Combining sea level anomalies with the mean dynamic topography derived from the geoid of the EGM08 global gravity field model and the CLS01 mean sea surface height, this study examined the characteristics of global ge...
详细信息
Combining sea level anomalies with the mean dynamic topography derived from the geoid of the EGM08 global gravity field model and the CLS01 mean sea surface height, this study examined the characteristics of global geostrophic surface currents and the seasonal and interannual variabilities of the mean velocity of the Kuroshio (the Kuroshio source and Kuroshio extension). The patterns of global geostrophic surface currents we derived and the actual ocean circulation are basically the same. The mean velocity of the Kuroshio source is high in winter and low in fall, and its seasonal variability accounts for 18% of its total change. The mean velocity of the Kuroshio extension is high in summer and low in winter, and its seasonal variability accounts for 25% of its total change. The interannual variabilities of the mean velocity of the Kuroshio source and Kuroshio extension are significant. The mean velocity of the Kuroshio source and ENSO index are inversely correlated. However, the relationship between the mean velocity of the Kuroshio extension and the ENSO index is not clear. Overall, the velocity of the Kuroshio increases when La Nina occurs and decreases when E1 Nino occurs.
In recent years there has been a growing interest in Bayesian Network learning from uncertain data. While many researchers focus on Bayesian Network learning from data with tuple uncertainty, Bayesian Network structur...
详细信息
N-gram approach takes the position information into account additionally and thus can offer higher accuracy in query answering than keyword based approaches and is widely used in IR and NLP. However, in large-scale RD...
详细信息
N-gram approach takes the position information into account additionally and thus can offer higher accuracy in query answering than keyword based approaches and is widely used in IR and NLP. However, in large-scale RDF graphs, URIs instead of documents are the ranking and querying units; URIs are usually much shorter than documents, and different URIs are interlinked into a massive network. One shot n-gram querying is usually not good for the RDF data in many cases. In this paper, we present a hybrid framework which combines the n-gram retrieval with link analysis based weight propagation. The idea is to exploit the link structures in the RDF data graphs and propagate the one shot n-gram score weights along with these links. Large scale experiments using MapReduce on Billion Triples Challenge dataset show the hybrid framework achieves an 80.3% improvement in relevance scores over mere n-gram retrieval.
Chinese radicals play important roles in forming Chinese character's semantic meaning. The semantic properties of radicals make them a promising source of information to be analyzed in text mining and content extr...
详细信息
Chinese radicals play important roles in forming Chinese character's semantic meaning. The semantic properties of radicals make them a promising source of information to be analyzed in text mining and content extraction. However, until recently there is little research work concentrating on using the radical set in text mining related tasks. We investigate the roles of radicals in Chinese text classification tasks. In the task, texts are transformed into vectors of radicals, characters and words. Radicals are further pruned by their semantic strengths and network traits. We carry out experiments with real data from Open Directory Project. The experiments results justify Chinese radicals as important features for semantic processing in Chinese text mining tasks.
Time interrupts play an important role in the system. When time interrupts occur, system will inspect process running state, providing an opportunity to schedule, which is important for improving system real time perf...
详细信息
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,...
详细信息
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.
Link prediction in networks has attracted increasing attention by researchers coming from different branches of science, and has been applied in many important domains, such as protein-protein interaction networks in ...
详细信息
This paper focuses efforts on the problem of computing the inverse of cardinal direction relations (CRs), which is a fundamental problem in qualitative spatial reasoning. We study the quite expressive cardinal directi...
详细信息
This paper focuses efforts on the problem of computing the inverse of cardinal direction relations (CRs), which is a fundamental problem in qualitative spatial reasoning. We study the quite expressive cardinal direction relation model for extended objects, known as cardinal direction calculus (CDC). We first concentrate on a set of a special type of CRs defined in CDC, named rectangle-CRs, and compute the inverse of rectangle-CRs by exploiting the evident connection between basic rectangle- CRs and interval relations. Then, we consider progressively the general cardinal direction relations in CDC, or called CDC relations for short, the inverse of which is computed by reducing to the computation of the inverse of rectangle-CRs. This simplifies the computations. Analyzing in theory and the final results both demonstrate that our algorithms are correct and complete and the time complexity is bounded by a constant number of operations.
Recently, social tagging systems become more and more popular in many Web 2.0 applications. In such systems, Users are allowed to annotate a particular resource with a freely chosen a set of tags. These user-generated...
详细信息
Recently, social tagging systems become more and more popular in many Web 2.0 applications. In such systems, Users are allowed to annotate a particular resource with a freely chosen a set of tags. These user-generated tags can represent users' interests more concise and closer to human understanding. Interests will change over time. Thus, how to describe users' interests and interests transfer path become a big challenge for personalized recommendation systems. In this approach, we propose a variable-length time interval division algorithm and user interest model based on time interval. Then, in order to draw users' interests transfer path over a specific time period, we suggest interest transfer model. After that, we apply a classical community partition algorithm in our approach to separate users into communities. Finally, we raise a novel method to measure users' similarities based on interest transfer model and provide personalized tag recommendation according to similar users' interests in their next time intervals. Experimental results demonstrate the higher precision and recall with our approach than classical user-based collaborative filtering methods.
In this paper, we present a new regularization classification method based on extreme learning machine for within network node classification problem. In particular, we define a new objective function, which contains ...
详细信息
暂无评论