The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Memcached is an in-memory key-value caching system, which is used to resolve the principal contradiction of the disk-based database between the CPU and input/output, has been widely used as an effective way to solve the distance and improve the capacity of the source server. We optimize the performance of Memcached memory access through two ways: improve the density of memory storage and ameliorate...
Most database-base applications support two main sets of features: customer facing transactional capabilities such as purchasing books at an online bookstore and functionality required by managers and business analysts such as identifying trends in sales data by combing through aggregated sales data. The conventional approach of having just one main database to support both features greatly restrict...
For all sound reasons, more and more organizations are deploying their databases to the cloud as a viable option as part of their nowadays system architecture. Since we cannot be sure that our database access would never be compromised, data encryptions of various forms and levels have become the utmost techniques used to prevent malicious parties, internal or external, from inspecting an organization's...
Head-related transfer functions (HRTFs), which reflect the interaction between sound waves and human anatomical structures, are core of virtual auditory environments (VAEs). To achieve authentic VAEs, individual HRTFs need to be incorporated in signal synthesis. Accurately measuring HRTF-relevant anthropometric parameters is important in the anthropometry-based HRTF customization method which is regarded...
As the size of image databases for various applications keeps growing at an explosive rate, how to automatically and efficiently classify the images and mimic human visual perception is an extremely important issue. The spatial layout information of the image is a kind of abstract semantics and the visual grammar of the image. It could dramatically improve the effectiveness of the scene classification...
Mobile phones which use Android or other smartphone operating systems, equipped with richer applications than traditional ones, enable users to leave more things to phones to deal with. As a result, personal information stored on mobile phones becomes more and more. It is well known that backup is an important means to keep the information safe. However, users could only sync their contacts, sms,...
Inter-vehicle communication find increasing application in futuristic intelligent transport systems and ad hoc mobile networks. However, the channel statistical properties for these mobile-to- mobile channel are quite different from traditional cellular wireless networks, and need to modify the simulation method. The paper proposes a method to simulate the Rician-faded mobile-to-mobile local in three-dimensional...
In this paper, we describe our experiment developing an implementation of the Linpack benchmark for TianHe-1, a petascale CPU/GPU supercomputer system, the largest GPU-accelerated system ever attempted before. An adaptive optimization framework is presented to balance the workload distribution across the GPUs and CPUs with the negligible runtime overhead, resulting in the better performance than the...
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID(Radio Frequency Identification), this paper proposed a new ticketing system based on C/S architecture and two-dimensional(2-D) barcode on mobile...
With the large influx of the data mining technology and mining tools, the confidentiality requirements of the personal privacy are becoming more and more urgent. Therefore, how to ensure personal privacy and get the correct mining results becomes a severe issue to be resolved. In this paper, we propose a kind of random response method of geometric transformation- the combination of the random response...
Software defects are the key factors to evaluate the dependable software. This paper analyzes the attributes of software defects, and applies positive and negative association rules method to the research of software defects. This method can not only overcome the weak point of the traditional association rules method that can only mine the explicit rules, but also output some more meaningful rules...
Recently, how to utilize information that is stored in hundreds of millions of databases effectively, especially on the Web, has received increasing attention. It relates to many fields such as data mining, search engine and massive data processing. In order to improve methods which are limited in finding the relationship between conceptions of terms from different information sources manually, this...
Based on the status quo and the devolvement of domestic and international database legislations, this paper discusses the issues in current database protection and its future perspective. It also emphasizes the need for public access to database resources, and proposes the legal protection for database return to the principle of copyright protection.
The determination of the optimal oxygen content is very important in power plant operation optimization. Due to the disadvantages of traditional ways, this paper proposed a new method to decide the optimal oxygen content based on incremental updating data mining. This method could determine the optimal oxygen content and related frequent items by fuzzy quantitative association rule mining algorithm...
Data integrated from multiple sources may contain inconsistencies. A consistent query answer (CQA) in a possibly inconsistent database is an answer which is true in every minimal repair of the database. It is proved that for most constraints and queries CQA is a NP problem based on repairing by tuple deletions, therefore there are little applications based on CQA. Under closed world assumption, only...
A method for simultaneous localization and mapping based on scan matching is presented according to memory database of the features. The steady geometric features are extracted as the natural landmarks according to advanced least square fitting, and the memory database of the features is created and updated for scan matching better. Therefore, it is also adapted to dynamic environment. Meanwhile,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.