Consistent query answering (CQA) in relational databases under cardinality-based semantics is a well-known approach to dealing with inconsistency between databases and certain integrity constraints (ICs). It computes ...
详细信息
Consistent query answering (CQA) in relational databases under cardinality-based semantics is a well-known approach to dealing with inconsistency between databases and certain integrity constraints (ICs). It computes from a given database all consistent answers to a query that are satisfied by all the C-repairs, where a C-repair is a database that satisfies all the given ICs and minimizes the cardinality of the set of tuples in the symmetric difference with the given database. In this paper we address the problem of CQA in databases with universal constraints under cardinality-based semantics. This problem has no worst-case optimal solutions by now. We present a novel method for such problem which is worst-case optimal in terms of time data complexity and is further optimized by a decomposition-based framework. Experimental results on synthetic databases demonstrate the advantages of the proposed method.
In the process of Web service composition, there are several cases about working up an atomic Web service; as well as the outputs of Web service have many possibilities because of the different requirements from users...
详细信息
In the process of Web service composition, there are several cases about working up an atomic Web service; as well as the outputs of Web service have many possibilities because of the different requirements from users. In order to address these uncertainties, Logical Petri Net(LPN) is introduced into the system of Web service composition, these problems can be well solved using the LPN's feature-passing value indeterminacy. And a model of Web service composition is proposed with the technology of ontology and Agent. Based on this model, an approach of Web service composition is presented in this paper.
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are oft...
详细信息
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are often dynamic and uncertain. This characteristic comes from the nature of battlefields where the factors of enemies and terrains are not easy to be determined. Hence, it is necessary to generate plans that can adapt quickly to the changes during the missions, while avoiding paying a high cost. In addressing such an adaptation process, the issue of multi-objectivity can not be avoided. Our approach first mathematically models the dynamic planning problem with two criteria: the mission execution time and the cost of operations. Based on this quantification, we introduce an evolutionary multi-objective mechanism to adapt the current solution to new situations resulted from changes. We carried out a case study on this newly proposed approach. A modified military scenario of a mission was used for testing. The obtained results strongly support our proposal in finding adaptive solution dealing with the changes.
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a...
详细信息
With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime preven...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime prevention, defects exist in poorly designed systems targeting personnel protection, physical protection, and electronic protection. Therefore, it is a major strategic task to improve risk assessment techniques and promote the objective evaluation of the risk in such area. In this paper, we present the concept of risk entropy based on the Shannon information theory, derive the risk entropy model of security node, and further analyze the expression and calculation of security node risk entropy. On the other hand, we generate the abstract security network simulation model to study the path dependence of the calculation method on security network risk entropy with a broad crime prevention system formed by connecting security node with traffic network. Finally, we complete the risk assessment of crime prevention system according to the security network. The results show that the risk entropy model is in line with the objective reality. We believe this model can not only break through bottlenecks in the technology of objective risk assessment but also bear important scientific significance in the applications of scientific prediction and effective prevention for public safety emergency response system.
Recently, cluster synchronization has attracted an increasing interest in various disciplines, including mathematics, physics, and engineeringsciences. This paper further investigates the cluster synchronization of a...
详细信息
ISBN:
(纸本)9781424464500;9781424464531
Recently, cluster synchronization has attracted an increasing interest in various disciplines, including mathematics, physics, and engineeringsciences. This paper further investigates the cluster synchronization of a complex dynamical network by using adaptive and impulsive control techniques, respectively. Based on a complex dynamical network with two different clusters, several adaptive and impulsive cluster synchronization criteria are then proposed. It should be especially pointed out that the dynamics and its dimensions of the individual dynamical systems are different in the two different clusters. Also, some numerical simulations are given to verify the effectiveness of the above theoretical results.
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ...
详细信息
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper proposed a new secret sharing scheme. In the scheme, the participants themselves select the private keys, which can avoid the distributor's fraud and reduce the distribution's burden as well as ensure the scheme's reuse. The credible participants can join in or leave the participants collection at any time without restarting the scheme procedures.
Aecording to the application requirements of granary environment, short-range wireless transmission method Is employed to design n temperature and humidity monitoring system of granary, which is based on Atmega128 ...
详细信息
ISBN:
(纸本)9781424450015
Aecording to the application requirements of granary environment, short-range wireless transmission method Is employed to design n temperature and humidity monitoring system of granary, which is based on Atmega128 microprocessor ud JN5139 wireless data transmission chip. JN5139 facilitates the design of the node of wireless sensor network, whose ultra-low power and high Integration help to reduce energy censumption. The node can not only monitor environmental parameters effectively, but also configure various sensors conveniently, thus having a strong versatility and easy networking ability. The experimental results show that the node of wireless monitor network, based on the ZigBee protocol, can be driven by 3v battery to carry out a single hop or multi-hop communications successfully, which proves the feasibility and validity of the system design.
In this paper, we present a hybrid representation of image-based models combining the textured planes and the hierarchical points. Taking a set of depth images as input, our method starts from classifying input pixels...
详细信息
In this paper, we present a hybrid representation of image-based models combining the textured planes and the hierarchical points. Taking a set of depth images as input, our method starts from classifying input pixels into two categories, indicating the planar and non-planar surfaces respectively. For the planar surfaces, the geometric coefficients are reconstructed to form the uniformly sampled textures. For nearly planar surfaces, some textured planes, called lumiproxies, are constructed to represent the equivalent visual appearance. The Hough transform is used to find the positions of these textured planes, and optic flow measures are used to determine their textures. For remaining pixels corresponding to the non-planar geometries, the point primitive is applied, reorganized as the OBB-tree structure. Then, texture mapping and point splatting are employed together to render the novel views, with the hardware acceleration.
暂无评论