Besides the programming of the control application code of a distributed automation system (DAS) and the functional allocation of the control application code to the specific devices that the DAS consists of, an impor...
详细信息
Finding all the occurrences of a twig pattern specified by a selection predicate on multiple elements in an XML document is a core operation for efficient evaluation of XML queries. Holistic twig join algorithms were ...
ISBN:
(纸本)9780127224428
Finding all the occurrences of a twig pattern specified by a selection predicate on multiple elements in an XML document is a core operation for efficient evaluation of XML queries. Holistic twig join algorithms were proposed recently as an optimal solution when the twig pattern only involves ancestor-descendant relationships. In this paper, we address the problem of efficient processing of holistic twig joins on all/partly indexed XML documents. In particular, we propose an algorithm that utilizes available indices on element sets. While it can be shown analytically that the proposed algorithm is as efficient as the existing state-of-the-art algorithms in terms of worst case I/O and CPU cost, experimental results on various datasets indicate that the proposed index-based algorithm performs significantly better than the existing ones, especially when binary structural joins in the twig pattern have varying join selectivities.
Computational electromagnetics deals with the problem of finding efficient and reliable solutions of Maxwell's equations. This is important in a variety of practical applications, such as antenna design and automa...
详细信息
Computational electromagnetics deals with the problem of finding efficient and reliable solutions of Maxwell's equations. This is important in a variety of practical applications, such as antenna design and automatic target recognition, and time-domain computations are attractive for a large class of these problems. However, one is more often interested in the frequency characteristics of the solution. Using the Fourier transform to determine the resonance frequencies and damping factors requires long time series. implying severe computational complexity. An attractive alternative is to apply high-resolution frequency estimation, developed in the signal processing society over the past few decades. This is a challenging problem. though. as the number of interesting frequency components can be as large as several hundreds. To overcome the difficulties. we propose a frequency-domain subspace method that yields accurate frequency and damping estimates in a selected frequency band. The required electromagnetic simulation time can thereby be reduced by several orders of magnitude.
E-government would be a lot easier if it could be handled like e-business. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security level needed for public administrat...
详细信息
E-government would be a lot easier if it could be handled like e-business. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security level needed for public administrations is usually at the level of top private sector industries and service organizations like banks. In project management there has been a paradigm shift towards new methodologies for the development of software. This article studies some possibilities along the same lines with regard to security. We will use extreme programming (XP) as an example of the new software development paradigms.
A wearable intelligent platform for the monitoring of the health condition and rehabilitation of athletes is presented. The system provides doctors and trainers with real-time monitoring, alerting and medical decision...
详细信息
A wearable intelligent platform for the monitoring of the health condition and rehabilitation of athletes is presented. The system provides doctors and trainers with real-time monitoring, alerting and medical decision support. It aims to help them optimize treatment and training procedures during rehabilitation, to prevent injury relapses and to ensure a prompt return to peak athletic condition. The system's design requirements are laid out along with its functional description. It is composed of three main subsystems: the athlete subsystem, the rehabilitation station and the portal. The athlete subsystem includes all the monitoring sensors worn by the athlete during training, along with a signal collector and a processing-transceiver unit for preliminary evaluation and for exchanging information with the rehabilitation station. The rehabilitation station is the main control, access and communication point of the system carrying most of the processing. The measurements derived from the received signals are fed into an intelligent module, which provides with the monitoring, alerting and decision support mechanisms. A virtual reality interface is used by the athlete to communicate with the system. The portal is a long-term data storage facility collecting selected data for research purposes.
In industrial interdisciplinary projects where engineers of different sorts have to work together, a framework is necessary in order to support such an interdisciplinary development process. For example, the design in...
We've been investigating how to use Gaussian mixture continuous-density hidden Markov, models (CDHMMs) for handwritten Chinese character modeling and recognition. We've identified and developed a set of techni...
详细信息
ISBN:
(纸本)0769516920
We've been investigating how to use Gaussian mixture continuous-density hidden Markov, models (CDHMMs) for handwritten Chinese character modeling and recognition. We've identified and developed a set of techniques that can be used to construct a practical CDHMM-based offline recognition system for a large vocabulary of handwritten Chinese characters. We have reported elsewhere the key techniques that contribute to the high recognition accuracy. In this paper we describe how to make our recognizer compact without sacrificing too much of the recognition accuracy. We also report the results of a series of experiments that were performed to help us make a good decision when we face several design choices.
A two- step iterative algorithm we have proposed gives good approximation in the sense of an integral square-error of time response between an original system and a reduced-order model. A reduced-order model using the...
详细信息
A two- step iterative algorithm we have proposed gives good approximation in the sense of an integral square-error of time response between an original system and a reduced-order model. A reduced-order model using the two - step iterative algorithm is affected by an initial condition. In this paper, the reduced-order model using a denominator array expansion method is used the initial step reduced - order model in the two-step iterative algorithm. It is found that the resulting reduced-order model gives good approximation compare with other methods in the sense of integral square - error.
The paper proposed a new syntactic annotation scheme - functional chunk, which tried to represent information about grammatical relations between sentence-level predicates and their arguments. Under this scheme, we bu...
详细信息
The paper proposed a new syntactic annotation scheme - functional chunk, which tried to represent information about grammatical relations between sentence-level predicates and their arguments. Under this scheme, we built a Chinese chunk bank with about two million Chinese characters, and developed some learned models for automatically annotating fresh text with functional chunks. We also proposed a two-stages approach to build Chinese tree bank on the top of chunk bank, and gave some experimental results of chunk-based syntactic parser to show the advantage of functional chunk for parsing performance increase. All these work lays good foundations for further research project to build a large scale Chinese tree bank.
暂无评论