Based on FP-tree algorithm, this article introduced the method of multi-thread processing and a Multi-Threaded Paralleled frequent item-set mining Algorithm - MTPA was proposed. It has been applied to an enterprise hu...
详细信息
Based on FP-tree algorithm, this article introduced the method of multi-thread processing and a Multi-Threaded Paralleled frequent item-set mining Algorithm - MTPA was proposed. It has been applied to an enterprise human resources management system. Through the experiments of paralleled mining by using increasing multi-thread processing, it has been proved that MTPA which on the condition of multi-core processors can improve the efficiency of frequent item-set mining effectively.
Vehicular ad hoc networks (VANETs) are designed to improve traffic safety and efficiency. To this end, the traffic communication must be authenticated to guarantee trustworthiness for guiding drivers and establishing ...
Vehicular ad hoc networks (VANETs) are designed to improve traffic safety and efficiency. To this end, the traffic communication must be authenticated to guarantee trustworthiness for guiding drivers and establishing liability in case of traffic accident investigation. Cryptographic authentication techniques have been extensively exploited to secure VANETs. Applying cryptographic authentication techniques such as digital signatures raises challenges to efficiently store signatures on messages growing with time. To alleviate the conflict between traffic liability investigation and limited storage capacity in vehicles, this paper proposes to aggregate signatures in VANETs. Our proposal can preserve privacy for honest vehicles and trace misbehaving ones, and provides a practical balance between security and privacy in VANETs. With our proposal, cryptographic witnesses of safety-related traffic messages can be significantly compressed so that they can be stored for a long period for liability investigation. Our proposal allows a large number of traffic messages to be verified as if they were a single one, which speeds up the response of vehicles to traffic reports.
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a funda...
详细信息
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a fundamental block constraining the progress of vehicle electronic industry. A trusted remote remediation framework for vehicle software is presented and realized to enable drivers to online upgrade version or fix bug without needing for driving the vehicles back to the factories or using the specific devices. In this framework, the trusted remediation server takes responsibility for managing and providing the patch programs and the trusted remediation client can download directly from the remediation server to upgrade programs or fix software errors, achieving the self-repair in complex vehicular networks.
One kind of semantic Web service modeling and reasoning method based on description logic with Boolean role constructors (SROIQB) was introduced. By using DL to figure out the hyponymy relationship between concepts in...
详细信息
One kind of semantic Web service modeling and reasoning method based on description logic with Boolean role constructors (SROIQB) was introduced. By using DL to figure out the hyponymy relationship between concepts in domain ontology and model Web service functional semantic in ServiceProfile, and define Boolean role expressions to describe the composition process in ProcessProfile respectively. Furthermore, Boolean role expression is introduced to describe all possible composition structures of atomic services and then semantic Web service composition can be regarded as a process of consistence checking and class subsumption computing reasoning on DL knowledge base. Thus the comparison and example validation show that introduced one kind of new and reasonable semantic Web service modeling and composition method in the framework of semantic Web by using SROIQB, which with more strong expressive capability and decidable type inference.
The concept of accessibility needs to take into account factors like individual needs, preferences, and abilities as well as transportation, land use, and finances. This article proposes a sensitive space-time accessi...
详细信息
Qualitative spatial relations are widely used in geospatial ontologies, geospatial (semantic) web services, spatial description logics etc. Methodology to obtain qualitative spatial relations (especially complex spati...
详细信息
Qualitative spatial relations are widely used in geospatial ontologies, geospatial (semantic) web services, spatial description logics etc. Methodology to obtain qualitative spatial relations (especially complex spatial relations) from Geographical information system (GIS) has not been studied in previous literatures. An efficient method for calculating complex qualitative spatial relations is discussed here. First, the multi-granularities approximate representation of spatial objects is proposed, it is designed for GIS object types (such as polygon), and requires less process time. Then some algorithms for calculating complex spatial relations based on the multi-granularities approximate representation are given. Finally, this method is implemented and used to obtain topology and direction relations from world map. The analysis and test results show that this method supports complex and integrated spatial relations and requires less process time than traditional method. This method is suitable for obtaining spatial relations for geospatial ontologies and other applications.
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process: generation, diffusion, and dissipation of congestion. Different from the betweenness central...
详细信息
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process: generation, diffusion, and dissipation of congestion. Different from the betweenness centrality, a congestion function is proposed to represent the extent of congestion on a given node. Inspired by the restart process of a node, we introduce the concept of "delay time," during which the overloaded node Cannot receive or forward any traffic, so an intergradation between permanent removal and nonremoval is built and the flexibility of the presented model is demonstrated. Considering the connectivity of a network before and after cascading failures is not cracked because the overloaded node are not removed from network permanently in our model, a new evaluation function of network efficiency is also proposed to measure the damage caused by cascading failures. Finally, we investigate the effects of network structure and size, delay time, processing ability, and traffic generation speed on congestion propagation. Cascading processes composed of three phases and some factors affecting cascade propagation are uncovered as well.
We study the statistical properties of complex networks constructed from time series of energy dissipation rates in three-dimensional fully developed turbulence using the visibility algorithm. The degree distribution ...
详细信息
We study the statistical properties of complex networks constructed from time series of energy dissipation rates in three-dimensional fully developed turbulence using the visibility algorithm. The degree distribution is found to have a power-law tail with the tail exponent α = 3.0 . The exponential relation between the number of the boxes N B and the box size l B based on the edge-covering box-counting method illustrates that the network is not self-similar, which is also confirmed by the hub-hub attraction according to the visibility algorithm. In addition, it is found that the skeleton of the visibility network exhibits excellent allometric scaling with the scaling exponent η = 1.163 ± 0.005 .
In this paper, a novel method is proposed for judging whether a component set is a consistency-based diagnostic set, using SAT solv- ers. Firstly, the model of the system to be diagnosed and all the observations are d...
详细信息
In this paper, a novel method is proposed for judging whether a component set is a consistency-based diagnostic set, using SAT solv- ers. Firstly, the model of the system to be diagnosed and all the observations are described with conjunctive normal forms (CNF). Then, all the related clauses in the CNF files to the components other than the considered ones are extracted, to be used for satisfiability checking by SAT solvers. Next, all the minimal consistency-based diagnostic sets are derived by the CSSE-tree or by other similar algorithms. We have implemented four related algorithms, by calling the gold medal SAT solver in SAT07 competition – RSAT. Experimental results show that all the minimal consistency-based diagnostic sets can be quickly computed. Especially our CSSE-tree has the best effciency for the singleor double-fault diagnosis.
In this paper we propose an algorithm of computing minimal diagnosis based on BDD (Binary Decision Diagram). First we give the concept of disjunction equations, and map the collection of conflict sets into disjunction...
详细信息
暂无评论