9,837 research outputs found

    An overview of the Daya Bay Reactor Neutrino Experiment

    Full text link
    The Daya Bay Reactor Neutrino Experiment discovered an unexpectedly large neutrino oscillation related to the mixing angle θ13\theta_{13} in 2012. This finding paved the way to the next generation of neutrino oscillation experiments. In this article, we review the history, featured design, and scientific results of Daya Bay. Prospects of the experiment are also described.Comment: 18 pages, 5 figures. An overview to appear in the Special Issue on neutrino oscillations of Nuclear Physics

    The Irrelevant Values Problem of Decision Tree for Improving a Glass Sputtering Process

    Get PDF
    [[abstract]]In this paper, we use decision tree to establish a yield improvement model for glass sputtering process; however, the tree may have irrelevant values problem. In other words, when the tree is represented by a set of rules, not only comprehensibility of the resultant rules will be detracted but also critical factors of the manufacturing process cannot be effectively identified. From the performance issue and practical issue, we have to remove irrelevant conditions from the rules; otherwise, a domain expert is needed to review the decision tree. In this paper, we use a very simple example to demonstrate this point of view. Moreover, to identify and remove irrelevant conditions from the rules, we also revise Chiang's previous algorithm such that the modified algorithm can deal not only discrete data but also quantitative data.[[notice]]補正完畢[[incitationindex]]EI[[booktype]]紙

    Cyclic inheritance detection for object-oriented database

    Get PDF
    [[abstract]]Inheritance is the main theme of schema design for the object-oriented software and object-oriented database. Misuse of inheritance will lead to cyclic inheritance which suffers from redundant classes and endless self-inheritance. For a class hierarchy with cyclic inheritance, to detect all the cyclic inheritances is a NP-complete problem. A graph-theoretical reduction methodology to reduce them in polynomial time is described. An algorithm to support this reduction is presented.[[conferencetype]]國際[[conferencedate]]19921111~19921113[[iscallforpapers]]Y[[conferencelocation]]Melbourne, Vic., Australi

    New species of Meromyza from Palaearctic and Oriental China (Diptera: Chloropidae)

    Get PDF
    Two new Palaearctic species, Meromyza yangi sp. n. and M. zhuae sp. n., and one new Oriental species, M. wuyishanensis sp. n., are described. An updated key to the known species of the genus from China is presented

    Review of the genus Meromyza from China (Diptera: Chloropidae)

    Get PDF
    Areview of the species of the genus Meromyza from China is provided. Two species, Meromyza gansuensis sp. n. and M. ningxiaensis sp. n., are described as new to science. Akey to the species of the genus from China is presented. The distribution of the genus in China is discussed

    A privacy-preserving fuzzy interest matching protocol for friends finding in social networks

    Get PDF
    Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before. In a social network, there are many social groups established based on common interests among persons, such as learning group, family group, and reading group. People often describe their profiles when registering as a user in a social network. Then social networks can organize these users into groups of friends according to their profiles. However, an important issue must be considered, namely many users’ sensitive profiles could have been leaked out during this process. Therefore, it is reasonable to design a privacy-preserving friends-finding protocol in social network. Toward this goal, we design a fuzzy interest matching protocol based on private set intersection. Concretely, two candidate users can first organize their profiles into sets, then use Bloom filters to generate new data structures, and finally find the intersection sets to decide whether being friends or not in the social network. The protocol is shown to be secure in the malicious model and can be useful for practical purposes.Peer ReviewedPostprint (author's final draft

    E-business Management System Based on Coordinated Center for Dealer

    Get PDF
    This management platform has been applied in e-business of the dealer. Based on coordinated center, and it is realized by intranet, extranet and Internet. The structure of the management platform has five parts: information center of management platform, customer relationship management system, purchasing management system, logistics management system and financial management system. With network security, data security, user security and backup etc., the system reliability and security are enhanced. Through Business to Business (B2B) and Business to Customers (B2C), it can help the dealer coordinate with the supplier and the retailer
    • …
    corecore