The mathematical expression of Chinese characters is a novel method to describe Chinese characters. Based on the analysis of comp.nents of Chinese characters, an algorithm of automatic generation of mathematical expre...
详细信息
The mathematical expression of Chinese characters is a novel method to describe Chinese characters. Based on the analysis of comp.nents of Chinese characters, an algorithm of automatic generation of mathematical expression is presented. Firstly, about 500 Chinese character comp.nents are chosen, and nine basic properties are selected for each of them: connectivity number, genus number, end number, turn number, joint number, cross number and NMI, HNMI, and VNMI;then by segmenting or combining connective regions, a Chinese character is divided into Chinese character comp.nents;finally, by recognizing the comp.nents and the Chinese character structure, the mathematical expressions are obtained. Satisfying experimental result shows that the correct ratio of mathematical expressions is 92%. Automatic generation of mathematical expressions will facilitate the management and transmission of Chinese information in the fields such as typesetting printing, advertising and package design, network transmission, Chinese mobile communication.
The analysis of a hybrid system using overlapping decomp.sition and expansion method of hybrid Petri net is proposed. First, some related definitions (such as boundedness, reachability and activity are presented) and ...
详细信息
The analysis of a hybrid system using overlapping decomp.sition and expansion method of hybrid Petri net is proposed. First, some related definitions (such as boundedness, reachability and activity are presented) and the inclusion principle is expounded. Then, the overlapping decomp.sition and expansion method of hybrid Petri net is introduced and overlapping decomp.sition is used in topological structure of a Petri net model for the hybrid system. The topological structure of the Petri net is analyzed and the overlapping subnet of the Petri net is determined. Finally, an example of the hybrid Petri net is given to illustrate the process of overlapping decomp.sition and expansion. This provides an effective method to analyze a large hybrid system and is helpful to the analysis and control of a comp.ex hybrid system.
Classical Self-Organizing Maps presented by T. Kohonen is performed in the input sample space based on the Euclidean norm. It fails as the distribution of input patterns becomes highly nonlinear. Kernel means, perform...
详细信息
Classical Self-Organizing Maps presented by T. Kohonen is performed in the input sample space based on the Euclidean norm. It fails as the distribution of input patterns becomes highly nonlinear. Kernel means, performing a nonlinear data transformation into some high dimensional feature space, increases the probability of the linear separability of the patterns within the feature space. Donald and others map the data in input space into a high-dimension feature space, where SOM algorithm are performed. However, its disadvantage lies in lack of direct descriptions about the clustering's center and result. A novel kernel-based SOM algorithm is proposed. We replace the Euclidean norm in the SOM training procedure with kernels, which is equivalent to change the metric of distance in input space. Multiformity of kernels leads to different metrics of distance in input space, and correspondingly results in SOM classifications. Finally we discuss the robustness and reliability of KSOM by experimenting on Benchmark based on several classical kernel functions.
An adaptive algorithm for reliable multicast in mobile cellular networks was proposed, with which, the information between the base stations and their neighborhoods was exchanged through a dedicated multicast group to...
详细信息
An adaptive algorithm for reliable multicast in mobile cellular networks was proposed, with which, the information between the base stations and their neighborhoods was exchanged through a dedicated multicast group to control the amount of packets stored in their buffers. The number of base stations in multicast group for control was adjusted according to structure of the mobile network and the moving velocity of mobile hosts. The cooperation of neighborhoods base stations ensures that data packets could be reliably received by the mobile hosts in a multicast group. In the meantime, buffer capacities of base stations were saved. Simulation shows that the algorithm recovers the lost packets quickly with smaller buffers in the base stations.
Artificial Neural Networks (ANNs) such as radial basis function neural networks (RBFNNs) have been successfully used in soft sensor modeling. However, the generalization ability of conventional ANNs is not very well. ...
