The problem of discovery association rules in large databases is considered. An encoding method for converting large databases to small one is proposed. Significant efficiency is obtained by applying some modified kno...
详细信息
ISBN:
(纸本)9781424418220
The problem of discovery association rules in large databases is considered. An encoding method for converting large databases to small one is proposed. Significant efficiency is obtained by applying some modified known algorithm on our proposed database layout. In addition, a new algorithm based on the proposed encoding method is introduced. Using some properties of numbers our database converts itemset to numerical domain. Our implementation indicates that the proposed layout made the size of database significantly smaller. Also the time to find association rules is reduced.
OWL-S is an important standard for semantic web and its process model not formalized complete. There are some researches working on formalizing semantics of OWL-S process model and this paper is one of them. Rewrite l...
详细信息
ISBN:
(纸本)9780769534909
OWL-S is an important standard for semantic web and its process model not formalized complete. There are some researches working on formalizing semantics of OWL-S process model and this paper is one of them. Rewrite logic system Maude is choose to formalize the informal part semantics of OWL-S in our work. Use Maude as a specification language, semantics of a subset of OWL-S process model elements more than control construct is described for defining dynamic semantics of OWL-S control construct. The rewrite logic defined formal semantics of OWL-S control construct can be used for multiple using such as testing, model checking, verifying etc.
In this paper, a set of Radial Basis Function (RBF) neural networks, capable to learn the kinematic and dynamic behavior of the Romeo 4R autonomous vehicle, is presented. In order to obtain a set of good RBF nets in t...
详细信息
Previous noninvasive measurements of the pulse waveform of the radial artery have not employed standard positioning procedures. Here we propose a new three-axis mechanism for simultaneously measuring the arterial diam...
详细信息
Previous noninvasive measurements of the pulse waveform of the radial artery have not employed standard positioning procedures. Here we propose a new three-axis mechanism for simultaneously measuring the arterial diameter changed waveform (ADCW) and the pressure pulse waveform (PPW), and a standard positioning procedure for detecting the optimal site in which the PPW may be accurately recorded. A modified fuzzy c-mean algorithm was used to diagnosis myocardial ischemia symptoms in 34 elderly subjects with the PPW of radial artery. The exercise electrocardiogram was used as a reference to compare between individuals with and without myocardial ischemia. The first three harmonics of the Fourier series of PPW in the patients with myocardial ischemia are significantly different from those in the normal subjects. The harmonics of the Fourier series of PPW are then fed into a modified fuzzy c-means algorithm, resulting in a sensitivity of 68% and specificity of 100% in identifying the patients with myocardial ischemia from the normal subjects.
The Scheduling of Meetings of multiple users is a real world problem that was studied intensively in recent years. The present paper proposes a realistic model for representing and solving meetings scheduling problems...
详细信息
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for ...
详细信息
ISBN:
(纸本)1601320914
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.
This article reports the first high time resolution measurements of gigantic jets from the Imager of Sprites and Upper Atmospheric Lightning (ISUAL) experiment. The velocity of the upward propagating fully developed j...
详细信息
This article reports the first high time resolution measurements of gigantic jets from the Imager of Sprites and Upper Atmospheric Lightning (ISUAL) experiment. The velocity of the upward propagating fully developed jet stage of the gigantic jets was ∼107 m s-1, which is similar to that observed for downward sprite streamers. Analysis of spectral ratios for the fully developed jet emissions gives a reduced E field of 400-655 Td and average electron energy of 8.5-12.3 eV. These values are higher than those in the sprites but are similar to those predicted by streamer models, which implies the existence of streamer tips in fully developed jets. The gigantic jets studied here all contained two distinct photometric peaks. The first peak is from the fully developed jet, which steadily propagates from the cloud top (∼20 km) to the lower ionosphere at ∼90 km. We suggest that the second photometric peak, which occurs ∼lms after the first peak, is from a current wave or potential wave-enhanced emissions that originate at an altitude of ∼50 km and extend toward the cloud top. We propose that the fully developed jet serves as an extension of the local ionosphere and produces a lowered ionosphere boundary. As the attachment processes remove the charges, the boundary of the local ionosphere moves up. The current in the channel persists and its contact point with the ionosphere moves upward, which produces the upward surging trailing jets. Imager and photometer data indicate that the lightning activity associated with the gigantic jets likely is in-cloud, and thus the initiation of the gigantic jets is not directly associated with cloud-to-ground discharges. Copyright 2009 by the American Geophysical Union.
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security of th...
详细信息
ISBN:
(纸本)9780889867598
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security of the data. The technique provides three levels of security without reducing the payload and the image quality. In order to attain even better quality, an enhancement technique is proposed. The experiments done on various images and the results obtained showed the robustness of the technique.
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In...
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In this work, a repair method using content addressable memory combined with spare bits, as well as a novel fault injection method is proposed. With the proposed fault injection technique, various numbers and types of faults can be flexibly injected into the silicon. A wireless sensor network system using our self-repairable microprocessor (SRP) is developed to prove the effectiveness of the proposed technique.
A unicast video-on-demand (VOD) system is good at interactivity but bad at scalability. Many multicast schemes have been proposed to solve the scalability problem in recent years. However, the weakness of these scheme...
详细信息
暂无评论