With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an indoor trajectory, a new definition named Indoor Uncertain Semantic Trajectory is defined in this paper. In this paper, we focus on a new primitive, yet quite essential query named Indoor Uncertain Semantic Trajectory Similarity Join (IUST-Join for short), which is to match all similar pairs of indoor uncertain semantic trajectories from two sets. IUST-Join targets a number of essential indoor applications. With these applications in mind, we provide a purposeful definition of an indoor uncertain semantic trajectory similarity metric named IUS. To process IUST-Join more efficiently, both an inverted index on indoor uncertain semantic trajectories named 3IST and the first acceleration strategy are proposed to form a filtering-and-verification framework, where most invalid pairs of indoor uncertain semantic trajectories are pruned at quite low computation cost. And based on this filtering-and-verification framework, we present a highly-efficient algorithm named Indoor Uncertain Semantic Trajectory Similarity Join Processing (USP for short). In addition, lots of novel and effective acceleration strategies are proposed and embedded in the USP algorithm. Thanks to these techniques, both the time complexity and the time overhead of the USP algorithm are further reduced. The results of extensive experiments demonstrate the superior performance of the proposed work.
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion *** address such threats towards cloud services,numerous t...
详细信息
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion *** address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different *** rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other ***,the methods suffer from mitigating intrusion attacks at a higher *** article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these *** method involves analyzing service growth,network growth,and quality of service *** process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user *** proposed MFTEM model improves intrusion detection accuracy with higher performance.
Obtaining all perfect matchings of a graph is a tough problem in graph theory, and its complexity belongs to the #P-Complete class. The problem is closely related to combinatorics, marriage matching problems, dense su...
详细信息
Obtaining all perfect matchings of a graph is a tough problem in graph theory, and its complexity belongs to the #P-Complete class. The problem is closely related to combinatorics, marriage matching problems, dense subgraphs, the Gaussian boson sampling, chemical molecular structures, and dimer *** this paper, we propose a quadratic unconstrained binary optimization formula of the perfect matching problem and translate it into the quantum Ising model. We can obtain all perfect matchings by mapping them to the ground state of the quantum Ising Hamiltonian and solving it with the variational quantum eigensolver. Adjusting the model's parameters can also achieve the maximum or minimum weighted perfect matching. The experimental results on a superconducting quantum computer of the Origin Quantum computingtechnology Company show that our model can encode 2~n dimensional optimization space with only O(n) qubits consumption and achieve a high success probability of the ground state corresponding to all perfect matchings. In addition, the further simulation results show that the model can support a scale of more than 14 qubits, effectively resist the adverse effects of noise, and obtain a high success probability at a shallow variational depth. This method can be extended to other combinatorial optimization problems.
Gridlet allocation in a computational grid environment is a major research issue to obtain not only the efficient gridlet allocation technique but also the time needed to obtain the efficient allocation technique. Gri...
详细信息
Recent studies have shown that the construction of nanophononic metamaterials can reduce thermal conductivity without affecting electrical properties,making them promising in many fields of application,such as energy ...
详细信息
Recent studies have shown that the construction of nanophononic metamaterials can reduce thermal conductivity without affecting electrical properties,making them promising in many fields of application,such as energy conversion and thermal ***,although extensive studies have been carried out on thermal conductivity reduction in nanophononic metamaterials,the local heat flux characteristic is still *** this work,we construct a heat flux regulator which includes a silicon nanofilm with silicon *** regulator has remarkable heat flux regulation ability,and various impacts on the regulation ability are ***,even in the region without nanopillars,the local heat current is still lower than that in pristine silicon nanofilms,reduced by the neighboring nanopillars through the thermal proximity *** combine the analysis of the phonon participation ratio with the intensity of localized phonon modes to provide a clear *** findings not only provide insights into the mechanisms of heat flux regulation by nanophononic metamaterials,but also will open up new research directions to control local heat flux for a broad range of applications,including heat management,thermoelectric energy conversion,thermal cloak,and thermal concentrator.
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g...
详细信息
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the graphs in the real world are constantly *** size of the real-time changes in these graphs is smaller and more *** graph algorithms[2,3]can deal with graph changes more efficiently[4]than the corresponding static graph ***,most studies on dynamic graph algorithms are limited to the single machine ***,a few parallel dynamic graph algorithms(such as the graph connectivity)in the MPC model[5]have been proposed and shown superiority over their parallel static counterparts.
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar...
详细信息
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar flares in order to ensure the safety of human ***,the research focuses on two directions:first,identifying predictors with more physical information and higher prediction accuracy,and second,building flare prediction models that can effectively handle complex observational *** terms of flare observability and predictability,this paper analyses multiple dimensions of solar flare observability and evaluates the potential of observational parameters in *** flare prediction models,the paper focuses on data-driven models and physical models,with an emphasis on the advantages of deep learning techniques in dealing with complex and high-dimensional *** reviewing existing traditional machine learning,deep learning,and fusion methods,the key roles of these techniques in improving prediction accuracy and efficiency are *** prevailing challenges,this study discusses the main challenges currently faced in solar flare prediction,such as the complexity of flare samples,the multimodality of observational data,and the interpretability of *** conclusion summarizes these findings and proposes future research directions and potential technology advancement.
Securing data transmission in a digital era is a difficult one due to the broad application of the Internet, personal computers, and mobile phones for communication. Traditional video steganography techniques sometime...
详细信息
This paper deals with numerical solutions for nonlinear first-order boundary value problems(BVPs) with time-variable delay. For solving this kind of delay BVPs, by combining Runge-Kutta methods with Lagrange interpola...
详细信息
This paper deals with numerical solutions for nonlinear first-order boundary value problems(BVPs) with time-variable delay. For solving this kind of delay BVPs, by combining Runge-Kutta methods with Lagrange interpolation, a class of adapted Runge-Kutta(ARK) methods are developed. Under the suitable conditions, it is proved that ARK methods are convergent of order min{p, μ+ν +1}, where p is the consistency order of ARK methods and μ, ν are two given parameters in Lagrange interpolation. Moreover, a global stability criterion is derived for ARK methods. With some numerical experiments, the computational accuracy and global stability of ARK methods are further testified.
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driv...
详细信息
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driving,navigation,and *** privacy needs are influenced by various factors,such as data collected at different intervals,trip durations,and user *** address this,the paper proposes a Support Vector Machine(SVM)model designed to process large amounts of aggregated data and recommend privacy preserving *** model analyzes data based on user demands and interactions with service providers or neighboring *** aims to minimize privacy risks while ensuring service continuity and *** SVMmodel helps validate the system’s reliability by creating a hyperplane that distinguishes between maximum and minimum privacy *** results demonstrate the effectiveness of the proposed SVM model in enhancing both privacy and service performance.
暂无评论