In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is p...
详细信息
In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is proposed. The AGW algorithm utilizes comparing and correcting technique to generate the wrapper with the native characteristic of the HTT tree structure. The AGW algorithm can not only generate the wrapper automatically, but also rebuild the data schema easily and reduce the complexity of the computing.
In this paper, we propose a framework for wireless/mobile pervasive computing to augment capabilities and to save scanty resources of mobile host by making full use of available resources in the surrounding. Firstly, ...
详细信息
ISBN:
(纸本)7563506861
In this paper, we propose a framework for wireless/mobile pervasive computing to augment capabilities and to save scanty resources of mobile host by making full use of available resources in the surrounding. Firstly, a mobile device finds and utilizes the cheap computer as a surrogate to forward the service requests. Secondly, after the surrogate discovers the services, it will filter, synthesize or handoff them according to the context information. We also take consideration of robustness, scalability, and load balancing by utilizing multi surrogates. Service descriptions are encoded by the extensible markup language (XML) technology to provide flexibility. The analytical results on the performance of our framework show that it has significant advantages in terms of reducing wireless bandwidth consumption, ant etc.
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar...
详细信息
ISBN:
(纸本)0780378652
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smart classroom (SCR) and intelligent meeting room (IMR) respectively. When a teacher gives his lesson in the SCR, different services will automatically be provisioned to him according to captured context information. When the users with various kinds of portable devices, such as PDA, mobile phone or laptop, attend a meeting in IMR, they can easily organize a meeting and unobtrusively access the services provided by IMR, for example, they could give presentation by "projector service". The paper also describes the software infrastructure of SCR and IMR - smart platform, a multi agents (MAs) system.
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system ...
详细信息
ISBN:
(纸本)0769519326
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system in electronic commerce is one of the successful applications that are based on such mechanism. We present a new framework in recommendation system by finding customer model from business data. This framework formalizes the recommending process as knowledge representation of the customer shopping information and uncertainty knowledge inference process. In our approach, we firstly build a customer model based on Bayesian network by learning from customer shopping history data, then we present a recommendation algorithm based on probability inference in combination with the last shopping action of the customer, which can effectively and in real time generate a recommendation set of commodity.
Computational intelligence is the computational simulation of the bio-intelligence, which includes artificial neural networks, fuzzy systems and evolutionary computations. This article summarizes the state of the art ...
详细信息
Computational intelligence is the computational simulation of the bio-intelligence, which includes artificial neural networks, fuzzy systems and evolutionary computations. This article summarizes the state of the art in the field of simulated modeling of vibration systems using methods of computational intelligence, based on some relevant subjects and the authors' own research work. First, contributions to the applications of computational intelligence to the identification of nonlinear characteristics of packaging are reviewed. Subsequently, applications of the newly developed training algorithms for feedforward neural networks to the identification of restoring forces in multi-degree-of-freedom nonlinear systems are discussed. Finally, the neural-network-based method of model reduction for the dynamic simulation of microelectromechanical systems (MEMS) using generalized Hebbian algorithm (GHA) and robust GHA is outlined. The prospects of the simulated modeling of vibration systems using techniques of computational intelligence are also indicated.
In this paper, a novel learning method for special Bayesian networks which consist of noisy-OR and noisy-AND nodes is introduced. This method can learn networks with hidden variables and discover hidden variables when...
详细信息
In this paper, a novel learning method for special Bayesian networks which consist of noisy-OR and noisy-AND nodes is introduced. This method can learn networks with hidden variables and discover hidden variables when necessary. Compared with previous techniques for learning Bayesian networks, it uses the information in the data to guide the search for useful revisions, and can greatly improve the efficiency of the algorithm. Furthermore, this method can also be used for theory refinement. The experiments demonstrate that its performance is comparable to that of other existing hybrid theory refinement systems, while the networks produced by this method have more precise semantics and are more easily understood. In addition, this method also provides a direct mechanism for incorporating knowledge expressed as propositional Horn-clause rules into a Bayesian network. This mechanism could potentially ease the process of building Bayesian networks.
We have seen that Huffman coding has been widely used in data, image, and video compression. In this paper novel maximal prefix coding is introduced. Relationship between the Huffman coding and the optimal maximal pre...
详细信息
We have seen that Huffman coding has been widely used in data, image, and video compression. In this paper novel maximal prefix coding is introduced. Relationship between the Huffman coding and the optimal maximal prefix coding are discussed. We show that all Huffman coding schemes are optimal maximal prefix coding schemes and that conversely the optimal maximal prefix coding schemes need not be the Huffman coding schemes. Moreover, it is proven that, for any maximal prefix code C, there exists an information source I = (∑ P) such that C is exactly a Huffman code for I. Therefore, it is essential to show that the class of Huffman codes is coincident with one of the maximal prefix codes. A case study of data compression is also given. Comparing the Huffman coding, the maximal prefix coding is used not only for statistical modeling but also for dictionary methods. It is also good at applying to a large information retrieval system and improving its security.
Anaphora always appears in the text and it is a hot topic in linguistics and computational linguistics area. Anaphora resolution is an important part of the information extraction, and it is also important to discours...
详细信息
Anaphora always appears in the text and it is a hot topic in linguistics and computational linguistics area. Anaphora resolution is an important part of the information extraction, and it is also important to discourse understanding, machine translation, abstract extraction and so on. After studying on the text in Chinese financial domain, an anaphora resolution system is proposed, which is built on a set of filtration rules and a set of evaluation rules. The experiment result shows the precision is 91.4%.
We investigate the decimation-Hadamard transform (DHT) applied to 2-level autocorrelation sequences. We present the kth-order DHT by a matrix representation and show that odd order DHT cannot realize any 2-level autoc...
详细信息
We investigate the decimation-Hadamard transform (DHT) applied to 2-level autocorrelation sequences. We present the kth-order DHT by a matrix representation and show that odd order DHT cannot realize any 2-level autocorrelation sequences. We provide two interesting experimental results including one for the second-order DHT of the generalized GWM sequences.
暂无评论