In this paper, we present a new regularization classification method based on extreme learning machine for within network node classification problem. In particular, we define a new objective function, which contains ...
详细信息
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes ses...
详细信息
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes session boundary discrimination model (the binary classification tree) utilizing time interval and query likelihood on the basis of COBWEB. The model has prominently improved recall ratio, precision ratio and value F to more than 90 percent and particularly the value F for yes class rises compared with previous study. It is an incremental algorithm that can deal with large scale data, which will be perfectly applied into user interest mining. Owing to its good performance in session boundary discrimination, the application of the model can serve as a tool in fields like personalized information retrieval, query suggestion, search activity analysis and other fields which have connection with search results improvement.
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they ma...
详细信息
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they may instead pay more attention to fresh information. This demand poses challenges to traditional search engines, which concern more about relevance and importance of web pagesA search engine compresses three modules: crawler, indexer and searcherChanges are needed for all these three parts to improve search engine's freshness. This paper investigates the first part of search engine – crawler, we analyze the requirements for real-time crawler, and propose a novel real-time crawler based on more accurate estimation of refresh timeExperimental results demonstrate that the proposed real-time crawler can help search engine improve its freshness.
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and storage space of the reader to construct a filter which can sift authentication applications from tags, thus, it could alleviate workload of the backend server and resist replay attack from an adversary. The structure, filter algorithm, update and sorting algorithm, eraser algorithm of index inner table would be introduced detailedly in this paper. In addition, this protocol is particularly suitable for the low-cost RFID systems;the security and performance of this protocol are analyzed as well.
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,...
详细信息
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID ...
详细信息
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID reader can efficiently utilize calculation capacity and storage space of a reader to construct a filter which can sift authentication applications from tags, thus, alleviate workload of the backend server and resist replay attack from an adversary. In this paper, revised index inner table is proposed, then modified structure and filter algorithm, update and sorting algorithm, eraser algorithm of index inner table can be applied in different filter modes according to various factual application environments.
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function and f(u)...
详细信息
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function and f(u) = O(u3). It is proved that for all m ∈ (0, M*] R (M* is a fixed large number), but a set of small Lebesgue measure, the above equations admit small-amplitude quasi-periodic solutions corresponding to finite dimensional invariant tori for an associated infinite dimensional dynamical system. The proof is based on an infinite dimensional KAM theory and a partial Birkhoff normal form technique.
Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a li...
详细信息
Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a lightweight RFID authentication protocol for mobile reader is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting,tracking and *** Otsu scheme,a widely used image thresholding...
详细信息
ISBN:
(纸本)9781627483766
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting,tracking and *** Otsu scheme,a widely used image thresholding technique,provides approving results for segmenting a gray level image with only one modal distribution in gray level ***,it provides poor results if the histogram of a gray level is *** enhancing the performance of the Otsu algorithm further,in this work,an improved median-based Otsu image thresholding algorithm is *** extensive tests are performed and the experiments show that our method obtain more satisfactory results than the original Otsu thresholding algorithm.
With the rapid development of Internet, information provided by the Internet has shown explosive growth. In the face of massive and constantly updated information on the Internet, how the user can fast access to more ...
详细信息
暂无评论