation or placement of deep brain stimulat...
详细信息
Analysis of microelectrode recordings (MER) of extracellular neuronal activity has gained increasing interest due to potential improvements to surgical techniques involving ablation or placement of deep brain stimulators, as is common in the treatment of Parkinson's disease. Critical to these procedures is the identification of different brain structures such as the globus pallidus internus (GPI). Evidence suggests that the spike trains from individual neurons contain enough information to identify the brain structure in which they are located For the work reported here, spike train data gathered during surgical procedure from multiple patients is used. Using a moving window sampling approach, a novel feature extraction method for spike trains was developed. This method is then used in combination with a support vector classification algorithm. Results strongly indicate that the sampling methods reported here are able to extract the necessary information for highly accurate spike source identification.
In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is p...
详细信息
In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is proposed. The AGW algorithm utilizes comparing and correcting technique to generate the wrapper with the native characteristic of the HTT tree structure. The AGW algorithm can not only generate the wrapper automatically, but also rebuild the data schema easily and reduce the complexity of the computing.
An operating system (OS) can be viewed as the collection progress of required directives before a computersystem can run. Thus, OS is the most important software in any computersystem. If OS is risky, then the compu...
详细信息
ISBN:
(纸本)0780378822
An operating system (OS) can be viewed as the collection progress of required directives before a computersystem can run. Thus, OS is the most important software in any computersystem. If OS is risky, then the computersystem could be in danger. So, information security has become a critical issue for computersystems, it is necessary to develop a trusted operating system. As the result, in order to improve system security, there are many enhancements, which are developed. Some of them are open source. We can integrate appropriate software to construct a trusted system. The paper first gives a discussion covered the current security problems and the difficulty in solving those problems. Then, we study security function requirements from "protection profile for multilevel operating systems in environments requiring medium robustness", to find important secure features. Next, we demonstrate important security enhancement projects of OS with these corresponding security features. Finally, we give an idea about how to combine some of well-done open source secure software, and satisfy the secure features.
In this paper we present the results of an intelligent analysis of osteoporosis database gathered during a longitudinal study in which a random sample of 100 women who had passed precautionary examinations for detecti...
详细信息
In this paper we present the results of an intelligent analysis of osteoporosis database gathered during a longitudinal study in which a random sample of 100 women who had passed precautionary examinations for detection of osteoporosis over five years and were not referred for a definite medical diagnosis was pulled from the records. The intelligent data analysis using advanced methods for decision tree construction was used in order to try to find the main factors that can reduce the risk for development of osteoporosis in women. Most of the extracted knowledge confirmed known medical criteria that put women to risk for osteoporosis, however some new interesting patterns have also been shown.
暂无评论