In this paper, we propose a fast incremental mining algorithm of sequential patterns based on sequence tree, called IMSP. Sequence tree is a novel data storage structure similar in structure to the prefix tree. But th...
详细信息
In this paper, we propose a fast incremental mining algorithm of sequential patterns based on sequence tree, called IMSP. Sequence tree is a novel data storage structure similar in structure to the prefix tree. But the sequence tree not only stores all the sequences in the original database but also stores the support of sequences. When the database is updated, IMSP only constructs the projected databases for the sequences associated with the incremental sequences, and completes the updated operations of the sequence tree, and finally finds all the sequential patterns through using depth-first search strategy to traverse the sequence tree. When the support is changed, the sequence tree stores all the sequences in the database with its support, so IMSP can find all the sequential patterns in the database through traversing the sequence tree without mining the database once again. Experiments show that IMSP outperforms PrefixSpan and IncSpan in time cost on condition that the size of the incremental sequences is smaller.
Turn model provides a simple approach for the development of deadlock-free routing algorithms by prohibiting some turns to eliminate cycles of the resource dependency graph. However, prohibited turns remarkably limit ...
详细信息
Turn model provides a simple approach for the development of deadlock-free routing algorithms by prohibiting some turns to eliminate cycles of the resource dependency graph. However, prohibited turns remarkably limit the fault-tolerant capability of routing algorithms. This paper presents a dynamic pseudo-receiving mechanism (DPR) to enable the prohibited turns and avoid deadlock. It consists of pseudo-receiving (PR) mechanism and dynamic turn management (DTM). The former is similar as the software-based rerouting, but without the support of operating system. Under PR, an additional buffer (noted as PR buffer) is needed for each enabled turn prohibited originally. The packets using enabled turns will be sent to the PR buffer and then sent to the desired output port. The later is a dynamic implementation of turn model. Under DTM, if the number of flits in a PR buffer is more than the constant E, the turn will be disabled at once. This paper gives a theorem to show that the combination of PR mechanism and DTM makes networks to be deadlock-free in the cost of a few PR buffers. Simulation results show that DPR mechanism is feasible and cost-efficient.
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ...
详细信息
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture(STPA). The authorizations in OS are divided into three parts: System Management Subsystem(SMS), Security Management Subsystem(SEMS) and Audit Subsystem(AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.
The lack of highways,the preponderance of the roads with two lanes,the transition of the cities by national roads used by long distance traffic,the increasingly higher growth of traffic,both for transport of goods and...
详细信息
The lack of highways,the preponderance of the roads with two lanes,the transition of the cities by national roads used by long distance traffic,the increasingly higher growth of traffic,both for transport of goods and people at the national level,but also in transit,are the major features of the road transport in *** the characteristics of the road network previously listed,the aim of this paper is to highlight the need of building bypasses for the Romanian cities crossed by national roads in terms of sustainable *** case study is conducted for a medium sized city in Romania,Bistrita,transited the European Road E58 which connects Hungary and Republic of *** method used to determine the size and the structure of the traffic flows throughout the road network of the city in the situations with and without bypass consist in achieving a transport model using VISUM *** the methodology of calculation approved by the European Environment Agency in the CORINAIR project and the characteristics of vehicle fleet at national and Bistrita-Nasaud county levels,by simulation were determined the variation curves of the main emission factors (CO,NO x,C 6 H 6 and PM 10) in both analysis scenarios (with and without bypass).The results after simulations denote a decrease of 10 % of the volume of emissions associated with emission factors CO,NO x,C 6 H 6 and of 20 % for PM *** results recommend the construction of the bypasses as tactical solutions for sustainable development of the cities in Romania.
With the recognition of structural safety and the development of monitoring technique, Structure health monitoring (SHM) has already become an important research direction in engineering structures. Wireless sensor ne...
详细信息
With the recognition of structural safety and the development of monitoring technique, Structure health monitoring (SHM) has already become an important research direction in engineering structures. Wireless sensor network becomes a research hotspot of SHM with the characteristics such as convenience for remote monitoring, good fault-tolerant ability, easiness of system diagnosis and maintenance, etc. In this paper, a wireless sensor network for bridge structure health monitoring (BSHM-WSN) is designed, implemented, deployed and tested on the ZhengDian viaduct bridge in China. In comparison with prior bridge monitoring systems and sensor network prototypes, this work has two major contributions. First, the BSHM-WSN architecture is designed with careful consideration of application requirements such as energy efficiency, routing, and high-frequency sampling. Second, the BSHM-WSN is deployed in a real bridge solving the problem of structural data acquisition, and simulations results are given based on real data collected from the experiments.
In order to extract the maximal power from the wind under the rated wind speed, a sliding mode controller is designed in this paper for a variable speed wind turbine (VSWT), the proposed control algorithm possesses th...
