The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the data mining research area, discovering frequent item sets is an important issue and key factor for mining association rules. For large datasets, a huge amount of frequent patterns are generated for a low support value, which is a major challenge in frequent pattern mining tasks. A Maximal frequent pattern mining task helps to resolve this problem since a maximal frequent pattern contains information...
The main difference of the associative classification algorithms is how to mine frequent item sets, analyze the rules exported and use for classification. This paper presents an associative classification algorithm based on Trie-tree that named CARPT, which remove the frequent items that cannot generate frequent rules directly by adding the count of class labels. And we compress the storage of database...
Online hot topic detection is a significant research field in web data mining, which can help people make policy decision or benefit to people's daily life. Actually, in recent years more and more hot topics are arising from BBS, often referred as online forum. BBS provide a communication platform for people to discuss and express their views. It's obvious that forecasting the hotness topics on BBS...
Efficient algorithms for mining frequent itemsets are crucial for mining association rules as well as for many other data mining tasks. In this paper, we integrate the merits of the matrix algorithm and Index-BitTableFI algorithm, and design an efficient algorithm for mining the frequent itemsets. In the new algorithm, it may be generated directly some frequent itemsets which do not generate in the...
It is still a technique "bottleneck" for continuous development of the city rail transit that how to determine the transfer paths made by passengers and how to implement clearing transfer transactions and ticket revenues in the city rail transit network in which the "transfer with one ticket in station" would be implemented. In this paper, a simplified modeling algorithm of rail...
Two optimization strategies based on Bloom Filter are proposed for P2P security. In order to protect the privacy of trust information in P2P systems, BFManager using BloomFilter is employed to manager trust information, and builds a structure called trust bucket to store trust value and divides peers with different trust value into different trust buckets. The other is called as BFChecker to optimize...
From the mathematic expression, we can see that sidelobe power of multi-band orthogonal frequency-division multiplexing (MB-OFDM) signal is a function of the data symbols loaded on the sub-carriers. Through the derivation of the minimum of the function, relationships among data symbols, which help to suppress sidelobes, are obtained. Two types of methods, referred as sub-carrier adding (SA) method...
Let G(V, E) be a simple graph,k (1 les k les Delta + 1) is a positive integer, f is a mapping from V(G) upsi E(G) to {1, 2,..., k} such that foralluu, uw isin E(G), v ne w, f(uv) ne f(uw); foralluv isin E(G), if d(u) = d(v)then C(u) = C(v); we say that f is the adjacent vertex reducible edge-total coloring of G. The maximum number of k is called the adjacent vertex reducible edge-total chromatic number...
For scalability, many side-effect analysis methods choose inclusion-based context-insensitive (IBCI) pointer analysis as their basis. However, such a pointer analysis is known to be imprecise, which often results in over-conservative side-effect sets. In this paper, we present a lightweight approach that exploits lazy access path resolving to improve the precision of side-effect analysis under IBCI...
To increase the output efficiency of a photovoltaic (PV) energy system, the real-time maximum power point (MPP) of the PV array must be tracked closely. Herein a recurrent fuzzy neural network controller (RFNNC) was proposed to track the MPP. A radial basis function neural network (RBFNN) was developed to provide the reference information to the RFNNC. With a derived learning algorithm, the parameters...
To deal with the risk recognition from the complex risk management, a novel risk recognition method was studied through rule extration based on rough set. According to the indiscernible relation in rough set, a formula to compute attribute importance is put forward based on the concept of similar matrix and attribute frequency in the matrix, which is used as heuristic knowledge in deciding the sequence...
Many FPGA implementations for QR decomposition have been studied on small-scale matrix and all of them are presented individually. However to the best of our knowledge, there is no FPGA-based accelerator for large-scale QR decomposition. In this paper, we propose a unified FPGA accelerator structure for large-scale QR decomposition. To exploit the computational potential of FPGA, we introduce a fine-grained...
The previous study of pattern discovery in storage systems focus on sequential pattern (SP) mining in lower level traces, but they donpsilat scale well to the application level. For patterns in application level are mostly composed of Contiguous Item Sequential Pattern (CISP) which are much simpler than SP, so itpsilas inefficient for the previous studies to mine CISP with clumsy SP mining algorithms...
The cache utilization seriously impacts on program performance, whereas the cache behavior is transparent to developers so that they cannot get opportunity to optimize their programs by reducing cache miss rates. This paper introduces a useful instrumentation tool, Cachebit, which is built with Crossbit - a dynamic binary translation (DBT) framework with intermediate instruction layer. Cachebit simulates...
In recent years, many experimental studies are reported on field electron emission from semiconductor nanostructures, but the related theoretical study is lacking behind. Thus, a number of important experimental observations are not physically explained; these include nonlinear plots on FN coordinates and extremely large field enhancement factors (beta FN) determined by fitting based FN theory. In...
ESP-CV is a symbolic simulation-based formality verification tool intended to perform custom equivalence(EQ) checking and provide functional verification coverage for full-custom IC design. This paper introduced the basic principle and work flow of ESP verification firstly, and then the ESP verification method and flow of our custom SRAM array design was demonstrated.
In the implementation of Observer pattern by OOP, the subject objects and the observer objects must implement one interface or extend one abstract class to indicate their roles. When it is implemented by AOP, there is not such requirement. The participants and their relations are defined in an aspect, it isn't necessary for these participants to implement one interface or extending one abstract class...
In this paper, the effects of parameters of substrate and ILH-MSA structure on radiation performances have been analyzed firstly, and then the available ranges of the parameters are given to ensure radiation performances of ILH-MSA. Secondly, an ILH-MSA operating at 1.6GHz is designed and fabricated as an example. Experiment results show that, the area of the present ILH-MSA is 49% of that of traditional...
Firstly, the paper designs a novel broad beamwidth microstrip antenna at 16GHz, whose 3dB beamwidth is up to 170 degrees. Then a conformal phased array on conical surface is designed by means of the present broad beamwidth microstrip antenna. To achieve effective beam scanning in whole elevation and rolling planes, the whole rolling plane has been divided into six sections. Numerical results show...
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data when components fail. Erasure codes can however impose significant performance overhead in two core operations: encoding, where coding information is calculated from newly written data, and decoding, where data is reconstructed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.