首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only some operations such as "and", "or" and "xor". Applying this idea in the existed distributed association rule mining al gorithm FDM, the improved algorithm BFDM is proposed. The theoretical analysis and experiment testify that BFDM is effective and efficient.  相似文献   

2.
3.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

4.
This paper presents a lighter protocol, and it removes the multicast burdens from RSVP to adapt to unicast applications. At the same time, when RSVP is used in wireless networks, some issues about mobility raise popular concerns. The proposed protocol a lightweight mobile RSVP protocol, solves the problems by the following mechanisms: changeless flow identifier, a new state management and "refresh" mechanism.  相似文献   

5.
This paper presents the logic relationship between rural settlement reconstruction and soil conservation in the Upper Yangtze River. Firstly, by introducing the concepts of "flow" and "intercepted flow", we probe into the dynamic mechanism on interaction between ecological and environmental system, and then point out that the "intercepting sites" are physical conditions for establishment of human settlements in mountains. Secondly, by using ecological theories, "flow", "source", and "sink", material cycle and energy flow in mountains have been discussed. Thirdly, according to dissipative structure theory and thermodynamic laws, a hypothesis has been proposed that "entropy flow" is a dynamic force for settlement evolution. Finally, it is argued that a project for soil conservation is set to control and utilize flows so rural settlements can be supported and farmers' life improved.  相似文献   

6.
A vision based query interface annotation meth od is used to relate attributes and form elements in form based web query interfaces, this method can reach accuracy of 82%. And a user participation method is used to tune the result; user can answer "yes" or "no" for existing annotations, or manually annotate form elements. Mass feedback is added to the annotation algorithm to produce more accurate result. By this approach, query interface annotation can reach a perfect accuracy.  相似文献   

7.
Lithium iron phosphate coated with carbon (LiFePO4/C) was synthesized by improved solid-state reaction using comparatively lower temperature and fewer sintering time. The carbon came from citric acid, which acted as a new carbon source. It was characterized by thermogravimetry and differential thermal analysis (TG/DTA), X ray diffractometer (XRD), Element Analysis (EA) and Scanning electron microscope (SEM). We also studied the electrochemical properties of the material. The first discharge capacity of the LiFePO4/C is 121 mAh·g−1 at 10 mA·g−1, at room temperature. When the current density increased to 100 mA·g−1, the first discharge capacity decreased to 110 mAh·g−1 and retained 95% of the initial capacity after 100 cycles. The LiFePO4/C obtained shows a good electrochemical capacity and cycle ability at a large current density. Foundation item: Supported by the National Natural Science Foundation of China (20071026) Biography: ZHOU Xin-wen (1980-), male, Master, research direction: inorganic material chemistry.  相似文献   

8.
This paper introduces an RTP-packets‘ loss recovery scheme in MPEG-4 playback type multicast application model, which is based on retransmission scheme. Through the auxiliary and coordinated buffer playing scheme of layered “buffer-routers”, the RTP-packets‘ loss recovery in limited time is made possible. We consider in the scheme to handle retransmission request with buffer waiting when network congestion occurs. Thus, neither the degree of congestion will be worsened nor the retransmission request will be lost when sending the request to higherlevel buffer router. The RTP-packets‘ loss recovery scheme suggested by us is not only applied to MPEG-4 muhieast application in LAN, but also can be extended to more spacious WAN (wide area network) when user groups comparatively centralize in certain number of local areas.  相似文献   

9.
0Introduction Near infrared(NIR)techniquesarebasedonsensitive,quantitativemeasurementsoffunctionalcontrastbe tweenhealthyanddiseasedtissue.Recently,researchersshowgreatinterestinmeasuringfunctionalpropertiesofbreasttis suesuchashemoglobinconcentrationoroxygensaturationbyNIRspectroscopyandNIRimaging[1,2].NIRlightcanpene trateseveralcentimetersintotissuebeforeitisattenuatedbe lowdetection.ThemainintrinsicmechanismsofNIRlightat tenuationintissuearethescatteringduetoindexofrefractionvariatio…  相似文献   

10.
Building Intrusion Tolerant Software System   总被引:1,自引:0,他引:1  
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.  相似文献   

11.
The floristic elements and the geographical distribution are analyzed in this paper based on statistics of elements of rare and endangered plants in Tibet. The results have been gained as following:① According to ““““the National Important Wild Conservative Plants List (List 1)““““ and ““““the National Important Wild Conservative Plants List (List 1)““““, there are a total of 54 plant species (48 genera and 33 families); ② The geographical elements are very complicated in Tibet with 12 of 15 distribution patterns of genera classified byacademician Wu; ③ There are obvious temperate genera with 28 genera accounting for 60.40% of the total genera; ④ There are abundant endemic speciesaccounting for 18.52% of total species but poor endemic genera; ⑤ The geographical distribution is uneven and a great of species distribute in the areas be-tween 1 000 m and 3 500 m above sea level; ⑥ To protect the rare and endangered plants efficiently, six conservation measures are proposed, and 35 species are suggested for the conservative plants of the autonomous conservation level.  相似文献   

