Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 8,525 resultsfor

Filter Results

Show

Results

Missing values are a common problem in most data quality research. Most existing imputation methods of missing values are often evaluated using some distance measure computed between the reference data and the imputed one. Another alternative to evaluate the quality of the imputation is to assess the classification accuracy. In this paper, we address the problem of the evaluation of missing values...Show More
From among multiple criteria models in making complex decisions and multiple criteria models for the most preferable choice, grey relational analysis (GRA) approach has been dealt with. In some cases, determining precisely the exact value of the weight is difficult and that, as a result of this, their values are considered as intervals. Therefore, the aim of this paper is to extend the grey relati...Show More
In recent years, as people use of information technology collection and analysis of data ability to improve and the rapid development of artificial intelligence technology, greatly promoted the data mining technology in the rapid rise of all kinds of basic scientific research, especially on the basis of artificial neural network intelligent algorithm of data mining technology is more widely used. ...Show More
The network is open, which makes it vulnerable to attacks and reduces the accuracy of multi-modal big data security fusion. To solve this problem, a multi-modal big data security fusion method based on privacy ASE encryption algorithm and width learning is proposed. Based on the privacy ASE encryption algorithm, each type of multimodal data is defined, and the corresponding attributes are defined,...Show More
With the rapid development of modern teaching technology, the construction of smart campus has become the focus of modern college education reform. The application of technologies, such as the Internet of Things and big data, plays an important role in improving the teaching environment of colleges and universities, improving the utilization of teaching resources, and the flexibility of education....Show More
Ideal education, the key component of civic moral education, usually describes in qualitative terms and lacks of quantitative results for empirical evidence. Thus, the research of ideal education is difficult to reflect on the situation accurately and even more hard to guide reality practice. To address this problem, we first combine brain plasticity theory, functional brain localization theory, f...Show More

Ranking approach of cross-efficiency based on improved TOPSIS technique

;;;

Journal of Systems Engineering and Electronics
Year: 2011 | Volume: 22, Issue: 4 | Journal Article |
Cited by: Papers (7)
The cross-efficiency evaluation method is reviewed which is developed as a data envelopment analysis (DEA) extensive tool. The cross-efficiency evaluation method is utilized to identify the decision making unit (DMU) with the best practice and to rank the DMUs by their respective cross-efficiency scores. The main drawbacks of the cross-efficiency evaluation method when the ultimate average cross-e...Show More

Ranking approach of cross-efficiency based on improved TOPSIS technique

;;;

Year: 2011 | Volume: 22, Issue: 4 | Journal Article |
We introduce a set of tools that normalize, regulate, unify and structure the notion, practices and design of data preprocessing. The design tools enhance the reproducibility of data preprocessing plans and pipelines and help achieve quality assurance while reducing the complexity of the phase. There is a synergy between the proposed design toolset and the enablers of Internet of Things Applicatio...Show More
In recent years, transport agencies collect more and more GPS data of probe vehicle, data mining on these immense amounts of traffic GPS data is necessary. However, since the GPS data are non-uniform and discontinuous in the network, the quality of these collected GPS data is unreliable and will be worse when there exists lots of noisy data. What's more, if the researchers lack another type of tra...Show More

Task scheduling in the non-ideal topology

;;

IET International Radar Conference 2013
Year: 2013 | Conference Paper |
In the non-ideal topology, processors are not fully-connected and the data transmission cannot achieve fully-concurrency, so the schedule of IPCs (Inter Processor Communication) will affect the performance of parallel processing directly. However, traditional scheduling method usually ignored the scheduling of IPCs, or only schedule IPCs under the simple topologies. To solve this problem, the disa...Show More

Task scheduling in the non-ideal topology

;;

