The method of latent semantic indexing (LSI) is an information retrieval technique using a low-rank singular value decomposition (SVD) of the term-document matrix. Although the LSI method has empirical success, it suf...
详细信息
The method of latent semantic indexing (LSI) is an information retrieval technique using a low-rank singular value decomposition (SVD) of the term-document matrix. Although the LSI method has empirical success, it suffers from the lack of interpretation for the low-rank approximation and, consequently, the lack of controls for accomplishing specific tasks in information retrieval. A method introduced by Dhillon and Modha is an improvement in that direction. It uses centroids of clusters or so called concept decomposition for lowering the rank of the term-document matrix. We focus on improvements of that method using fuzzy k-means algorithm. Also, we compare the precision of information retrieval for the two above methods.
Virtual teaming involving online presentations and peer reviews support the notion of collaborative student learning, whilst preparing them for the virtual work environment. However, implementation and administration ...
详细信息
ISBN:
(纸本)0909925984
Virtual teaming involving online presentations and peer reviews support the notion of collaborative student learning, whilst preparing them for the virtual work environment. However, implementation and administration of such teams, particularly when constraints include large numbers of multi-cultural students, within a complex multi-campus structure, needs careful planning and management. This paper discusses the implementation features of an in-house dynamic web administrative package designed, in part to address the problem of management within a complex teaching environment, of assessment processes requiring, virtual teams activities. An essential component of the teamwork is that students collaborate as small teams, and virtually interact with several other small teams. For some students, the study environment is totally virtual, for others face-to-face contact is usual. The web application also provide virtual management tool for the geographically disburse multi-campus staff. The paper discusses the achievements and the limitations of the current implementation, and finally future developments for the program design.
In this paper, new structures that implement RSA cryptographic algorithm are presented. These structures are built using a modified Montgomery modular multiplier, where the operations of multiplication and modular red...
详细信息
In this paper, new structures that implement RSA cryptographic algorithm are presented. These structures are built using a modified Montgomery modular multiplier, where the operations of multiplication and modular reductions are carried out in parallel rather than interleaved as in the traditional Montgomery multiplier. The global broadcast data lines are avoided by interleaving two operations into the same structure, thus making the implementation systolic. The results of implementation in FPGA have shown that the proposed RSA structures outperformed those structures built around a traditional Montgomery multiplier in terms of speed. In terms of area usage, an area-efficient architecture is shown in this paper that has the merit of having a high speed and a reduced area usage when compared with other architectures.
This paper classifies and reviews the available algorithms to blind signal separation (BSS) problem. Based on the separation criteria, we broadly divide all the reviewed algorithms into four categories, namely: classi...
详细信息
This paper classifies and reviews the available algorithms to blind signal separation (BSS) problem. Based on the separation criteria, we broadly divide all the reviewed algorithms into four categories, namely: classical adaptive, higher-order statistics based, information theory based algorithms and others. For algorithms which might fall into more than one category, categorizing is made according to their main features. Most of the algorithms reviewed in this paper are benchmarks in BSS area. Many BSS algorithms use neural networks to perform the learning rules, probably because neural networks are powerful in nonlinear mapping and learning ability.
This article illustrates how the educational process can be influenced by both student involvement and mathematical research. A primary objective in many courses in numerical linear algebra is to investigate methods w...
Using the Internet for electronic business has become an area of action for the Australian government. This paper presents research results from two regional areas, which indicate that while most manufacturing SMEs us...
详细信息
In 1999 Central Queensland University's School of computing and Information Systems offered a computer programming course in a totally online delivery mode. Academic support from the lecturer was provided, in tota...
详细信息
ISBN:
(纸本)0769515096
In 1999 Central Queensland University's School of computing and Information Systems offered a computer programming course in a totally online delivery mode. Academic support from the lecturer was provided, in total, by means of email lists to which all class members were expected to subscribe. It was found that a single class email list was insufficient to cater for the needs of advanced students. This two-year study of the course email list usage demonstrates the benefit of providing advanced online students with an advanced topic discussion forum so that the general class email forum can be freed up for core business. It also demonstrates that totally on line students tend to use the class email list as a primary workroom for assignment preparation.
The folding and unfolding techniques cannot be used to design pipelined digit adders because of the presence of feedback loops. In this paper, approaches for the design of digit multipliers that can be pipelined to th...
详细信息
ISBN:
(纸本)0780375963
The folding and unfolding techniques cannot be used to design pipelined digit adders because of the presence of feedback loops. In this paper, approaches for the design of digit multipliers that can be pipelined to the bit level are presented. It includes architectures obtained via unfolding, the high radix approach and the multi-pipe approach. The pipelining of these architectures has been made possible thanks to a new "pipelined digit adder". The presented architectures are scalable, systolic and can offer a great flexibility in finding the best trade-off between hardware cost and throughput rate by changing the level of pipelining and the digit size.
There is an increasing need to develop powerful techniques to improve biomedical pattern discovery and visualization. This paper presents an automated approach, based on hybrid self-adaptive neural networks, to patter...
详细信息
In 1999 Central Queensland University's School of computing and Information Systems offered a computer programming course in a totally online delivery mode. Academic support from the lecturer was provided, in tota...
详细信息
In 1999 Central Queensland University's School of computing and Information Systems offered a computer programming course in a totally online delivery mode. Academic support from the lecturer was provided, in total, by means of email lists to which all class members were expected to subscribe. It was found that a single class email list was insufficient to cater for the needs of advanced students. This two-year study of the course email list usage demonstrates the benefit of providing advanced online students with an advanced topic discussion forum so that the general class email forum can be freed up for core business. It also demonstrates that totally on line students tend to use the class email list as a primary workroom for assignment preparation.
暂无评论