Proper ontology definition is the prerequisite for efficient knowledge acquisition. For the complex knowledge that could not be described by simple binary relation, we advocated a methodology for aggregated knowledge ...
详细信息
ISBN:
(纸本)9781424430536;9780769531519
Proper ontology definition is the prerequisite for efficient knowledge acquisition. For the complex knowledge that could not be described by simple binary relation, we advocated a methodology for aggregated knowledge acquisition, describing how to define the ontology for such aggregated knowledge concept and how to acquire knowledge basing on such definition. Experiment shows that this methodology is effective in automatic knowledge acquisition from Chinese free text.
Attribute discretization is one of the key issues for the Rough Set theory. First, a method is proposed to compute an initial cut points set. The indistinguishable relation of decision tables did not change, and the n...
详细信息
Attribute discretization is one of the key issues for the Rough Set theory. First, a method is proposed to compute an initial cut points set. The indistinguishable relation of decision tables did not change, and the number of elements in the initial cut points set was reduced. Then, the cut point information entropy was defined to measure the importance of a cut point. Finally, an attribute discretization algorithm based on the Rough Set and information entropy was proposed. The consistence of decision tables did not change, and the mixed decision table was considered, which contains continuous and discrete attributes. The experimental results show that this algorithm is effective and is competent for processing the large-scale datasets.
We present a novel object localization approach based on the global structure constraint model (GSC) and optimal algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa...
详细信息
ISBN:
(纸本)9781424431977;9780769531618
We present a novel object localization approach based on the global structure constraint model (GSC) and optimal algorithm. In GSC, Objects are described as constellations of points satisfied with their specific global structure constraints. The spatial relations among all the patches having stable color information and their representative color information around patches are encoded. Then, the searching algorithm, i.e. genetic algorithm, is used to locate target objects in images by finding out the exactly matched position. In the experiment, we tested the approach on a collection of human face images and the results demonstrated the approach is simple, effective and efficient.
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by one-point coverage random sets theory and also the unified framework...
详细信息
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by one-point coverage random sets theory and also the unified framework of fuzzy information. On the basis of which, according to the feature of policy based network management, a model used to update the predicted information using present known information, experience, and knowledge is designed. At the same time, this thesis put forward that, take the semblance of policy as constant probability in product space conditional event algebra, so as to execute information fusion of multiple sets of related policy. In the end, compared with the policy based inference system and then analyze the result.
As complexity and demand for new products grow, companies are realizing that their supply chains need to be more flexible. Currently, in supply chain system, users' reliance has driven a universal user expectation...
详细信息
As complexity and demand for new products grow, companies are realizing that their supply chains need to be more flexible. Currently, in supply chain system, users' reliance has driven a universal user expectation that all the information be readily availability whenever and wherever they want. Evaluating and thinking about managing such availability are therefore becoming one of the important factors to improve the performance of the supply chain system. So, how to effectively analyze and evaluate service availability of supply chain system is a challenging problem for investigators. In this paper, the architecture of web-based services of flexible supply chain system is interpreted elaborately, and then an imperfect coverage service model for this system is designed and analyzed exhaustively. The result achieved from this model can help designers find the right tradeoffs for achieving availability of users required while providing acceptable levels of performance.
The flowshop scheduling problem has been widely studied in the literature and many techniques have been applied to it, but few algorithms have been proposed to solve it using particle swarm optimization algorithm (PSO...
The flowshop scheduling problem has been widely studied in the literature and many techniques have been applied to it, but few algorithms have been proposed to solve it using particle swarm optimization algorithm (PSO) based algorithm. In this paper, an improved PSO algorithm (IPSO) based on the ldquoall differentrdquo constraint is proposed to solve the flowshop scheduling problem with the objective of minimizing makespan. It combines the particle swarm optimization algorithm with genetic operators together effectively. When a particle is going to stagnates, the mutation operator is used to search its neighborhood. The proposed algorithm is tested on different scale benchmarks and compared with the recently proposed efficient algorithms. The results show that both the solution quality and the convergent speed of the IPSO algorithm precede the other two recently proposed algorithms. It can be used to solve large scale flowshop scheduling problem effectively.
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential application...
详细信息
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential applications of this frameworkin trusted network were discussed,and the accessprocedure of terminals in hiberarchy trusted networkwas given based on the existing research *** show that by the proposed framework,notonly the safety and reliability of network can beensured,but also the flexibility of ways to accessnetwork is strengthened,and that the framework canprovide supports for interoperability of differentequipment suppliers.
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, p...
详细信息
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, propose a dynamic policy trigger model, and designs a mechanism which is used to update dynamic policy according to known information, experience and knowledge to satisfy the QoS of mobile services and use current network resource sufficiently.
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from...
详细信息
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from betweenness centrality, a congestion function to represent the extent of congestion is proposed. By introducing the concept of "delay time", the correlation between permanent removing and non-removing is built. And a new evaluation function of network efficiency based on congestion function is given in order to measure the damage of cascading failures. Moreover some effects of network structure and size, delay time on congestion propagation are also investigated, and cascading process composed of three phases and some factors affecting cascade propagation are uncovered.
暂无评论