Earthquake brings enormous loss of lives and properties to human beings due to its suddenness, destructiveness and inscrutability. The new techniques for analyzing seismic data can reveal the distribution of earthquak...
详细信息
Earthquake brings enormous loss of lives and properties to human beings due to its suddenness, destructiveness and inscrutability. The new techniques for analyzing seismic data can reveal the distribution of earthquakes, which helps us master the laws of earthquake disasters and reduce the risks brought by them. In this paper, we applied K-means and DBSCAN clustering algorithms to the analysis of seismic data. Their performances in fitting seismic belts with seismic datasets are compared. First, we map the positional parameters in the seismic data to coordinate points on a two-dimensional plane and then cluster them with the DBSCAN algorithm. In addition, we combine the magnitude and depth properties of seismic data, use the Elbow method to find the best K value, and then classifies the dataset by K-means algorithm. We visualize the results, and the distinction of each classification is clear. The experimental results show that the DBSCAN algorithm has a better effect on fitting the seismic belt, and the classification results of K-means algorithm for earthquakes are also in line with expectations.
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe...
详细信息
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr...
详细信息
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in principle with the increment of the coverage and quality of upcoming survey ***,it is a severe challenge to mine rare and unexpected targets from enormous data with human inspection due to a significant *** learning is also unsuitable for this purpose because designing proper training sets for unanticipated signals is *** by these challenges,we adopt unsupervised machine learning approaches to identify outliers in the data of galaxy images to explore the paths for detecting astronomical *** comparison,we construct three methods,which are built upon the k-nearest neighbors(KNN),Convolutional Auto-Encoder(CAE)+KNN,and CAE+KNN+Attention Mechanism(att CAE_KNN)*** sets are created based on the Galaxy Zoo image data published online to evaluate the performance of the above *** show that att CAE_KNN achieves the best recall(78%),which is 53%higher than the classical KNN method and 22%higher than CAE+*** efficiency of att CAE_KNN(10 minutes)is also superior to KNN(4 h)and equal to CAE+KNN(10 minutes)for accomplishing the same ***,we believe that it is feasible to detect astronomical outliers in the data of galaxy images in an unsupervised ***,we will apply att CAE_KNN to available survey data sets to assess its applicability and reliability.
With searchable encryptions in the cloud computing, users can outsource their sensitive data in ciphertext to the cloud that provides efficient and privacy-preserving multi-keyword top-k searches. However, most existi...
详细信息
作者:
Liu, XipingDou, WanchunWang, XinNanjing Univ Posts & Telecommun
Jiangsu Key Lab Big Data Security& Intelligent Pr Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ
State Key Lab Novel Software Technol Dept Comp Sci & Technol Nanjing 210023 Jiangsu Peoples R China SUNY Stony Brook
Wireless Networking & Syst Lab Dept Elect & Comp Engn Stony Brook NY 11794 USA
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limi...
详细信息
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limit. To construct a win-win situation between users and providers through service sharing, it is necessary to reasonably organize users with similar service requests into groups under the limits of group sizes. This paper explores methods to enable user grouping for sharing services with the limit on the group size. Based on user request descriptions and evaluation, a connection relation is built to present which two users could be in a group. Semi-groups can be derived from the connection relation and two grouping schemes satisfying the group size limit are further determined through proposed algorithms to meet different service expectations. Finally, a case study and a simulation are given to demonstrate the effectiveness of the proposed methods in grouping users to provide higher service benefits to both users and providers.
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu...
详细信息
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizatio...
详细信息
ISBN:
(数字)9781728166773
ISBN:
(纸本)9781728166780
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualization scheduling. Containers are the smallest unit of virtual resource scheduling and migration. Although many effective models for estimating power consumption of virtual machines (VM) have been proposed, few power estimation models of containers have been put forth. In this paper, we offer a fast-training piecewise regression model based on decision tree to build a VM power estimation model and estimate the containers' power by treating the container as a group of processes on the VM. In our model, we characterize the nonlinear relationship between power and features and realize the effective estimation of the containers on the VM. We evaluate the proposed model on 13 workloads in PARSEC and compare it with several models. The experimental results prove the effectiveness of our proposed model on most workloads. Moreover, the estimated power of the containers is in line with expectations.
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their...
详细信息
In this paper, we are concerned with trust modeling for agents in networked computing systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many attempts have been made to model...
详细信息
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati...
详细信息
暂无评论