The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
K-modes is a typical categorical clustering algorithm. Firstly, we improve the process of K-modes: when allocating categorical objects to clusters, the number of each attribute item in clusters is updated, so that the new modes of clusters can be computed after reading the whole dataset once. In order to make K-modes capable for large-scale categorical data, we then implement K-modes on Hadoop using...
As modern simulations involve large inputs and outputs over the network, there is an increasing need to store, manage and analyze the massive datasets, efficiently. In this paper, we present ARLS (After action Reviewer for Large-Scale simulation data), a Hadoop-based output analysis tool for large-scale simulation datasets. ARLS clusters distributed storages using Hadoop and analyzes the large-scale...
With the cloud paradigm and the concept of everything as a service (XasS), our ability to leverage the potential of distributed computing resources seems greater than ever. On the other hand, data farming is a methodology based on the idea that by repeatedly running a simulation model on a vast parameter space, enough output data can be gathered to provide an meaningful insight into relations between...
With development of Multicore clusters the taskscheduling problem in heterogeneous cluster has become hot point of research. The method to solve this problem in Cloud computing is virtualization, which can make the heterogeneous nodes being isomorphic and then using MapReduce model for task scheduling in isomorphic nodes. But the approach has some shortcomings: virtualization itself will cause the...
Modern enterprise computer networks rely on centrally managed authentication schemes that allow users to easily communicate access credentials to many computer systems and applications. The authentication events typically consist of a user connecting to a computer with an authorized credential. These credentials are often cached on the application servers which creates a risk that they may be stolen...
Due to the popularity and development of computer science, the connection between computer science and other disciplines became closer. The multidisciplinary crossing centered on computer science is gradually formed. Computer has unparalleled advantages in calculation, modeling, simulation and so on. It makes computer science hold a significant position in other disciplines. How to make students better...
The network traffic generated by a computer, or a pair of computers, is often well modelled as a series of sessions. These are, roughly speaking, intervals of time during which a computer is engaging in the same, continued, activity. This article explores a variety of statistical approaches to re-discovering sessions from network flow data using timing alone. Solutions to this problem are essential...
In this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct homogeneous computational pattern. A design cycle has been introduced here. This cycle is a wizard to cluster and insert computational nodes. For IoT intentions, data that should be transmitted to the higher protocol layer,...
With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. In this paper, we propose an oriented group provable data possession in public cloud and shared among a large number. We utilize group key agreement key as the foundation of the homomorphic authenticator, which enable any member of the group can verify data...
Cloud database usually refers to a database based on the cloud computing technology. However, as far as we know, pre-existing solutions of cloud database cannot integrate the data from multi-sourced heterogeneous databases, only supplying an isolated homogeneous database cluster. This paper presents a new implementation approach for cloud database: Sea Base, which integrates various data types into...
In order to quickly determine the distribution of anomaly detection model based on small amounts of collected data, the moving relative entropy density deviation method (MREDD) is introduced to test the power series distributed random sequence. Through the moving averages of data analysis and comparison, the anomaly detection models can quickly be established. Experimental results show that this method...
Factorization Machines [1, 2] is a new factorization model that can combine the merits of SVM model with matrix factorization models. It can model all the interactive actions using factorized parameters. So it could mimic most other matrix factorization models by feature engineering. Due to the superior flexible, Factorization Machines has already been widely used in many recommended algorithm competitions...
The requirement and characteristic in Computer Generated Forces behavior modeling were analyzed. From the design concept of American OneSAF system, a method for behavior modeling based on composability was proposed and the formalization description of behavior was given. Moreover, the Behavior Modeling Composer Tool was developed based on this method to assist the behavior modeling. Finally, an application...
This paper presents a design of a real time simulation system based on rapid prototyping and VxWorks real-time operating system for an unmanned aerial vehicle. A simulation method based on rapid prototyping was introduced and the simulation model was constructed in MATLAB/SIMULINK environment. The real-time simulation software for specified hardware platform was generated automatically. With this...
The modern economy increasingly relies on exploratory data analysis. Much of this is dependent on data scientists — expert statisticians who process data using statistical tools and programming languages. Our goal is to offer some of this analytical power to end-users who have no statistical training through simple interaction techniques and metaphors. We describe a spreadsheet-based interaction technique...
This paper describes a framework which enables distributed object sharing in a multi agent environment. Shared objects are replicated across nodes in the distributed environment so that agents access a local copy rather than a remote one, thus minimizing network traffic. The framework solves issues related to replica coherence, consistency and management. Shared objects are serializable Java objects...
The authors present a complex of computer laboratories that simulates major subsystems of electrophysical facilities. Lab software interface creates a research environment with diverse electrophysical equipment, including assembly of the experimental circuits, setting their parameters and characteristics, starting and carrying out the necessary research. Models of subsystems are based on both mathematical...
According to the underlying IPv6 network of the differential computer system, there are differences in the computer system network, and the security detection has the blind zone. The difference of the underlying IPv6 network in the computer system is analyzed comprehensively. On the basis of this, an improved underlying IPv6 network security detection module design method is proposed for the multi...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.