The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi...
详细信息
The main purpose of studying the software structure is considered to understand and recognize the structure easily by also taking into account the quality of software. In this paper, we define and analyze the node imp...
详细信息
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificial intelligence, virtual reality, high-speed network and digital reading, the concept of "VR" has been applied to more and more industries. The introduction of VReading multi-sensory reading platform will bring new ideas to digital reading industry.
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune ...
详细信息
ISBN:
(纸本)9781510803084
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which users are not interested in and shortens the running time. It adopts histogram statistic pattern to get the standardization description to item interval of the mining patterns, making the mining sequences include the item interval information which is valuable to user decision.
A software execution trace can be viewed as a series of events. An event may correspond to the execution of a basic block, the invocation of a class or a method. These traces imply important unique characteristics of ...
详细信息
It is well known that the drawbacks of label propagation algorithm are high randomness, weak robustness and easy to form monster community. Many improved methods are proposed constantly in order to avoid these problem...
详细信息
In this paper, two new methods of constructing ternary sequence pairs based on cyclotomy are presented. The ternary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 4. A...
详细信息
This paper discusses the simulated computation methods of remote sensing information model, and tries to put forward a more available solution. It presents our research works on the description and simulation methods ...
详细信息
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr...
详细信息
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propo...
详细信息
ISBN:
(纸本)9781509056972
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propose a novel design that using the multi-layer filtering of channel state information (CSI) to identify moving targets in dynamic environments and analyze the gait periodicity of human. We employ an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal component analysis (PCA) and discrete wavelet transform (DWT) to eliminate the noises. Furthermore, we propose a profile matching mechanism for human detection and a periodicity analysis mechanism for human gait taking advantage of the above design. We evaluated it with the commodity Wi-Fi infrastructures in different environments. Experimental results indicate that our approach performs identification of human with an average accuracy of 94%.
暂无评论