Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm
Shi Na, Liu Xumin, Guan Yong
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Modeling Document Summarization as Multi-objective Optimization
Lei Huang, Yanxiang He, Furu Wei, Wenjie Li
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
The Design and Implementation of Host-Based Intrusion Detection System
Ou, Yang-jia, Lin, Ying, Zhang, Yan, Ou, Yang-jia
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Efficient Modeling of Spam Images
Qiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Collaborative Filtering Algorithm Based on Time Period Partition
Yuchuan Zhang, Yuzhao Liu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Security Architecture for Intranet Based on Security Area Division
Gao Fuxiang, Li Sha, Wang Xiaolu, Yao Lan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Focused Crawler Based on Naive Bayes Classifier
Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A New Method of Sea-Sky-Line Detection
Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Loading…
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling
Houshmand, Mahboobeh, Soleymanpour, Elaheh, Salami, Hossein, Amerian, Mahya, Deldari, Hossein
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A General Method of Constructing the Reversible Full-Adder
Lihui Ni, Zhijin Guan, Wenying Zhu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Emotion Recognition of Electromyography Based on Support Vector Machine
Yang Guangying, Yang Shanxiao
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
SAR Image Segmentation Based on SWT and Improved AFSA
Miao Ma, Jian-hui Liang, Li Sun, Min Wang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Loading…
The Study of Electrocardiograph Based on Radial Basis Function Neural Network
Yang Guangying, Chen Yue
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network
Wang, Eric Ke, Yunming Ye
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy
Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
SPIHT Algorithm Combined with Huffman Encoding
Wei Li, Zhen Peng Pang, Zhi Jie Liu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Associating IDS Alerts by an Improved Apriori Algorithm
Wang Taihua, Guo Fan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Prototype System of Software Reliability Prediction and Estimation
Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding