Neusoft Institute of Information

www.neusoft.edu.cn
Dalian, China

Neusoft Institute of Information is a private university insititution with campuses in Dalian, Guangzhou and Chengdu, China, specializing on information technology. Wikipedia.


Time filter

Source Type

Wang J.,Sun Yat Sen University | Wang J.,Neusoft Institute of Information | Zhang N.-Y.,Neusoft Institute of Information | Yin J.,Sun Yat Sen University
Proceedings - 2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010 | Year: 2010

In recent years, extensive researches have been conducted to develop approaches to answer two major challenges for collaborative filtering problems, namely sparsity and scalability. In this paper, we propose a novel collaborative filtering recommendation approach to alleviate these challenges. Our approach firstly converts the user-item ratings matrix to user-class matrix, and hence increases greatly the density of the data in the resulted matrix. Next, we fuzzily partition users into different groups by using Fuzzy C-Means (FCM) algorithm. We believe this is a more reasonable and natural way of partition by preferences. Finally, we propose a novel CF top-N recommendation algorithm to generate the recommendation list directly. We provide results and evaluations of computational experiments to demonstrate that our approach does provide better computational accuracy and efficiency, and does outperform other CF approaches with respect to the metrics of precision, recall and F1. ©2010 IEEE.


Zheng J.-S.,Neusoft Institute of Information | Wu B.-Y.,Harbin Institute of Technology
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2010

Empirical Mode Decomposition (EMD), the core of Hilbert-Huang transformation, is reckoned on the algorithm of the extrama extending and generation of envelope curves. A novel EMD algorithm was proposed based on reproducing kernels with good local property such as odd order vanishing moments, rapid attenuation of scaling, symmetry and regularity. At last, simulations on two non-stationary signals show the novel EMD algorithm is suitable to analyze the nonlinear and non-stationary signal.


Yu C.,Neusoft Institute of Information | Yuan M.-T.,Wuhan University
ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering | Year: 2010

With the o ularity of Internet technology, web services are becoming the most romising aradigm for distributed com uting. However, when a single web service fails to meet service requestor's multi le function needs, web services need to be dynamically configured together to form a web service com osition with Qos constraints. This a er ro oses BTWS algorithm for web service selection, which is based on the sorted function gra h. With the gra h model, it converts the roblem to a multi-constraint o timal ath roblem in the gra h theory. The o timal com osite services can be constructed with meeting the Qos constraints. The simulation ex eriments show that com ared to the same kind of algorithm, it is much better in the metrics of runtime and memory usage. © 2010 IEEE.


Luo F.,University of Electronic Science and Technology of China | Xiong Y.,Neusoft Institute of Information
Proceedings - 2011 International Conference on Computational and Information Sciences, ICCIS 2011 | Year: 2011

Ontology is a philosophical concept originally,which describes the natures of objects. Because there is not a common criterion for building ontology, a lot of heterogeneous ontologies are constructed in the same domain.Ontology mapping is an effective method to realize the interoperation of heterogeneous ontology. The key of ontology mapping is to calculate similarities between concepts. In this paper, we propose a multi-strategy ontology mapping method. The concept similarity is computed from the aspects of concept name, concept attribute and concept relationship. What's more, the candidate set and information gain are brought to improve the accuracy of similarity and to simplify the calculation process. Extensive simulations show that the approach is an effective algorithm and better than others. © 2011 IEEE.


Li P.-X.,Neusoft Institute of Information
Proceedings of 20th International Conference on Industrial Engineering and Engineering Management: Theory and Apply of Industrial Engineering | Year: 2013

2012 November 11th, on the background of bleak retail industry and harsh electrical environment, Taobao and Tmall achieved 19.1 billion's turnover within 1 day, and most of the share were contributed by those small and medium-size brands as well as Tao-brands.Why those undistinguished ordinary small brands and Tao-brand could obtain such an impressive achievement? In this paper, the author reflects on this phenomenon and finds that the reasons are mixed, including: (a) the risks of shopping online; (b) the innovation sales mode employed by Taobao and Tmall; (c) low cost interactive between businesses and customer; (d) the amplification effect of network; (e) Alibaba platform is mature and stable; (f) the platform is a combination of diversification and specialization. Furthermore, the author also points out four main problems emerge in this phenomenon. © Springer-Verlag Berlin Heidelberg 2013.


