The AGM axiom system is for the belief revision(revision by a single belief), and the DP axiom system is for the iterated revision(revision by a finite sequence of beliefs). Li[1] gave an R-calculus for R-configuratio...
详细信息
The AGM axiom system is for the belief revision(revision by a single belief), and the DP axiom system is for the iterated revision(revision by a finite sequence of beliefs). Li[1] gave an R-calculus for R-configurations |Γ, where is a set of atomic formulas or the negations of atomic formulas, and Γ is a finite set of formulas. The set-based minimal change and inference-based minimal change are distinguished in this paper, and two R- calculi V and N are given so that V and N are sound and complete with respect to the set-based minimal change and the inference-based minimal change, respectively.
The AGM axiom system is for the belief revision (revision by a single belief),and the DP axiom system is for the iterated revision (revision by a finite sequence of beliefs).Li [1] gave an R-calculus for R-configurati...
The AGM axiom system is for the belief revision (revision by a single belief),and the DP axiom system is for the iterated revision (revision by a finite sequence of beliefs).Li [1] gave an R-calculus for R-configurations Δ| Γ,where Δ is a set of atomic formulas or the negations of atomic formulas,and Γ is a finite set of *** propositional logic programs,one R-calculus N will be given in this paper,such that N is sound and complete with respect to operator s (Δ,t),where s (Δ,t)is a pseudo-theory minimal change of t by Δ .
Affinity Propagation (AP) algorithm can automatically determine the cluster center and does not need a pre-determined number of clustering. This paper presents a novel neural network classification model, using AP clu...
详细信息
This paper describes a novel strategy for automatic induction of a monolingual dependency grammar under the guidance of bilingually-projected dependency. By moderately leveraging the dependency information projected f...
详细信息
In the protein-protein interactions (PPI), hot regions are the key factor to maintain metabolism and the cause of disease. The conformation and prediction of the hot regions effectively is a worth researching topics. ...
详细信息
ISBN:
(纸本)9781479913114
In the protein-protein interactions (PPI), hot regions are the key factor to maintain metabolism and the cause of disease. The conformation and prediction of the hot regions effectively is a worth researching topics. This paper proposes a prediction method of hot regions based on complex network and community detection. In the prediction process, a hotspots retrieving strategy is used to exploit false positive (FP) and false negative (FN) residues, and these FP and FN residues achieved from the previous hotspots prediction. The method has advantage to identify hot regions in PPI, and experimental results show that the method not only improves the prediction accuracy of hot regions, but also has more reliability.
Lexical cohesion arises from a chain of lexical items that establish links between sentences in a text. In this paper we propose three different models to capture lexical cohesion for document-level machine translatio...
详细信息
ISBN:
(纸本)9781577356332
Lexical cohesion arises from a chain of lexical items that establish links between sentences in a text. In this paper we propose three different models to capture lexical cohesion for document-level machine translation: (a) a direct reward model where translation hypotheses are rewarded whenever lexical cohesion devices occur in them, (b) a conditional probability model where the appropriateness of using lexical cohesion devices is measured, and (c) a mutual information trigger model where a lexical cohesion relation is considered as a trigger pair and the strength of the association between the trigger and the triggered item is estimated by mutual information. We integrate the three models into hierarchical phrase-based machine translation and evaluate their effectiveness on the NIST Chinese-English translation tasks with large-scale training data. Experiment results show that all three models can achieve substantial improvements over the baseline and that the mutual information trigger model performs better than the others.
This paper generalizes the concept of the depth-independent interaction matrix, developed for point and line features in our early work, to generalized image features. We derive the conditions under which the depth-in...
详细信息
Pattern matching is a fundamental application text retrieval, string query, biological sequence analysis, etc. Therefore, the effective algorithm performing this kind of matching is in great need. In this paper, the w...
详细信息
Pattern matching is a fundamental application text retrieval, string query, biological sequence analysis, etc. Therefore, the effective algorithm performing this kind of matching is in great need. In this paper, the wildcard is defines to match any one character in a sequence. Multiple wildcards form a gap. The length of a flexible gap is arbitrary. We design CLPM algorithm by use of cross list index structure to realize pattern matching with flexible wildcard gaps. The preprocessing algorithm is designed to initialize cross list so as to reduce searching space. In CLPM algorithm, the effective intervals is defined and computed based on the start positions of each sub pattern in each string, which help to obtain matching result set. Moreover, the approximate pattern matching is converted to short extract pattern matching. The contrast experiments are done based on DBLP tile data set. The results show that CLMP algorithm has better performance in the same fields.
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ...
详细信息
Video cameras have been widely installed in public facilities for the surveillance applications. So, video authentication has becoming increasingly attractive. This paper presents a dual watermarking for video authent...
详细信息
Video cameras have been widely installed in public facilities for the surveillance applications. So, video authentication has becoming increasingly attractive. This paper presents a dual watermarking for video authentication based on moving objects. For each frame, the frame index, as a watermark is first embedded into the moving objects of the corresponding frame using a reversible watermarking method, aiming to detect the temporal tampering. Then the principle content and the details of the moving objects combined with the authentication code, as the other watermark, are embedded into the frame for spatial tampering location and recovery. Specially, a synthesized frame method is proposed for lossless recovery of moving objects and effective extraction of frame index. Statistical analysis and experiment results show that the proposed method can locate spatial, temporal and spatio-temporal tampering accurately. The spatial tampered regions can be recovered approximately and the moving objects can be restored completely when the tampered area is limited.
暂无评论