During the process of web data integration, new related websites consisting valuable data will be identified constantly. Wrapper induction based on labeled examples is a widely accepted method. However, manually label...
详细信息
During the process of web data integration, new related websites consisting valuable data will be identified constantly. Wrapper induction based on labeled examples is a widely accepted method. However, manually labeling the sampled webpages in the new website is a time-consuming work. To efficiently extract the structured data from new related websites, a novel model, Hybrid Hierarchical Conditional Random Fields (HH-CRFs), is proposed in this paper. HH-CRFs is trained from the accumulated data in the system of Web data integration, and HH-CRFs do type identification of Web object, Web object detection and attribute labeling together. Then, the labeled sampled webpages will be used to induce the wrapper of target website. Experimental results using a large number of realworld data collected from diverse domains show that the proposed approach can help to induce the target wrapper efficiently.
In this paper, a γ dependent lower C limits formula for the effective hyperparameter (C, γ) region for Support Vector Classification (SVC) with Radial Basis Function (RBF) kernel is derived, on the basis of a typica...
详细信息
High-dimensional data often appear in multi-label classification, and traditional multi-label classification algorithms can not manage this kind of data well. To solve these problems, a novel approach named High-dimen...
详细信息
Currently, industrial and scientific community are concerned about Service-Oriented Computing(SOC), whose key technology is Web services. Web service is a new distributed computing model. It has a broad prospect in ap...
详细信息
Currently, industrial and scientific community are concerned about Service-Oriented Computing(SOC), whose key technology is Web services. Web service is a new distributed computing model. It has a broad prospect in application because of its loose coupling, platform irrelevance, language neutral, reusability and openness characteristics. However, the existing problems of Web service restrict the development of Service-Oriented Computing. The significance of research on Web service access control security model is profound. This paper puts trust mechanism as independent attributes to be used in Service-Oriented Computing security model to solve the above problems, and to be suited for Web services in characteristic of dynamic and fine-grained.
This paper proposes a novel approach to facial expression recognition based on label propagation techniques and the neighborhood preserving embedding. It considers both the global and local structure of the training d...
详细信息
In order to support generating crowd animation roles automatically based on a 3D animation prototype, an evolutionary modeling approach was proposed. The approach could generate a great deal of 3D animation modelings ...
详细信息
In order to support generating crowd animation roles automatically based on a 3D animation prototype, an evolutionary modeling approach was proposed. The approach could generate a great deal of 3D animation modelings which were alike in appearance but different in characteristics by deforming the 3D animation prototype. An interactive and adaptive genetic algorithm AIAGA was introduced in this approach. In AIAGA, ACIS rule expressions were expressed by three binary trees, which were used to scale 3D entities unevenly in the x-axis, y-axis and z-axis direction separately. New rule expressions, which were used to generate new modelings by evolving, were generated by selection, adaptive crossover and mutation on binary trees. Experiments in the prototype system developed in this paper show that the proposed approach can effectively support generating a series of 3D animation modelings for crowd animation.
For large amount of computation in elliptic curve cryptography, we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equat...
详细信息
For large amount of computation in elliptic curve cryptography, we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equation as the breakthrough point. The signcryption equation of the new scheme was s=k-r-kA mod n and the corresponding verification was X=(s+r)G+PA, which correctness has been verified. The results of analyzed the efficiency of operation and the security of the improved scheme show that, it meets the safety requirements of digital signature scheme, at the same time, it reduces an operation of number multiplication in the process of signature and lowers the number of points multiplication. After, the new scheme was applied to the electronic evidence protection, which has the function of message recovery.
Task assignment problem is one of the important research topics in a multi-agent system. It is desired to assign each task to a suited agent with a minimum total cost. For the advantages of memory, multi-character, lo...
详细信息
Task assignment problem is one of the important research topics in a multi-agent system. It is desired to assign each task to a suited agent with a minimum total cost. For the advantages of memory, multi-character, local search and the solution improvement mechanism in artificial bee colony (ABC) algorithm, a task assignment approach based on ABC in a multi-agent cooperative design system is proposed in this paper. Experimental results demonstrate that the optimal solutions obtained by the ABC algorithm are better than genetic algorithm and particle swarm optimization on solving some task assignment problems.
With the development of Internet, e-learning becomes a new modern teaching mode. Educational evaluation is an important part of network teaching system and an important means to improve the teaching quality. PSK-means...
With the development of Internet, e-learning becomes a new modern teaching mode. Educational evaluation is an important part of network teaching system and an important means to improve the teaching quality. PSK-means algorithm is used in teaching quality evaluation system of computer experiments. Teachers and students are classified and analyzed according to their evaluation scores. Based on the evaluation results, network teaching and learning of computer experiments will be improved by teachers and students.
The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electro...
详细信息
暂无评论