Year: 2013 | Conference Paper |
In this paper, grey correlation analysis is applied to mine the fire IoT monitoring data. The correlation degree between 4,752 IoT monitoring data of social units and the management situation of firefighting work and operation of firefighting facilities in an ideal state was calculated. Using gray correlation analysis algorithm to calculate the personnel presence rate of fire control room, alarm a...Show More
As a new data management model, data space can effectively manage a large amount of multi-heterogeneous dynamic data, but the construction of data space often needs to be based on accurate and scientific original data and to obtain valuable information in data, which poses a challenge to the data quality control of the whole life cycle of data, so it is especially important to evaluate the data qu...Show More
Wireless sensor networks (WSNs) is a vital part of Internet of Things which has been applied in many fields to monitor and collect data from the environment. When the sensor nodes collect data from the monitored area and transmit it to the sink, unequal power consumption and data security must be considered. We propose a secure data collection algorithm for the energy limitation and vulnerable dat...Show More
The article describes a study on spectral spikes observed in Phase Shift Keying (PSK) spectrums. Here, simulation and practical realization of PSK spectrum with spectral spikes and a spike reduction technique have been demonstrated. This technique has been found to be very useful for space applications.Show More
With the development of the cloud computing and big data, massive data based computing and storage have emerged as core technologies. Moreover, a key problem to ensure data availability and analysis accuracy is the data integrity which has received extensive attention. Compared to the mature solution in the batch computing, the data integrity in the stream computing did not receive due attention. ...Show More
Selection of an appropriate sector will be a crucial factor for a success of a business. However, due to a lack of knowledge and guidance in selecting a suitable business idea, the business failure rates have been increased. Within this context, this study aims to develop a computerized model based on a data mining approach to suggest the most suitable business idea to avoid inappropriate business...Show More
In the context of big data, the application of innovative teaching models is more popular in colleges and universities. Micro classes, MOOC and flipped classes help to promote the identity exchange between teachers and students. In order to verify the effect of mixed learning mode on students' academic performance, this study selects entropy weight TOPSIS model to evaluate the performance of onlin...Show More
A new approach to optimum processing of multi-dimensional data arrays for advanced information technologies and education informatics, using innovative mathematical principle based on the combinatorial configurations expounds in this paper. This approach relates to the optimum arrangement of structural elements in two-or multi-dimensional arrays with respect to minimizing of retrieval capacity, an...Show More
Based on data envelopment analysis (DEA) and extended Cournot model, this paper studies how each decision making unit (DMU) makes its most preferred output plans for the next production period when the market demands for one or more outputs are forecasted to change by a certain amount. Taking the perspective of noncooperative competition among all DMUs, this study proposes a method to search for t...Show More
Prior to manufacture a new products, consumers with similar purchasing attitudes are grouped into clusters of which their central points are used as ideal points for new product development. However, many clustering methods ignore the fuzziness of consumers in purchasing products or conducing survey. This paper presents a new method which integrates a fuzzy data processing technique for dimension ...Show More
The identification and selection of emerging technologies has always been a hot field concerned by countries, armed forces and enterprises. Selecting emerging technologies from huge amounts of data is helpful to grasp technological frontiers and technological advantages. We use the unmanned system papers collected in Web of Science (WoS) database as datasets. Firstly, the bibliographic coupling ne...Show More
Accurate prediction of the remaining useful life (RUL) of lithium-ion batteries can ensure the normal and effective operation of power systems using lithium-ion batteries. However, how to select battery prediction parameters through scientific methods and how to accurately predict battery RUL values under high and low temperature conditions are still a huge challenge. Thus according to the techniq...Show More
As a multiple criteria decision making (MCMD) technique, the technique for order preference by similarity to ideal solution(TOPSIS) traditionally has been applied in multiple criteria decision analysis. Based on D.Wu's data mining model, the TOPSIS model presented in this paper has improved from two aspects. Firstly, it extents to deal with both crisp and fuzzy data; Secondly, in order to really f...Show More
Trust and reputation systems represent a significant trend in decision support including selection of best match cloud providers to process Big Data. Reputation is often considered as a collective measure of trustworthiness based on the referrals or ratings from members in a community. Reputation systems have been applied in various applications such as online service provision. However, reputatio...Show More
Widyaiswara is required to show the best performance to fulfill his duties and obligations. Therefore, it is very important to measure the performance of the Widyaiswara, so that it can be used as evaluation material by the BPSDM PROVSU. However, the assessment process that occurs is still not precise and time-consuming. Therefore, to minimize this, a decision support system is needed that can min...Show More