Approaches for solving a multiclass classification problem by support vector machines (SVMs) are typically to consider the problem as combination of two-class classification problems. Previous approaches have some lim...
详细信息
Approaches for solving a multiclass classification problem by support vector machines (SVMs) are typically to consider the problem as combination of two-class classification problems. Previous approaches have some limitations in classification accuracy and evaluation time. This paper proposes a novel method that employs information-based dichotomization for constructing a binary classification tree. Each node of the tree is a binary SVM with the minimum entropy. Our method can reduce the number of binary SVMs used in the classification to the logarithm of the number of classes which is lower than previous methods. The experimental results show that the proposed method takes lower evaluation time while it maintains accuracy compared to other methods.
This paper presents a method of ontology-based sentiment classification to classify and analyse online product reviews of consumers. We implement and experiment with a support vector machines text classification appro...
详细信息
This paper presents a method of ontology-based sentiment classification to classify and analyse online product reviews of consumers. We implement and experiment with a support vector machines text classification approach based on a lexical variable ontology. After testing, it could be demonstrated that the proposed method can provide more effectiveness for sentiment classification based on text content.
A lot of learning management systems (LMS) were developed in the last ten years since e-learning opens new possibilities in learning scenarios. They offer the possibility to watch any of the students action on the com...
详细信息
A lot of learning management systems (LMS) were developed in the last ten years since e-learning opens new possibilities in learning scenarios. They offer the possibility to watch any of the students action on the computer, but possibilities to verify the level of knowledge, a student has reached (accordingly to Bloompsilas taxonomy), are very poor. Multiple choice questions and the like can only verify lower levels in this taxonomy. In this paper we discuss a new approach in verifying higher levels of knowledge in connection with interactive teaching software and online laboratories, which are coupled to an LMS. This work is a result of eight years cooperation between the Tallinn University of Technology and the Ilmenau University of Technology.
This paper describes a new software tool for high quality training/learning in the field of digital microelectronics. Its main purpose is to give insight into reliability and quality assurance technologies based on li...
详细信息
This paper describes a new software tool for high quality training/learning in the field of digital microelectronics. Its main purpose is to give insight into reliability and quality assurance technologies based on linear feedback shift registers (LFSR) and other pseudo-random pattern generators (PRPG). Various PRPG types are becoming the mainstream test generation solution used in built-in self-test (BIST) structures. Taking into account complex theoretical concepts behind the microelectronics self-testing (including data coding and compression, cryptography, field theory, linear programming) it is important to effectively educate engineers in this field. The software tool we present in this paper is aimed at facilitating this goal. Unlike other similar systems, this tool facilitates study of various test optimization problems, allows fault coverage analysis for different circuits and with different LFSR parameters. The main didactic aim of the tool is presenting complicated concepts in a comprehensive graphical and analytical way. The multi-platform JAVA runtime environment allows for easy usage of the tool both in the classroom and at home. The BIST Analyzer represents an integrated simulation, training, and research environment that supports both analytic and synthetic way of learning. Due to the above mentioned facts the tool provides a unique training platform to use in courses on electronic testing and design for testability.
Pervasive applications and in particular Wireless Sensors Networks have very strict requirements in terms of power consumption. It is well known that radio activity is very expensive in terms of energy; we show here t...
详细信息
Pervasive applications and in particular Wireless Sensors Networks have very strict requirements in terms of power consumption. It is well known that radio activity is very expensive in terms of energy; we show here that intensive processing activities (as security) represent a major contribution to power budget. In this paper we extend our methodology for analyzing the impact of security related operations on power consumption and optimizing it. The analysis is based on experimental data and was validated with measurements on a real platform.
Significant efforts and studies were recently reported for enabling active safety, traffic management, and commercial applications in Vehicular Ad Hoc Networks (VANET), since these applications are the drivers of the ...
详细信息
Significant efforts and studies were recently reported for enabling active safety, traffic management, and commercial applications in Vehicular Ad Hoc Networks (VANET), since these applications are the drivers of the recent surge in VANET research and development. However, very few research efforts considered analyzing the Quality of Service (QoS) metrics that will be available to these applications in VANET. Furthermore, although there are many proposed solutions for routing in VANET, it is still unclear as to what specific characteristics VANET routing protocols should possess, since none of the proposed solutions achieves optimum performance in both urban and highway, as well as sparse and dense environment. To shed light on these issues, in this paper we analyze some of the most important QoS metrics in VANET. Namely, we determine the upper performance bound for connection duration, packet delivery ratio, end-to-end delay, and jitter for unicast communication in typical highway and urban VANET environments. According to our results, delay and jitter in VANET would be adequate for most of the envisioned unicast-based applications, whereas the packet delivery ratio and connection duration might not meet the requirements for most unicast-based applications.
E-learning systems are powerful way for bringing the education to people, which wants to be skilled in some area. However, important term in education is quality of this education. Student must have effort to study, a...
详细信息
E-learning systems are powerful way for bringing the education to people, which wants to be skilled in some area. However, important term in education is quality of this education. Student must have effort to study, and e-learning system must also have tools for bringing educational informations in simplest way, or support learners study as much as it's possible. In present, main problem of e-learning systems is generalisation of learners, it means that all students can take only the same teaching material. In the related way, these informations are served a little bit chaotic and cold". Solving for this problem could be intelligent e-learning systems (IELS) that are e-learning systems, which have build-in intelligence support (algorithms) for learner's study. Next reason for building IELS is attempt for substitution of the teacher. It's not possible to make absolute substitution for the teacher, but scientific conferences all over the world still brings important conclusions in this area, which can help build interesting systems.
Automatic generation of code starting from lightweight modeling languages such as UML is by now a widely adopted approach. In particular generation of executable SystemC models starting from StateCharts and other UML ...
详细信息
Automatic generation of code starting from lightweight modeling languages such as UML is by now a widely adopted approach. In particular generation of executable SystemC models starting from StateCharts and other UML diagrams represents a promising research field. While RTL SystemC appears better suited for matching the StateCharts formalism (being intrinsically clocked), performances of the generated code suffer from the heavy overhead induced by time management, specially when the number of concurrent processes is high. In this paper we present a methodology that allows applying a solution mixing event based and clock-driven approach. More specifically, clock-driven simulation is activated only when the configuration of the system is identified to be evolving. When no events are present this fact is also detected (together with the interval of absence of events) so that no simulation is performed although the clock runs on. This solution is particularly suited for low duty cycle systems, as, e.g. when simulating Wireless Sensor Networks (WSN); in such instances, speedup of the generated code has been found to be well over two orders of magnitude. Application of the technique to the generation of a power simulator for the IEEE 802.15.4 networking protocol is used as a test case.
The QAOOSE 2007 workshop brought together, for half day, researchers working on several aspects related to quantitative evaluation of software artifacts developed with the object-oriented paradigm and related technolo...
详细信息
In this paper, we propose an efficient algorithm, NCLOSED, for mining the N k-closed itemsets with the highest supports for 1 up to a certain k max value. The algorithm adopts best-first search strategy to generate c...
详细信息
In this paper, we propose an efficient algorithm, NCLOSED, for mining the N k-closed itemsets with the highest supports for 1 up to a certain k max value. The algorithm adopts best-first search strategy to generate closed itemsets with highest remaining supports. It does not keep closed itemsets mined in main memory to ensure that they are really closed. This is because this algorithm can directly generate closed itemsets. Moreover, duplicated closed itemsets are detected and discarded from this algorithm.
暂无评论