![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Face recognition using a face-only database: A new approach
In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...
-
Chapter and Conference Paper
Learning from Hierarchical Attribute Values by Rough Sets
The rough-set theory has been widely used in dealing with data classification problems. Most of the previous studies on rough sets focused on deriving certain rules and possible rules on the single concept lev...
-
Chapter and Conference Paper
Maintenance of Discovered Functional Dependencies: Incremental Deletion
The discovery of functional dependencies (FDs) in relational databases is an important data-mining problem. Most current work assumes that the database is static, and a database update requires rediscovering a...
-
Chapter and Conference Paper
Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System
The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...
-
Chapter and Conference Paper
A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment
Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...
-
Chapter and Conference Paper
Hiding Predictive Association Rules on Horizontally Distributed Data
In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...
-
Chapter and Conference Paper
The Classification of Wine Based on PCA and ANN
The qualitative identification of different wine through electronic nose is introduced. Principal component analysis (PCA) and artificial neural network (ANN) are adopted to realize the identification. An impr...
-
Chapter and Conference Paper
Virtual Container Based Consistent Cluster Checkpoint
Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...
-
Chapter and Conference Paper
Fuzzy Fatigue Reliability Design Considering Model Uncertainty
In engineering, fatigue failure is one of the main failure modes of actual structures. It is very important in theory and practice to analyze the structural reliability under fatigue loading. The fatigue failu...
-
Chapter and Conference Paper
An English Letter Recognition Algorithm Based Artificial Immune
In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...
-
Chapter and Conference Paper
Document Classification with Multi-layered Immune Principle
Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...
-
Chapter and Conference Paper
An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings
Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...
-
Chapter and Conference Paper
Heuristic Evolutionary Approach for Weighted Circles Layout
In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...
-
Chapter and Conference Paper
Automated Detection of Major Thoracic Structures with a Novel Online Learning Method
This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...
-
Chapter and Conference Paper
A Heuristic Data-Sanitization Approach Based on TF-IDF
Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...
-
Chapter and Conference Paper
Anonymizing Shortest Paths on Social Network Graphs
Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...
-
Chapter and Conference Paper
A Smart-Phone-Based Health Management System Using a Wearable Ring-Type Pulse Sensor
In this paper, a mobile e-health-management system is presented which extends authors’ previous works on mobile physiological signal monitoring. This system integrates a wearable ring-type pulse monitoring sen...
-
Chapter and Conference Paper
Discussion on Digital Storytelling in Comprehensive Practice Courses Application
The increasing development of computer and information technology has brought new challenges as well as opportunities to education. As a way of personal multimedia storytelling, digital storytelling is very po...
-
Chapter and Conference Paper
The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes
As a kind of modulation with high degree of both power and bandwidth efficiency, Filtered QPSK (FQPSK) has been widely applied in the satellite and deep space communication. This paper first investigates the M...
-
Chapter and Conference Paper
Edge Selection for Degree Anonymization on K Shortest Paths
Privacy preserving network publishing has been studied extensively in recent years. Although more works have adopted un-weighted graphs to model network relationships, weighted graph modeling can provide deepe...