Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm
Shi Na, Liu Xumin, Guan Yong
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Efficient Modeling of Spam Images
Qiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Modeling Document Summarization as Multi-objective Optimization
Lei Huang, Yanxiang He, Furu Wei, Wenjie Li
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
The Design and Implementation of Host-Based Intrusion Detection System
Ou, Yang-jia, Lin, Ying, Zhang, Yan, Ou, Yang-jia
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A Collaborative Filtering Algorithm Based on Time Period Partition
Yuchuan Zhang, Yuzhao Liu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A Focused Crawler Based on Naive Bayes Classifier
Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A New Method of Sea-Sky-Line Detection
Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A Security Architecture for Intranet Based on Security Area Division
Gao Fuxiang, Li Sha, Wang Xiaolu, Yao Lan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A General Method of Constructing the Reversible Full-Adder
Lihui Ni, Zhijin Guan, Wenying Zhu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
SAR Image Segmentation Based on SWT and Improved AFSA
Miao Ma, Jian-hui Liang, Li Sun, Min Wang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling
Houshmand, Mahboobeh, Soleymanpour, Elaheh, Salami, Hossein, Amerian, Mahya, Deldari, Hossein
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Emotion Recognition of Electromyography Based on Support Vector Machine
Yang Guangying, Yang Shanxiao
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy
Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data
Yanbin Liu, Ping Yuan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
A Prototype System of Software Reliability Prediction and Estimation
Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding