The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The efficiency of the technique used for scoring the text sentences could produce...
详细信息
The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The efficiency of the technique used for scoring the text sentences could produce good summary. The feature scores are imprecise and uncertain, this marks the differentiation between the important features and unimportant is difficult task. In this paper, we introduce fuzzy logic to deal with this problem. Our approach used important features based on fuzzy logic to extract the sentences. In our experiment, we used 30 test documents in DUC2002 data set. Each document is prepared by preprocessing process: sentence segmentation, tokenization, removing stop word, and word stemming. Then, we use 9 important features and calculate their score for each sentence. We propose a method using fuzzy logic for sentence extraction and compare our results with the baseline summarizer and Microsoft Word 2007 summarizers. The results show that the highest average precision, recall, and F-measure for the summaries were obtained from fuzzy method.
Breast cancer has been a cause of women-mortality for many *** is one of the best means to help radiologists to detect the calcification,an indicator for the abnormality,because a very small calcification(1-3 millimet...
详细信息
Breast cancer has been a cause of women-mortality for many *** is one of the best means to help radiologists to detect the calcification,an indicator for the abnormality,because a very small calcification(1-3 millimeters) can even be *** are many classification methods proposed for such the detection task,however,its efficiency in data preparation and training phases needs to be *** this paper,we propose to investigate the possibilities to solve the efficiency problem using cache-conscious approach,without any compromise on the *** apply two cache-conscious techniques,*** re-blocking,and loop fusion to improve the efficiency on a sub-process of the classifier *** main aim of such the techniques is to fetch the cpu-needed data to suit the cache size as much as *** the aim will result in a high cache-hit-rate,and thus improve the efficiency.A preliminary experiment is conducted on the Sobel edge detection sub-process to validate the efficiency our *** the results,we can reduce the time used in the process by 68%,with the L2 cache-miss-rate decreased by 10%.
Route selection is one of the most important problems for a car navigation system. Given a pair of origin and destination, there are many possible routes. Most current car navigation systems propose the shortest path ...
详细信息
The rapidly aging society in Japan has resulted in an increased demand for electric wheelchairs to enhance the mobility of elderly persons. However, the increased use of electric wheelchairs means an increase in the n...
详细信息
The rapidly aging society in Japan has resulted in an increased demand for electric wheelchairs to enhance the mobility of elderly persons. However, the increased use of electric wheelchairs means an increase in the number of accidents related to wheelchair operation errors. The majority of errors involve the joystick interface because its controllability is highly sensitive and not very intuitive compared to the vehicle-type interface. This paper describes a newly developed intuitive electric wheelchair interface that uses a laser pointer. The direction of the laser pointer is automatically detected by camera and analyzed for movement direction. To ensure smooth driving by using the laser pointer, we apply fuzzy logic. To confirm the proposed method, several simulations were conducted and examined.
This study investigates the use of Genetic Algorithms (GA) to the design and implementation of Fuzzy Logic Controllers (FLC). A fuzzy logic is fully defined by its membership function. What is the best to determine th...
详细信息
This study investigates the use of Genetic Algorithms (GA) to the design and implementation of Fuzzy Logic Controllers (FLC). A fuzzy logic is fully defined by its membership function. What is the best to determine the membership function is the first question that has been tackled. Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function generated by human operators. The membership function selection process is done with trial and error and it runs step by step which is too long in completing the problem. This research develops a system that may help users to determine the membership function of FLC using the technique of GA optimization for the fastest processing in completing the problems. The data collection is based on the simulation results and the results refer to the transient response specification is maximum overshoot. From the results presented, the system which we developed is very helpful to determine membership function and it is clear that GA is very promising in improving the performance of the FLC to get more accurate in order to find the optimum result.
There are many approaches and algorithms that can be used to recognize and synthesize the hands gesture. Each approach has its own advantages and characteristics. This paper describes the usage of hidden Markov models...
详细信息
There are many approaches and algorithms that can be used to recognize and synthesize the hands gesture. Each approach has its own advantages and characteristics. This paper describes the usage of hidden Markov models (HMM) and principal component analysis (PCA) in recognizing hands gesture by two different researches. The limitations of each techniques and comparisons between each other will be detailed below.
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information technology Department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information technology Department (ITD), Medical Record Department (MRD) and X-Ray Department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital Information system (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the l...
详细信息
We constructed a new fifth order five-stage singly diagonally implicit Runge-Kutta (DIRK) method which is specially designed for the integrations of linear ordinary differential equations (LODEs). The restriction to l...
详细信息
We constructed a new fifth order five-stage singly diagonally implicit Runge-Kutta (DIRK) method which is specially designed for the integrations of linear ordinary differential equations (LODEs). The restriction to linear ordinary differential equations (ODEs) reduces the number of conditions which the coefficients of the Runge-Kutta method must satisfy. The best strategy for practical purposes would be to choose the coefficients of the Runge-Kutta methods such that the error norm is minimized. Thus, here the error norm obtained from the error equations of the sixth order method is minimized so that the free parameters chosen are obtained from the minimized error norm. The stability aspect of the method is also looked into and found to have substantial region of stability, thus it is stable. Then a set of test problems are used to validate the method. Numerical results show that the new method is more efficient in terms of accuracy compared to the existing method.
This paper presents object detection and modeling algorithm for automatic visual people counting system to identify individuals from top view images acquired from an overhead surveillance camera. This work proposes Sn...
详细信息
This paper presents object detection and modeling algorithm for automatic visual people counting system to identify individuals from top view images acquired from an overhead surveillance camera. This work proposes Snake algorithm with effective external energy function and a half-circle template initialization for modeling passengers. The experiment result showed that the proposed method could fit the Snake to the head and shoulder boundaries of the passengers effectively. Fitting error of 3.76 pixels per control point was obtained in our experiment. The information is not only useful for verifying humans but also for extracting appearance features to enhance performance of the subsequent tracking algorithm.
暂无评论