data query comparison of largedata should process a large number of datasets, which is the core for basic research projects. In the selection of analysis factors, how to choose a better way to provide dataanalysis l...
详细信息
ISBN:
(纸本)9781538608401
data query comparison of largedata should process a large number of datasets, which is the core for basic research projects. In the selection of analysis factors, how to choose a better way to provide dataanalysis library can be very helpful for quickly analysis and search comparison. In this study, we try to design and study, improve the speed of data query and comparison in big datasets, and find a similar bleak analysis, construct data fuzzy comparison after the results of modelling analysis. How to filter out relevant quarries and utilise creative elements may be able to mate the results. In the case studies, the proposed method will be carried out through artificial experience analysis and extraction for analysis results, and it will also be further applied to different industry analysis techniques. In this study, we used creative data engineering to reorganise unknown information from the database first. After the data collection, we aim to find possible similar variable factors and combine them withthe data structure management. thirdly, through the intersection of information quickly query, relevant data can be drawn to cross-matching pre-established models. When relevant factors change, we allow different aggregation. Finally, after the selection, our study can analyse and select all the data structure of the original non-relevance of the field data to find out the relevance of the results.
Stem and leaf plots are data dense visualizations that organize large amounts of micro-level numeric data to form larger macro-level visual distributions. these plots can be extended with font attributes and different...
详细信息
the area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user inv...
详细信息
ISBN:
(纸本)9781538626931
the area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user involvement in the design process leads to visualizations that are generic and often ineffective for cyber-security analysts. thus, the adoption of the resultant cyber-security visualizations is low and this highlights a major research gap. this paper presents expert-interview based validation of EEVi - a model developed to aid in the design and evaluation process of cyber-security visualizations, with a view to make them more effective for cyber-security analysts. A visualization is considered effective if the characteristics of the visualization are essential for an analyst to competently perform a certain task. thirteen experts were interviewed (six visualization designers and seven cyber-security analysts) and their feedback guided revisions to the model. the responses were subsequently transposed from qualitative data to quantitive data in order to perform statistical analyses on the overall data. this demonstrated that the perspectives of visualization designers and cyber-security analysts generally agreed in their views of effective characteristics for cyber-security visualization, however there was no statistically significant correlation in their responses.
this paper presents a benchmark and accuracy analysis of 3D sensor calibration in a large industrial robot cell. the sensors used were the Kinect v2 which contains both an RGB and an IR camera measuring depth based on...
详细信息
this paper presents a benchmark and accuracy analysis of 3D sensor calibration in a large industrial robot cell. the sensors used were the Kinect v2 which contains both an RGB and an IR camera measuring depth based on the time-of-flight principle. the approach taken was based on a novel procedure combining Aruco visual markers, methods using region of interest and iterative closest point. the calibration of sensors is performed pairwise, exploiting the fact that time-of-flight sensors can have some overlap in the generated point cloud data. For a volume measuring 10m × 14m × 5m a typical accuracy of the generated point cloud data of 5-10cm was achieved using six sensor nodes.
Online social networks provide an unprecedented opportunity for researchers to analysis various social phenomena. these network data is normally represented as graphs, which contain many sensitive individual informati...
详细信息
Online social networks provide an unprecedented opportunity for researchers to analysis various social phenomena. these network data is normally represented as graphs, which contain many sensitive individual information. Publish these graph data will violate users' privacy. Differential privacy is one of the most influential privacy models that provides a rigorous privacy guarantee for data release. However, existing works on graph data publishing cannot provide accurate results when releasing a large number of queries. In this paper, we propose a graph update method transferring the query release problem to an iteration process, in which a large set of queries are used as update criteria. Compared with existing works, the proposed method enhances the accuracy of query results. the extensive experiment proves that the proposed solution outperforms two state-of-the-art methods, the Laplace method and the correlated method, in terms of Mean Absolute Value. It means our methods can retain more utility of the queries while preserving the privacy
To visualize information about process behavior over time, typically timeline based visualizations are used in contemporary analysis tools. When an overview over a large range of process instances and possible repetit...
详细信息
ISBN:
(纸本)9783319584577;9783319584560
To visualize information about process behavior over time, typically timeline based visualizations are used in contemporary analysis tools. When an overview over a large range of process instances and possible repetitive behavior is to be displayed, however, the timeline projection comes with several limitations. In this article, an alternative to the common timeline projection of process event data is elaborated, which allows to project series of time-related events and regularities therein onto a circular structure. Especially for comparing process rhythms in multiple sets of event data, this visualization comes with advantages over timeline projections and provides more flexibility in configuration. A conceptual elaboration of the approach together with a prototypical implementation is presented in this paper.
Recently, more and more countries decided to develop electric vehicles especially electric car. However, because of low prices and other issues, electric bicycles have become the most popular electric transportation v...
详细信息
ISBN:
(纸本)9781509044290
Recently, more and more countries decided to develop electric vehicles especially electric car. However, because of low prices and other issues, electric bicycles have become the most popular electric transportation vehicles in many developing countries. For example, there are more than 210 million electric bicycles in China. large-scale electric bicycle charging demand from time to space will not only has an impact on power distribution grid, but also has demand side management (DSM) value. In this paper, we introduced a method for estimating the real-time charging load for electric bicycles. then we visualized demand in space using heat map and power density node. the numerical results illustrate that large-scale electric bicycle charging demand not only has a great peak-valley but also exhibits unbalance in space.
Stem and leaf plots are data dense visualizations that organize large amounts of micro-level numeric data to form larger macro-level visual distributions. these plots can be extended with font attributes and different...
详细信息
ISBN:
(纸本)9781538608524
Stem and leaf plots are data dense visualizations that organize large amounts of micro-level numeric data to form larger macro-level visual distributions. these plots can be extended with font attributes and different token lengths for new applications such as n-grams analysis, character attributes, set analysis and text repetition.
In this paper, we introduce a new visualization tool for network-wide intrusion detection. It is based in multivariate anomaly detection with a combination between Principal Component analysis (PCA) and a new variant ...
详细信息
Since 2007 Museum of King Jan III's Palace at Wilanow and Warsaw University of Technology, Faculty of Mechatronics are together developing precise, structured light-based scanning methods. this cooperation was est...
详细信息
ISBN:
(纸本)9780892083268
Since 2007 Museum of King Jan III's Palace at Wilanow and Warsaw University of Technology, Faculty of Mechatronics are together developing precise, structured light-based scanning methods. this cooperation was established in order to elaborate solutions allowing documenting characteristics of the sutface of different cultural heritage objects. the gathered data are intended to support the processes of conservation, education, historical analysis as well as the sharing of the visualizations of the especially fragile objects. In order to fulfill those requirements for most of the historic artifacts, scanning with a spatial resolution of at least 2500 points per square millimeter is needed. As a result of those assumptions, files of a very large size are produced. Today's software environments for such a huge data processing and applications to visualize those data are very limited. Consequently, this raises the need for either a significant simplification of visualization process or a reduction of the shared results of measurements (by showing data concerning only a small parts of the heritage objects). Which path would be most suitable for the end users? Should this insufficiency of the visualization software cause a reduction of the quality of the measurement processes?
暂无评论