![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
107 Result(s)
-
Chapter and Conference Paper
Face recognition using a face-only database: A new approach
In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...
-
Chapter and Conference Paper
Learning from Hierarchical Attribute Values by Rough Sets
The rough-set theory has been widely used in dealing with data classification problems. Most of the previous studies on rough sets focused on deriving certain rules and possible rules on the single concept lev...
-
Chapter and Conference Paper
Maintenance of Discovered Functional Dependencies: Incremental Deletion
The discovery of functional dependencies (FDs) in relational databases is an important data-mining problem. Most current work assumes that the database is static, and a database update requires rediscovering a...
-
Article
Multi-cue-based face and facial feature detection on video segments
An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...
-
Chapter
A Time-Completeness Tradeoff on Fuzzy Web-Browsing Mining
World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...
-
Chapter and Conference Paper
Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System
The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...
-
Chapter and Conference Paper
A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment
Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...
-
Chapter
Discovery of Fuzzy Multiple-Level Web Browsing Patterns
Web usage mining is the application of data mining techniques to discover usage patterns from web data. It can be used to better understand web usage and better serve the needs of rapidly growing web–based app...
-
Article
Integrating mRNA Decay Information into Co-Regulation Study
Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...
-
Article
Mining fuzzy sequential patterns from quantitative transactions
Many researchers in database and machine learning fields are primarily interested in data mining because it offers opportunities to discover useful information and important relevant patterns in large database...
-
Article
Hiding collaborative recommendation association rules
The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...
-
Chapter and Conference Paper
Hiding Predictive Association Rules on Horizontally Distributed Data
In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...
-
Chapter and Conference Paper
The Classification of Wine Based on PCA and ANN
The qualitative identification of different wine through electronic nose is introduced. Principal component analysis (PCA) and artificial neural network (ANN) are adopted to realize the identification. An impr...
-
Chapter
Probabilistic Analysis of Information Center Insecurity
Information security has become a top priority for many organizations due to a growing number of computer threats. Modeling information system security has been studied extensively in recent years and many tec...
-
Chapter and Conference Paper
Virtual Container Based Consistent Cluster Checkpoint
Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...
-
Chapter and Conference Paper
Fuzzy Fatigue Reliability Design Considering Model Uncertainty
In engineering, fatigue failure is one of the main failure modes of actual structures. It is very important in theory and practice to analyze the structural reliability under fatigue loading. The fatigue failu...
-
Chapter and Conference Paper
An English Letter Recognition Algorithm Based Artificial Immune
In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...
-
Article
A new type of solution method for the generalized linear complementarity problem over a polyhedral cone
This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...
-
Article
ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer
High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...
-
Chapter and Conference Paper
Document Classification with Multi-layered Immune Principle
Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...