The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces the characteristics and the new technologies applied in Fengyun-3 Series Meteorological Satellite Data Archiving and Service System. The system integrates several high-performance servers, high availability disk array, large-scale automated tape library as well as operation system, database, storage software and application software, all of which constitutes archive and service...
In the data mining research area, discovering frequent item sets is an important issue and key factor for mining association rules. For large datasets, a huge amount of frequent patterns are generated for a low support value, which is a major challenge in frequent pattern mining tasks. A Maximal frequent pattern mining task helps to resolve this problem since a maximal frequent pattern contains information...
This paper designs an elegant model in k-in-a-row games Connect6 as an example. In this model, domain knowledge is involved in the special pattern called Connection. A Connection covers several consecutive intersections of a line on the board, and is also the basic element of the data structure sketching the blueprint of the model. Based on Connection, we can show how to construct a complete database...
The main difference of the associative classification algorithms is how to mine frequent item sets, analyze the rules exported and use for classification. This paper presents an associative classification algorithm based on Trie-tree that named CARPT, which remove the frequent items that cannot generate frequent rules directly by adding the count of class labels. And we compress the storage of database...
Every user has a distinct background and a specific goal when searching for information on the Web. The goal of Web search personalization is to tailor search results to a particular user based on that user's interests and preferences. This paper presents an approach of search engine optimization based on algorithm of BP neural networks aiming at meeting the increasing requirements of modern people...
In this paper, a new method of personalized retrieval based on algorithm of BP(Back Propagation) Neural Networks is establish to meet the growing demand for search. The method which can make search engines more intelligent and more personalized tries to provide the best search results.
Webpage Trojan horse in IIS server is also a kind of ASP, ASP.NET or HTML programs; It has no clear distinction with other webpage programs. This is the reason why Trojans have become the main approach to attack websites. These years webpage Trojan horses have applied varied technique to hide their characteristics, and techniques of Trojan finding and anti-killing contest further more. Based on analyzing...
The previous study of pattern discovery in storage systems focus on sequential pattern (SP) mining in lower level traces, but they donpsilat scale well to the application level. For patterns in application level are mostly composed of Contiguous Item Sequential Pattern (CISP) which are much simpler than SP, so itpsilas inefficient for the previous studies to mine CISP with clumsy SP mining algorithms...
In traditional grid, grid user can not validate whether grid service registered in grid platform can execute correctly or not because the system does not provide the measurement mechanism for grid service. In order to solve this problem, we propose a series of strategies and methods for trusted grid. These strategies and methods include: an access control policy for reference database, an integrity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.