详细信息
In order to extract the maximal power from the wind under the rated wind speed, a sliding mode controller is designed in this paper for a variable speed wind turbine (VSWT), the proposed control algorithm possesses the properties to overcome the nonlinearity, uncertainty and external disturbance within VSWT, it drives the turbine rotor to rotate toward desired tracking speed to maximally harvest the wind power under the rated wind speed. The results of simulation studies show that the effectiveness and the advantages of the designed controller.
With the development of Mobile-Commerce, mobile-payment turns up. However, compared with the m-commerce in China, mobile-payment is too weak to meet the needs. This paper comes up with the ECP3 Mobile-Payment Solution...
详细信息
With the development of Mobile-Commerce, mobile-payment turns up. However, compared with the m-commerce in China, mobile-payment is too weak to meet the needs. This paper comes up with the ECP3 Mobile-Payment Solution (Elliptic Curve based Proxy Payment Protocol), which is a proxy payment solution based on the Elliptic Curve Cryptography. Taking less memory and bandwidth makes ECP3 quite suit for mobile devices. When a customer requests a payment, the payment-chain starts. All the payment work will transfer to the MNO (Mobile Network Operator) to through the payment-chain. Then MNO checks both customer's and the Application Service Provider's identity. After that, MNO sends the payment info to customer for confirming. ECP3 is of security and efficiency, which can satisfy the M-Commerce's distant payment requirement.
On the basis of explaining the wind turbine's operating characteristics and analyzing the relationship between the wind speed and the power extracted by a wind turbine system with variable speed constant frequency...
详细信息
On the basis of explaining the wind turbine's operating characteristics and analyzing the relationship between the wind speed and the power extracted by a wind turbine system with variable speed constant frequency, an on-off control method is investigated for the maximum power point tracking (MPPT) of a wind energy conversion system. In this paper, a mathematic model of a squirrel-cage induction generator control system is established, a decoupling method is employed to achieve the purpose of MPPT, and simulation studies are made with Matlab/Simulink to verify the effectiveness of the purposed algorithm, and the simulation results show that the efficiency of the control strategy.
technology offers new opportunities for education including educational games and complex methods for *** paper aims at comparing the cognitive and affective results of a training program developed for firstand second...
详细信息
technology offers new opportunities for education including educational games and complex methods for *** paper aims at comparing the cognitive and affective results of a training program developed for firstand second-grade students in face-to-face and game-based environment and at investigating the opportunities of applying educational games and embedded innovative assessment technologies to improve students' reasoning *** training program consists of 120 educational games,developed directly for young *** experimental and control groups in the study consisted of 123 and 137 first and second graders,*** third of the experimental group took part in a game-based training in computer-based environment (n=38),the others were involved in face-to-face *** in the face-to-face case asked relevant questions before and after the tests,whereas no dialogues were present in the game-based *** training took six weeks to *** cognitive effectiveness of the training was measured with an inductive reasoning test,comprising 37 figural,non-verbal items (Cronbach α=.87).Besides the test-based data collection,facial expressions and head movement (captured by webcams) were monitored and the affective effects of the training were *** experimental group significantly outperformed the control group by more than one standard deviation on the post-test (t=-10.65,p<.00).The most frequent facial expressions were surprise (31%),happiness (24%),and anger (16%) during game-based *** (7%),fear (3%),and sadness (1%) were less *** distributions of the facial expressions did not show significant relationships with the developmental level of reasoning *** the whole we found no significant differences between the developmental achievements of the face-to-face and game based groups after the training.
In Tanzania,small hydropower potential is estimated to be 300 ***,only about 16% of this power has been *** of the major obstacles adversely hindering exploitation of the resource include lack of or inadequate hydrolo...
详细信息
In Tanzania,small hydropower potential is estimated to be 300 ***,only about 16% of this power has been *** of the major obstacles adversely hindering exploitation of the resource include lack of or inadequate hydrological data (i.e.,river flows),higher initial cost of purchasing hydropower mechanical equipment,improper and/or inadequate procedures of turbine type selection for local environment,inadequate assessment of power demand;and lack of or inadequate environmental,social and economic assessments of the *** this paper,these setbacks could be collapsed into one problem and rephrased as -how would poor and local people in developing world such as Tanzania afford and sustain the hydropower electric resource/technology? This paper is therefore a synthesis of findings from various energy development studies in ***,four case studies in which the authors were involved are analysed in *** studied problems included uncertainty of flow estimation methods in un gauged small catchments,inadequacy in guidelines on turbine design and manufacturing technology,sustainability issues-financial viability on rural setting small hydropower *** preliminary findings indicate that the ratio of area method as applied in one of the small un gauged catchments has low *** has also been shown that,most of the implemented imported-turbines designs were incompatible with the existing local environment.A procedure on turbine selection,design,computer simulation testing and manufacturing of small turbines which could be adopted by local manufacturers and compatible with the local environment was documented.A two jet pelton turbine was selected,designed and tested using Solid Works 2009 and CFD *** study also shows that there are local skilled personnel who can design and fabricate turbine and/or its parts/components at an affordable price.A cross flow turbine has been designed,fabricated and tested locally in the h
暂无评论