970 research outputs found
Towards Correlated Sequential Rules
The goal of high-utility sequential pattern mining (HUSPM) is to efficiently
discover profitable or useful sequential patterns in a large number of
sequences. However, simply being aware of utility-eligible patterns is
insufficient for making predictions. To compensate for this deficiency,
high-utility sequential rule mining (HUSRM) is designed to explore the
confidence or probability of predicting the occurrence of consequence
sequential patterns based on the appearance of premise sequential patterns. It
has numerous applications, such as product recommendation and weather
prediction. However, the existing algorithm, known as HUSRM, is limited to
extracting all eligible rules while neglecting the correlation between the
generated sequential rules. To address this issue, we propose a novel algorithm
called correlated high-utility sequential rule miner (CoUSR) to integrate the
concept of correlation into HUSRM. The proposed algorithm requires not only
that each rule be correlated but also that the patterns in the antecedent and
consequent of the high-utility sequential rule be correlated. The algorithm
adopts a utility-list structure to avoid multiple database scans. Additionally,
several pruning strategies are used to improve the algorithm's efficiency and
performance. Based on several real-world datasets, subsequent experiments
demonstrated that CoUSR is effective and efficient in terms of operation time
and memory consumption.Comment: Preprint. 7 figures, 6 table
The Approaches from National Literature to World Literature
The paper explores the approaches from national literature to world one. The first approach to the world literature is literary translation and translated literature, the former refers to the faithful translation of original national works, and the latter means a creative treason of translation, or a kind of rewriting, based on the original text; the second is to gain the Nobel Award for Literature; The third is travel, exile or Diaspora of literature; and the last one is literary communication. In the end, the author stresses that the world literature is a literary garden of diversional and different dimension
Experimental Investigation on the Vertical Distribution of Cohesive Sediment Concentration in Weak Dynamical Flow
Source: ICHE Conference Archive - https://mdi-de.baw.de/icheArchiv
Transient Simulation on Dynamic Response of Liquid Annular Seals
Transient change of the operating parameters has a serious influence on the stability of liquid annular seals. Take the liquid annular seals as a research object, a numerical method based on six-degree-of-freedom (6DOF) to analyze the dynamic response of liquid annular seals under gravity impact load. The variations of the force of liquid seal and pressure as well as the axis trajectory in time history are investigated. The influence of different sealing clearance, different liquid viscosity and different rotor speed is also studied. The results show that the maximum sealing pressure and sealing force of gravity direction will increase greatly in a very short time and then reduce rapidly. When sealing clearance increases, the displacement response amplitudes of axis trajectory, the maximum sealing force of gravity direction and maximum sealing pressure also increase. When liquid viscosity increases, the displacement response am plitudes of axis trajectory, the maximum sealing force of gravity direction and maximum sealing pressure decrease. We also found that different rotor speed has almost no influence on the maximum sealing force of gravity direction and maximum sealing pressure
Metaverse Security and Privacy: An Overview
Metaverse is a living space and cyberspace that realizes the process of
virtualizing and digitizing the real world. It integrates a plethora of
existing technologies with the goal of being able to map the real world, even
beyond the real world. Metaverse has a bright future and is expected to have
many applications in various scenarios. The support of the Metaverse is based
on numerous related technologies becoming mature. Hence, there is no doubt that
the security risks of the development of the Metaverse may be more prominent
and more complex. We present some Metaverse-related technologies and some
potential security and privacy issues in the Metaverse. We present current
solutions for Metaverse security and privacy derived from these technologies.
In addition, we also raise some unresolved questions about the potential
Metaverse. To summarize, this survey provides an in-depth review of the
security and privacy issues raised by key technologies in Metaverse
applications. We hope that this survey will provide insightful research
directions and prospects for the Metaverse's development, particularly in terms
of security and privacy protection in the Metaverse.Comment: IEEE BigData 2022. 10 pages, 2 figure
- …