Zhang X.-Q.,Neusoft Institute of Information
19th International Conference on Industrial Engineering and Engineering Management: Management System Innovation | Year: 2013

The teaching design of resource-based collaborative learning, as a teaching strategy, is on the basis of relevant theories of educational technology, and confirms reasonable teaching resources and knowledge by analyzing learning contents and teaching objectives so that collaborative learning can be put into effect depended on all kinds of collaborative means and interactive mode and learning effect is also improved. On the basis of relevant theories of resource-based collaborative learning, this paper takes the example of "Purchasing Management" course in vocational high school, and elaborates the teaching design process of resource-based collaborative learning in detail from four steps, that is frontend analysis, detailed design, learning process, and effectiveness evaluation and so on. The teaching practice has acquired well effect and it will offer important references for transformation and practice of education of vocational high school in China. © 2013 Springer-Verlag Berlin Heidelberg.


Wen T.,Northeastern University China | Sheng G.,Northeastern University China | Guo Q.,Neusoft Institute of Information
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | Year: 2012

In the scenario of database outsourcing, database management is outsourced to the professional third-party, and one of the critical problems is integrity authentication of the query results. As far as we are concerned, we are the first to propose the problem of outsourced append-only database. According to the features of outsourced append-only database, a new authentication data structure, Min-Max Hash tree is proposed based on the current authentication data structure. It can be utilized by the clients to solve the problem of authenticating the query results. For the data owner side, a basic data forwarding algorithm is proposed; and for the service provider side, the algorithm of querying rise, fall or oscillation amplitude in price and the algorithm of query results authentication are proposed respectively for one-shot query and continuous query. Finally, optimization measures are proposed for data forwarding, storage of authenticated data structure in the data owner side and continuous query in the service provider side, by which the space of storage is diminished greatly and the whole efficiency of data processing is improved further. Extensive experiments have demonstrated the effectiveness and efficiency of the proposed Min-Max Hash tree. It can be utilized to authenticate the query results and to process the massive data.


Dong Y.,Neusoft Institute of Information | Sun B.,Neusoft Institute of Information
Proceedings - 2011 International Conference on Network Computing and Information Security, NCIS 2011 | Year: 2011

A distributed dynamic power control algorithm that can improve per-user throughput significantly in dense WLAN/WPANs is proposed in this paper. It can solve self-interference problems which are caused by the deficiency of communication channels, particularly for non-uniform traffic conditions. Computer simulations show that given any traffic load distribution and any initial channel allocation, the algorithm converges to an equilibrium state in a short time, in which the overall throughput of the network is significantly improved. The proposed algorithm can change its threshold self-adaptively and has significant practical value due to its simplicity and effectiveness. © 2011 IEEE.


Chen P.,Neusoft Institute of Information | Liu S.,Neusoft Institute of Information
Proceedings - 2010 WASE International Conference on Information Engineering, ICIE 2010 | Year: 2010

To meet the requirements of some intelligent vehicle monitoring system, the software integrates Global Position System (GPS), Geographic Information System (GIS) and Global System for Mobile communications (GSM) in the whole. The structure, network topology, functions, main technical features and their implementation principles of the system are introduced. Then hardware design of the vehicle terminal is given in short. Communication process and data transmission between the server and the client (relay server) and client through TCP/IP and UDP protocol are discussed in detail in this paper. Testing result using LoadRunner software is also analyzed. Practice shows the robustness of the software and feasibility of object-oriented programming. © 2010 IEEE.


Zeng Q.-H.,Neusoft Institute of Information
ICINA 2010 - 2010 International Conference on Information, Networking and Automation, Proceedings | Year: 2010

The World Wide Web is an open repository with lots of information, in which the ontologies can help users to get their required information. There are varies of ontologies in the WWW reference, ontologies can be reused by others to implement interoperability of them.As the rapid evolution and autonomy of Web ontonolgies , how to integrate ontologies becomes the key to reuse Web ontologies.This paper presents a method of mapping ontologies to first order logic. Then, it also presents methods to cheek the ontologies'consisteney and integrate the ontologies based on the former method. © 2010 IEEE.

Loading Neusoft Institute of Information collaborators
Loading Neusoft Institute of Information collaborators