The procedure of matching vehicle location data onto road map is very essential for many ITS (Intelligent Transportation System) applications. However, with the boosting deployment of GPS devices in vehicles, the accu...
详细信息
The procedure of matching vehicle location data onto road map is very essential for many ITS (Intelligent Transportation System) applications. However, with the boosting deployment of GPS devices in vehicles, the accumulation of huge amount of GPS data caused great challenge on the efficiency and scalability of traditional serial map matching algorithm. In this paper we address the challenge by presenting a novel parallel map matching algorithm to realize high-performance processing of GPS data. The main idea is to adapt the serial map matching algorithm for cloud computing environment by reforming its' data-intensive or I/O-intensive computing stages using MapReduce paradigm. We implemented the algorithm in Hadoop platform and tested its performance by a large GPS dataset exceeds 120 billion GPS records. Experimental results show that our approach is highly efficient and scalable for massive historical GPS data processing.
Critical Infrastructure (CI) is the term used to describe assets that are of utmost importance, or in other words, essential in the functioning of an environment. Societies depend on their critical infrastructure in o...
详细信息
This paper will present a method for disseminating mobile agents throughout a network in order to protect that network. This method is based on the immune concept of inflammation, which provides greater blood flow to ...
详细信息
In order to handle the information overload on the tourism websites and understand user's travel preference, we propose to build a users' preference matrix to reflect the users' preference degree on a set ...
详细信息
In order to handle the information overload on the tourism websites and understand user's travel preference, we propose to build a users' preference matrix to reflect the users' preference degree on a set of scenic spots, and then propose a method of combining user clustering with Markov chain to predict the next scenic spot a user will browse on a tourism website. The experimental results indicate that the preference matrix can catch the travel preference of users and the proposed method can be used for predicting the next browsing behaviors of users.
To improve the reading and writing speed of NAND flash array with multi-channel and multi-way, and to obtain the highest available bandwidth, an approach is presented in this paper. One mechanism of high efficiency bu...
详细信息
To improve the reading and writing speed of NAND flash array with multi-channel and multi-way, and to obtain the highest available bandwidth, an approach is presented in this paper. One mechanism of high efficiency bus accessing timing scheme based on interleaving is introduced into the approach. In pursuance of this timing, flash controllers are able to make every plane in the flash array to be active in parallel. Therefore the transmission ability to and from the bus can be greatly improved. Utilizing this approach, the accessing efficiency to the NAND flash array will be pushed to a very high level. According to the testing results, as opposed to normal flash bus timing scheme, the data reading efficiency can be increased by 68.5%, and the data writing efficiency can be increased by 457%, with the flash bus timing scheme presented in this paper being used. The conclusion can be drawn that the flash bus timing scheme presented in this paper is effective, and the reading and writing at very high speed to the NAND flash array can be realized.
The Extended Finite State Machine (EFSM) is a commonly used model for specifying software systems. A test sequence for an EFSM is a sequence composed of values of input variables, which can make the EFSM "execute...
详细信息
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem...
详细信息
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implementation adopted in the target; therefore,they are not fully suitable for practical *** this paper,we propose a novel SCA-polar differential power attack (polar DPA).We found that DPA peaks have different biases for different cryptographic algorithms and *** on these biases,we can successfully attack a block cipher,assuming that the cipher algorithm uses a secret key in its first round,without the knowledge of the cipher algorithm or *** rounds can be treated as a black *** present a detailed theoretical analysis and experiment to demonstrate the correctness and efficiency of our ***,our scheme has demonstrated an improvement over the leakage evaluation scheme due to Ichikawa et al.(CHES 2005).Our evaluation method can be used in electronic design automatic (EDA) flows and can help security circuit designers to understand the data leakage due to SCAs.
We present a new particle-based method for granular flow *** the method,a new elastic stress term,which is derived from a modified form of the Hooke's law,is included in the momentum governing equation to handle t...
详细信息
We present a new particle-based method for granular flow *** the method,a new elastic stress term,which is derived from a modified form of the Hooke's law,is included in the momentum governing equation to handle the friction of granular *** force is also added to simulate the dynamic friction for the purpose of smoothing the velocity field and further maintaining the simulation *** from the Lagrangian nature of the SPH method,large flow deformation can be well handled easily and *** addition,a signed distance field is also employed to enforce the solid boundary *** experimental results show that the proposed method is effective and efficient for handling the flow of granular materials,and different kinds of granular behaviors can be well simulated by adjusting just one parameter.
We give a local algorithm to extract dense bipartite-like subgraphs which characterize cyber-communities in the Web [13]. We use the bipartiteness ratio of a set as the quality measure that was introduced by Trevisan ...
详细信息
Deductive rules are useful for proving properties with fairness constraints and there have been many studies on such rules with justice and compassion constraints. This paper focuses on system specifications with stre...
详细信息
暂无评论