详细信息
Artificial Neural Networks (ANNs) such as radial basis function neural networks (RBFNNs) have been successfully used in soft sensor modeling. However, the generalization ability of conventional ANNs is not very well. For this reason, we present a novel soft sensor modeling approach based on Support Vector Machines (SVMs). Since standard SVMs have the limitation of speed and size in training large data set, we hereby propose Least Squares Support Vector Machines (LS_SVMs) and apply it to soft sensor modeling. Systematic analysis is performed and the result indicates that the proposed method provides satisfactory performance with excellent approximation and generalization property. Monte Carlo simulations show that our soft sensor modeling approach achieves performance superior to the conventional method based on RBFNNs.
The redundant data in log files and the delay for detecting abnormal trails are the inherent problems existing in the traditional secure monitoring subsystem of a comp.ter system. It is identified that the system secu...
详细信息
The redundant data in log files and the delay for detecting abnormal trails are the inherent problems existing in the traditional secure monitoring subsystem of a comp.ter system. It is identified that the system security policies determine the logging data items in a secure monitoring function. By formally describing and analyzing the famous Clark-Wilson integrity policies with the corresponding relation patterns, the minimal logging data items set involved in these security policies is precisely determined. A formal secure monitoring model based on Clark-Wilson integrity policies (CW-SMM) is proposed. The CW-SMM has the characteristics of both minimal logging data and auto-detecting of the system abnormal trails in time, and can thoroughly solve the problems mentioned above.
Radiant characteristic and mutual coupling of planar arrays is analyzed by MOM. Emphasis is put upon the discussion of antenna arrays consisting of the element antennas (incline element antenna) which make any angles ...
详细信息
Radiant characteristic and mutual coupling of planar arrays is analyzed by MOM. Emphasis is put upon the discussion of antenna arrays consisting of the element antennas (incline element antenna) which make any angles with arrays. Numerical results of pattern, input impedance, etc., are presented. The result indicates that arrays consisting of incline element have their own characteristic.
To identify disease genes from these gene expression profiles is critically important for disease, such as cancer, subtype discovery, diagnosis and pathology study. This paper proposes a feature gene selection method ...
详细信息
To identify disease genes from these gene expression profiles is critically important for disease, such as cancer, subtype discovery, diagnosis and pathology study. This paper proposes a feature gene selection method named EFST(Ensemble Feature Selection Based on Recursive Partition-Tree) which can be applied to select multiple feature gene groups from one training sample set, and defines a significance and stability measure for each selected feature in a way similar to the ensemble decision method of supervised machine learning. Authors apply the EFST method to analyse the published 2,000 gene expression profile data. The results indicate that the EFST method can be used not only to select feature genes and reduce the dimension of feature space, but also to increase significantly the disease prediction accuracy of many classification methods including SVM, nearest neighbor classifier, Fisher linear and Logistic nonlinear discriminant analysis.
The background and system frame of the system BAQS are presented. An approach is explored in which questions are analyzed based on the detection of question focus chunk, semantic chunk and question template. Then vect...
详细信息
The background and system frame of the system BAQS are presented. An approach is explored in which questions are analyzed based on the detection of question focus chunk, semantic chunk and question template. Then vectors are used for the whole semantic representation. With the elicitation of ontology and Hownet, a bank ontology database and bank Hownet are built up. The finance domain texts are annotated in the head, and then the answer extracted from the tag trees by the question vector. For a specific bank a question-answering system is implemented and experiments do prove that it is feasible to use the method to develop a domain question-answering system, that is valuable for further study in more depth.
In an under dense plasma, the laser wave equation is given with higher-order-relativistic (HOR) effect. A variation method is used to study HOR effect for intense laser beam propagation in plasma channel including dif...
详细信息
In an under dense plasma, the laser wave equation is given with higher-order-relativistic (HOR) effect. A variation method is used to study HOR effect for intense laser beam propagation in plasma channel including diffraction, pre-formed plasma channel guiding and lower order relativistic effects. In the paraxial approximation, a potential well also exists for laser spot size. HOR effect decreases the amplitude of laser spot size osci.lation, whereas accelerates its rate. Furthermore, it prevents the singularity of infinite intensity of laser beam when laser power is greater than (or equal to) the relativistic critical power. The condition of balance-solution of the beam spot size is also given.
暂无评论