Dataspace is a semi-structural data model for the management of large-scale heterogeneous data *** a dataspace,each data object consists of a set of attribute-value pairs to describe the internal properties of the obj...
详细信息
Dataspace is a semi-structural data model for the management of large-scale heterogeneous data *** a dataspace,each data object consists of a set of attribute-value pairs to describe the internal properties of the object and their relationships to other objects. The dataspace model provides a flexible query language that supports attribute-value pair-based predicate queries and semantic link queries. In this paper we introduce a Resource Space Model that extends the concepts of dataspace to make it more flexible by incorporating classification semantics. We model a dataspace as a set of Resource Spaces (RS) with each RS representing a kind of resources that share common attributes and can be put into the same category, either according to a user’s knowledge of the world or his query preferences. Our model is suitable for designing a user-tailored semantic view of a dataspace while at the same time without losing the schema-later data-centric nature. A practical query language is introduced to implement flexible query operations on the resource spaces of the dataspace. Examples show how the proposed model and language support both the schema query and the data query.
Conventional pulse compression use a periodical echo of single receive antenna, which is modulated by a certain carrier-frequency, in other words, single spectrum is exploited. But for MIMO radar, as the multi-carrier...
详细信息
Conventional pulse compression use a periodical echo of single receive antenna, which is modulated by a certain carrier-frequency, in other words, single spectrum is exploited. But for MIMO radar, as the multi-carrier-frequency signals are transmitted simultaneously, if the spectrum of the target echo after channel separation can be combined to form the whole band spectrum echo, the corresponding range resolution can improve several times as compared with the conventional method, and it will be more convenient for follow-up detection and tracking. Considering the difference between the frequency modulation band and the interval between the adjacent frequencies, the spectrum joint after channel separation will be overlapped or spaced. The methods of spectrum moving of each echo and the spectrum extrapolation with Root-MUSIC algorithm are proposed, by which high-resolution range profile of the target is obtained. Simulation results verify the validity of these methods.
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate...
详细信息
ISBN:
(纸本)9781424472352
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate all system parameters and all private/public keys. Any ' members in Ad hoc group can collaboratively generate the group signature with the help of a designated clerk, where the signer respectively generates the partial signature by using his private key and the clerk can check the correctness of the partial signature. Furthermore, anyone can verify the validity of the group signature by the group public key and trace back to find the identities of signers from the warrant created by the clerk. What's more, it can dynamically increase the parameter values of ~t and ~n, according to the actual security needs of mobile Ad hoc networks, but the private and public keys of the whole Ad hoc group still are not changed for relatively long-term stability.
Syntax-based translation models should in principle be efficient with polynomially-sized search space, but in practice they are often embarassingly slow, partly due to the cost of language model integration. In this p...
详细信息
With the permeation of information technology intothe physical world and human society, we are on the way to a Cyber Physical Society (CPSocio). A CPSocio inter-connects the nature, the cyber space, and the society, s...
详细信息
With the permeation of information technology intothe physical world and human society, we are on the way to a Cyber Physical Society (CPSocio). A CPSocio inter-connects the nature, the cyber space, and the society, so as to provide human beings with a better living and working environment. Researches on CPSocio will lead to a new revolution of information science and technology. In realizing CPSocio, semantics is the most fundamental problem. It is the foundation of all the intelligent activities such as communication, interaction, and cooperation in CPSocio. We are facing various scientific challenges to understand and clarify principles and models of the computing in CPSocio. In this paper we focus on the interactive computing model of Cyber Physical Society, discussing a possible architecture and computing model that enable future intelligent distributed services in CPSocio. The proposed model focuses on the interactive computation emerged from self-interpretation, self-organization and interactions of individual objects. Selfinterpretation enables objects to actively express their own semantic information to others. Interaction among objects will help achieving computing solutions in open, dynamic, limited and heterogeneous environments with partial available information and services. The model aims at providing a feasible framework for systematically tackling key problems and building intelligent services in CPSocio.
Particle swarm optimization (PSO) is a recently proposed population-based random search algorithm, which performs well in some optimization problems. In this paper, we proposed an improved PSO algorithm to solve portf...
详细信息
ISBN:
(纸本)9781424476534
Particle swarm optimization (PSO) is a recently proposed population-based random search algorithm, which performs well in some optimization problems. In this paper, we proposed an improved PSO algorithm to solve portfolio selection problems. The proposed approach IPSO employs an opposite mutation operator to enhance the performance of the standard PSO. In order to verify the performance of IPSO, we test it on five well-known benchmark function optimization problems. At last, we use IPSO to solve a classical portfolio selection problem. The results show that the proposed approach is effective and achieves better results than standard PSO.
Resource Space Model (RSM) is a semantic data model for specifying, organizing, and retrieving resources based on classification of *** efficient index mechanism is critical for its implementation. However, traditiona...
详细信息
Resource Space Model (RSM) is a semantic data model for specifying, organizing, and retrieving resources based on classification of *** efficient index mechanism is critical for its implementation. However, traditional index mechanisms are not well suitable to resource spaces because the spaces are discrete and hierarchical. This paper proposes a new multidimensional index structure C*-tree. It employs boxes to represent resources so that the containment of boxes can reflect the hierarchical structure of resources. The metric function defined in the C*-tree is able to gather close resources in the index structure. To avoid overlap between bounding boxes, a new restricted bounding box is further introduced. Moreover, the insertion algorithms based on the data partition approach can fully utilize characteristics of RSM. The C*-tree is scalable and efficient on both the number of dimension and the amount of data for different distributions.
Support Vector Machine (SVM) is a classification technique of machine learning based on statistical learning theory. A quadratic optimization problem needs to be solved in the algorithm, and with the increase of the s...
详细信息
作者:
Hai ZhugeKnowledge Grid Research Group
Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China
Natural physical space provides material basis for the birth and evolution of human beings and *** progress of human society has created the cyber space. With the rapid development of information technology, the cyber...
详细信息
Natural physical space provides material basis for the birth and evolution of human beings and *** progress of human society has created the cyber space. With the rapid development of information technology, the cyber space is connecting physical space, social space and mental space to form a new world - Cyber Physical Society. The way to explore the cyber physical society is different from the way to explore the natural physical space and society. This paper describes the ideal of the Cyber Physical Society, and presents its distinguished characteristics and scientific issues. Research on the Cyber Physical Society could lead to the revolution of society, science and technology.
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi...
详细信息
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordingly by reusing available services. While the business requirements are commonly elicited through use cases and scenarios, it is not straightforward to transform the use case model into a service model, and the existing manual approach is cumbersome and error-prone. In this paper, the environment ontology, which is used to model the problem space, is utilized to facilitate the model transformation process. The environment ontology provides a common understanding between business analysts and software engineers. The required software functionalities as well as the available services’ capabilities are described using this ontology. By semi-automatically matching the required capability of each use case to the available capabilities provides by services, a use case is realized by that set of services. At the end of this paper, a fictitious case study was used to illustrate how this approach works.
暂无评论