Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations ...
详细信息
Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations or future popular academic topics. This paper demonstrates the change of Structural Holes in the whole network and for some individual authors from 2009 to 2012 in ICML. This paper is going to study the biggest subset in 2009, which separates into several smaller subsets with less structural holes in 2010 and 2011, while the number of structural holes in 2012 increases. The graphs of the whole networks from 2009 to 2012 drawn by Ucinet are going to demonstrate the changes of structural holes from 2009 to 2012 and expl the reason why there are more structural holes in 2012 compared to 2010 and 2011. The reason is that the ainnumber of authors in 2012 increases about 50 percent compared to 2011, which results in that authors need to find new collaborations and leaders may become intermediaries to connect new authors and existing authors occupying structural holes. And some authors whose papers are published on ICML continuously from 2009 to 2012 are going to be analysed to indicate the changes of their position in the network. Some authors are increasingly constrained in certain groups, while some other authors become bridges connecting different groups and some other authors changes are correspond to the changes of the whole network. They are constrained in certain subset with less structural holes in 2010 and 2011 but, due to large number of authors joining in ICML, more likely to occupy more structural holes.
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, ...
详细信息
ISBN:
(纸本)9781467372190
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, an algorithm based on electrooculogram(EOG) has been proposed in this paper. In the proposed approach, wavelet packet decomposition was firstly used to smooth EOG signals during reading tasks, and then, according to the predefined coding strategy, the smoothed EOG waveform is translated into a coding string to represent current reading state. Finally, Levenshtein distance is employed to measure the similarity of the template string and the output string. The experiments under the experimental paradigms of autonomy-reading and stimulus-reading and reading with rest state have been carried out. The mean accurate has reached 90%. The experimental results indicate that the proposed algorithm can effectively recognize human reading activity state.
Speech enhancement is crucial for speech recognition accuracy. How to eliminate the effect of the noise constitutes a challenging problem in speech processing. This paper presents a new technique for speech enhancemen...
详细信息
Non-subsampled contourlet transform (NSCT) is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse ...
详细信息
Curvelet transform is the combination of the multi-scale analysis and multi-directional analysis transforms, which is more suitable for objects with curves. Applications of the curvelet transform have increased rapidl...
详细信息
Despite numerous efforts on blur measurement of partially blurred images, there still lacks an effective blur measure that is both pixel-wise and locally sharp consistent. The paper proposes a novel method with two co...
详细信息
Mining from ambiguous data is very important in data mining. This paper discusses one of the tasks for mining from ambiguous data known as multi-instance problem. In multi-instance problem, each pattern is a labeled b...
详细信息
Mining from ambiguous data is very important in data mining. This paper discusses one of the tasks for mining from ambiguous data known as multi-instance problem. In multi-instance problem, each pattern is a labeled bag that consists of a number of unlabeled instances. A bag is negative if all instances in it are negative. A bag is positive if it has at least one positive instance. Because the instances in the positive bag are not labeled, each positive bag is an ambiguous. The mining aim is to classify unseen bags. The main idea of existing multi-instance algorithms is to find true positive instances in positive bags and convert the multi-instance problem to the supervised problem, and get the labels of test bags according to predict the labels of unknown instances. In this paper, we aim at mining the multi-instance data from another point of view, i.e., excluding the false positive instances in positive bags and predicting the label of an entire unknown bag. We propose an algorithm called Multi-Instance Covering kNN (MICkNN) for mining from multi-instance data. Briefly, constructive covering algorithm is utilized to restructure the structure of the original multi-instance data at first. Then, the kNN algorithm is applied to discriminate the false positive instances. In the test stage, we label the tested bag directly according to the similarity between the unseen bag and sphere neighbors obtained from last two steps. Experimental results demonstrate the proposed algorithm is competitive with most of the state-of-the-art multi-instance methods both in classification accuracy and running time.
To simplify the design process of coding matrices for data forwarding in two-way wireless relay networks with multiple relay nodes, a distributed cooperative transmission scheme based on cyclic delay diversity (CDD) a...
详细信息
To simplify the design process of coding matrices for data forwarding in two-way wireless relay networks with multiple relay nodes, a distributed cooperative transmission scheme based on cyclic delay diversity (CDD) and conventional space-time codes is proposed in this paper. All relay nodes are divided into several groups firstly. In each group, the relay nodes adopt CDD ways to amplify-and-forward (AF) their received signals and thereby obtain the potential diversity gains. The forwarded signals among different groups are encoded into the form of one full-rate space-time code, which can solve the problem on limited error correction ability in conventional relay schemes only using CDD ways and then further reduce the bit error rate (BER) of the distributed wireless system. Consequently, the design process for two-way relay transmissions is simplified and this method can be extended to other complicated cases. Simulation results verify that the proposed scheme is able to achieve high diversity gains and good bit error performance.
A new structure of coupled-fed loop antenna con- nected with two branch radiators for eight-band LTE/WWAN (LTE700/GSM850/900/1800/1900/UMTS/LTE2300/2500) operation in the ultra-thin laptop computer is presented. The t...
详细信息
A new structure of coupled-fed loop antenna con- nected with two branch radiators for eight-band LTE/WWAN (LTE700/GSM850/900/1800/1900/UMTS/LTE2300/2500) operation in the ultra-thin laptop computer is presented. The two branch strips of the antenna are e±cient radiators and contributing multi-resonant modes to greatly enhance the bandwidth of the antenna. The proposed antenna on the top shielding metal wall of the laptop display, with a planar and compact size of 12:5 × 70 × 0:8mm3, is suitable to be embedded inside the casing of the laptop computer. The proposed antenna is fabricated and tested, and good radiation performances are obtained. Compared with the existing published antennas, the volume of the planar antenna is quite small.
The use of orthogonal channels for the cooperative transmission results in a loss of rate or spectral efficiency, and the exiting full-rate cooperative transmission schemes based on space-time code design have the def...
详细信息
暂无评论