12.
The mid-long term hydrology forecasting is one of most challenging problems in hydrological studies. This paper proposes an efficient dynamical system prediction model using evolutionary computation techniques. The new model overcomes some disadvantages of conventional hydrology forecasting ones. The observed data is divided into two parts: the slow “smooth and steady” data, and the fast “coarse and fluctuation” data. Under thedivide and conquer strategy, the behavior of smooth data is modeled by ordinary differential equations based on evolutionary modeling, and that of the coarse data is modeled using gray correlative forecasting method. Our model is verified on the test data of the mid-long term hydrology forecast in the northeast region of China. The experimental results show that the model is superior to gray system prediction model (GSPM). Foundation item: Supported by the National Natural Science Foundation of China ( 60133010, 70071042, 60073043) Biography: Zou Xiu-fen(1966-),female,Associate professor, research direction:evolutionary computing, parallel computing.  相似文献   

13.
The mechanisms of oxygen evolution and carbon fixation in oxygenic organisms depend on the equal distribution of excitation energy to photosystems Ⅰ and Ⅱ, which is regulated by a mechanism referred to as light-state transition. In this work, a novel mechanism, energy spillover from PS Ⅰ to PS Ⅱ referred to as "inverse spillover", was revealed besides "mobile phycobilisome (PBS)" and the "spillover" of energy from PS Ⅱ to PS Ⅰ in cyanobacteria. Under continuous illumination with blue light, time-dependent 77-K fluorescence spectra demonstrated heterogeneous kinetics for the PBS and photosystem components, indicating that inverse spillover and mobile PBS work successively to regulate the excitation to a balanced distribution in cyanobacterial cells under blue light. Inverse spillover and mobile PBS occur under both 100 and 300 μmol m-2 s-1 blue-light conditions but they are accelerated under the latter.  相似文献   

14.
According to the principle, “The failure data is the basis of software reliabilityanalysis”, we built a software reliability expert system (SRES) by adopting the artificialtechnology. By reasoning out the conclusion from the fitting results of failure data of asoftware project, the SRES can recommend users “the most suitable model” as a softwarereliability measurement model. We believe that the SRES can overcome the inconsistency inapplications of software reliability models well. We report investigation results of singularity and parameter estimation methods of models, LVLM and LVQM. Foundation item: Supported by the National Natural Science Foundation of China Biography: Biography: XU Ren-zuo (1946-), male, Professor, Research interests include software engineering, software reliability engineering, software quality guarantee technology, reliability theory, software safety and security.  相似文献   

15.
Focusing on the 18 counties along ““““One River and Two Tributaries““““ region, and based on the data from China 3^nd , 4th and 5^th population censuses, this article has analyzed the time and spatial changing patterns of the population in this region, The analyses show that since the 3^al population census, total population, average age and total birth rate have all changed considerably: ① Total population has grown fast, with most counties‘ annual average growth rate of more than 10. ② In terms of the region‘s average age, in 2000 the age inthe 18 counties is younger than 30 years old. ③ Compared with the 3^rd population census, labor force by the 5^th census is much younger. ④ Countermeasures are proposed to control population by controlling birth rate as the result of the local resident‘s quality improvement by education.  相似文献   

16.
According to the principle, “The failure data is the basis of software reliability analysis”, we built a software reliability expert system (SRES) by adopting the artificial intelligence technology. By reasoning out the conclusion from the fitting results of failure data of a software project, the SRES can recommend users “the most suitable model” as a software reliability measurement model. We believe that the SRES can overcome the inconsistency in applications of software reliability models well. We report investigation results of singularity and parameter estimation methods of experimental models in SRES. Foundation item: Supported by the National Natural Science Foundation of China Biography: XU Ren-zuo (1946-), male, Professor, research interests include software engineering software reliability engineering, software quality guarantee technology, reliability theory, software safety and security.  相似文献   

17.
A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effec rive.  相似文献   

18.
To alleviate the scalability problem caused by the increasing Web using and changing users' interests, this paper presents a novel Web Usage Mining algorithm-Incremental Web Usage Mining algorithm based on Active Ant Colony Clustering. Firstly, an active movement strategy about direction selection and speed, different with the positive strategy employed by other Ant Colony Clustering algorithms, is proposed to construct an Active Ant Colony Clustering algorithm, which avoid the idle and "flying over the plane" moving phenomenon, effectively improve the quality and speed of clustering on large dataset. Then a mechanism of decomposing clusters based on above methods is introduced to form new clusters when users' interests change. Empirical studies on a real Web dataset show the active ant colony clustering algorithm has better performance than the previous algorithms, and the incremental approach based on the proposed mechanism can efficiently implement incremental Web usage mining.  相似文献   

19.
This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.  相似文献   

20.
The selenium isotopic ratios have been measured in the Yutangba Se deposit, Hubei Province, China. The results show that the δ 82/76SeNIST values vary from -12.77‰ to 4.93‰, which is the largest Se iso- topic variation found so far in natural terrestrial samples. The sample Ytb-5 of high-selenium carbona-ceous shale has the lightest Se isotopic composition with a δ 82/76SeNIST value of -12.77‰. On the basis of variations of Se isotope in the deposit along with other geological and geochemical evidence, the "redox model" is suggested to favor the explanation of the occurrence of native Se in the deposit. The application to the Yutangba Se deposit with the discovery of large Se isotopic fractionation for natural samples indicates the potential of Se isotope as a new geochemical tracer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号