929 research outputs found

    Towards Correlated Sequential Rules

    Full text link
    The goal of high-utility sequential pattern mining (HUSPM) is to efficiently discover profitable or useful sequential patterns in a large number of sequences. However, simply being aware of utility-eligible patterns is insufficient for making predictions. To compensate for this deficiency, high-utility sequential rule mining (HUSRM) is designed to explore the confidence or probability of predicting the occurrence of consequence sequential patterns based on the appearance of premise sequential patterns. It has numerous applications, such as product recommendation and weather prediction. However, the existing algorithm, known as HUSRM, is limited to extracting all eligible rules while neglecting the correlation between the generated sequential rules. To address this issue, we propose a novel algorithm called correlated high-utility sequential rule miner (CoUSR) to integrate the concept of correlation into HUSRM. The proposed algorithm requires not only that each rule be correlated but also that the patterns in the antecedent and consequent of the high-utility sequential rule be correlated. The algorithm adopts a utility-list structure to avoid multiple database scans. Additionally, several pruning strategies are used to improve the algorithm's efficiency and performance. Based on several real-world datasets, subsequent experiments demonstrated that CoUSR is effective and efficient in terms of operation time and memory consumption.Comment: Preprint. 7 figures, 6 table

    The Approaches from National Literature to World Literature

    Get PDF
    The paper explores the approaches from national literature to world one. The first approach to the world literature is literary translation and translated literature, the former refers to the faithful translation of original national works, and the latter means a creative treason of translation, or a kind of rewriting, based on the original text; the second is to gain the Nobel Award for Literature; The third is travel, exile or Diaspora of literature; and the last one is literary communication. In the end, the author stresses that the world literature is a literary garden of diversional and different dimension

    NON-LINEAR REGULARIZATION FOR IMAGING THROUGH TURBID MEDIA

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Experimental Investigation on the Vertical Distribution of Cohesive Sediment Concentration in Weak Dynamical Flow

    Get PDF
    Source: ICHE Conference Archive - https://mdi-de.baw.de/icheArchiv

    Transient Simulation on Dynamic Response of Liquid Annular Seals

    Get PDF
    Transient change of the operating parameters has a serious influence on the stability of liquid annular seals. Take the liquid annular seals as a research object, a numerical method based on six-degree-of-freedom (6DOF) to analyze the dynamic response of liquid annular seals under gravity impact load. The variations of the force of liquid seal and pressure as well as the axis trajectory in time history are investigated. The influence of different sealing clearance, different liquid viscosity and different rotor speed is also studied. The results show that the maximum sealing pressure and sealing force of gravity direction will increase greatly in a very short time and then reduce rapidly. When sealing clearance increases, the displacement response amplitudes of axis trajectory, the maximum sealing force of gravity direction and maximum sealing pressure also increase. When liquid viscosity increases, the displacement response am plitudes of axis trajectory, the maximum sealing force of gravity direction and maximum sealing pressure decrease. We also found that different rotor speed has almost no influence on the maximum sealing force of gravity direction and maximum sealing pressure

    Metaverse Security and Privacy: An Overview

    Full text link
    Metaverse is a living space and cyberspace that realizes the process of virtualizing and digitizing the real world. It integrates a plethora of existing technologies with the goal of being able to map the real world, even beyond the real world. Metaverse has a bright future and is expected to have many applications in various scenarios. The support of the Metaverse is based on numerous related technologies becoming mature. Hence, there is no doubt that the security risks of the development of the Metaverse may be more prominent and more complex. We present some Metaverse-related technologies and some potential security and privacy issues in the Metaverse. We present current solutions for Metaverse security and privacy derived from these technologies. In addition, we also raise some unresolved questions about the potential Metaverse. To summarize, this survey provides an in-depth review of the security and privacy issues raised by key technologies in Metaverse applications. We hope that this survey will provide insightful research directions and prospects for the Metaverse's development, particularly in terms of security and privacy protection in the Metaverse.Comment: IEEE BigData 2022. 10 pages, 2 figure
    corecore