Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper fi...
详细信息
The CoNLL-2015 shared task focuses on shallow discourse parsing, which takes a piece of newswire text as input and returns the discourse relations in a PDTB style. In this paper, we describe our discourse parser that ...
详细信息
This paper studies the containment and group dispersion control for a multi-robot system in the presence of dynamic leaders. Each robot is represented by a doubleintegrator dynamic model and a distributed control algo...
详细信息
This paper studies the containment and group dispersion control for a multi-robot system in the presence of dynamic leaders. Each robot is represented by a doubleintegrator dynamic model and a distributed control algorithm is developed to drive the multi-robot system to follow a group of dynamic leaders with containment and group dispersion behaviors. The effectiveness of the algorithm is then verified on a multi-robot control platform.
The existing safety and health monitoring methods for bridge construction are mainly manual monitoring and wired monitoring with many disadvantages, such as low efficiency, poor accuracy, great implementation difficul...
详细信息
Click-through information has been regarded as one of the most important signals for implicit relevance feedback in Web search engines. Because large variation exists in users’ personal characteristics, such as searc...
详细信息
According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first ...
详细信息
When facing various and massive data resources, how to effectively utilize the resources according to the division field is one of the core problem of the institutional repository research. In this paper, we improved ...
详细信息
When facing various and massive data resources, how to effectively utilize the resources according to the division field is one of the core problem of the institutional repository research. In this paper, we improved Bayesian classification algorithm, then proposed a text classification algorithm based on domain knowledge. Furthermore, some key technologies such as text classification, feature selection, weight improvement and domain knowledge algorithm improvement are designed and implemented. We use widely applied IkAnalyzer method to classify Chinese words. For feature selection and weight improvement part, we focus on the processing of special vocabulary in the document. We introduce the field expand vocabulary assist the Bayesian formula in the field application part to obtain the final result. The experiment result shows that the improved algorithm enhanced the accuracy of the classification efficiently, and the system calculating time is acceptable.
Most existing language modeling approaches are based on the term independence hypothesis. To go beyond this assumption, two main directions were investigated. The first one considers the use of the proximity features ...
详细信息
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a ...
详细信息
暂无评论