lti-label learning aims at predicting a proper label set for each unseen *** instance in the dataset is associated with a set of predefined ***-label learning approaches frequently used choose identical feature set to...
lti-label learning aims at predicting a proper label set for each unseen *** instance in the dataset is associated with a set of predefined ***-label learning approaches frequently used choose identical feature set to determine the instance's membership of each label.
Integrity constraint is a formula that checks whether all necessary information has been explicitly provided. It can be added into ontology to guarantee the data-centric application. In this paper,a set of constraint ...
详细信息
Integrity constraint is a formula that checks whether all necessary information has been explicitly provided. It can be added into ontology to guarantee the data-centric application. In this paper,a set of constraint axioms called IC-mapping axioms are stated. Based on these axioms,a special ontology with integrity constraint,which is adapted to map ontology knowledge to data in relational databases,is defined. It's generated through our checking and modification. Making use of the traditional mapping approaches,it can be mapped to relational databases as a normal ontology. Unlike what in the past,a novel mapping approach named IC-based mapping is proposed in accordance with such special ontology. The detailed algorithm is put forward and compared with other existing approaches used in Semantic Web applications. The result shows that our method is advanced to the traditional approaches.
Through analyzing the security problems which exist in general on-line payment systems, this paper proposes a scheme based on WPKI (Wireless Public key Infrastructure) and further designs and implements a gas station ...
详细信息
ISBN:
(纸本)9787894631046
Through analyzing the security problems which exist in general on-line payment systems, this paper proposes a scheme based on WPKI (Wireless Public key Infrastructure) and further designs and implements a gas station on-line payment system. By using WPKI technology which includes SSL (Secure Sockets Layer) protocol, digital signature and digital certificate, the designed on-line payment system can achieve data privacy, authenticity, integrity and non-repudiation during on-line payment process.
We propose a fast and simple application system of 3D model reconstruction. We acquire range images by using a combination of a regular camera and a depth sensor. The reconstruction of a 3D model consists of four key ...
详细信息
Direction relations between extended spatial objects are important commonsense knowledge. Skiadopoulos proposed a formal model for representing direction relations between compound regions (the finite union of simple ...
详细信息
Most of the current information retrieval systems are mainly based on full text matching of keywords or topic-based classification, often return a large number of irrelevant information, and are unable to meet the use...
详细信息
This article has been retracted: please see Elsevier Policy on Article Withdrawal ( http://***/locate/withdrawalpolicy ). This article has been retracted at the request of the Infringed Author. The authors have plagia...
This article has been retracted: please see Elsevier Policy on Article Withdrawal ( http://***/locate/withdrawalpolicy ). This article has been retracted at the request of the Infringed Author. The authors have plagiarized part of a paper that had already appeared in ACM MULTIMEDIA '07, (2007) 97 – 106. 10.1145/1291233.1291255. One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to readers of the journal that this was not detected during the submission process.
Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it is important to clarify the difference between t...
详细信息
Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it is important to clarify the difference between them. The difference above refers to the logical difference, not syntactic one. Examples of the logical difference include the difference in taxonomy, concept subsumption difference and query difference. These has been well investigated for the lightweight description logic EL because of its tractability and successful application in bio-medical ontologies. Fuzzy EL+ has been put forward and applied in view-based searching in Semantic portals. Thus comes the problem of comparing fuzzy ontologies of different versions and clarifying the difference. In this paper, we define the logical difference of two fuzzy EL+ ontologies. For fuzzy EL+ ontologies of different versions we investigate how to compute the difference in taxonomy and concept subsumption difference. We also explore how to compute approximation of the logical difference of two EL terminologies. Our work can be applied in the scenario of EL+ ontologies with access control if the set of all access rights is a linear order.
Soil fertility grading is an important issue in the agriculture domain, AI based approach has been applied recently. But in most circumstance data obtaining is a expensive and time consuming procedure, sometimes even ...
详细信息
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle el...
详细信息
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by which the on-vehicle electronic systems achieve a trusted boot process. Data and information of vehicles are encrypted before storage and transmission. The experiments show that with the authorization on the vehicular platform, the TCM will improve the credibility and security of the Internet of Vehicles.
暂无评论