197 research outputs found

    Processing count queries over event streams at multiple time granularities

    Get PDF
    Management and analysis of streaming data has become crucial with its applications in web, sensor data, network tra c data, and stock market. Data streams consist of mostly numeric data but what is more interesting is the events derived from the numerical data that need to be monitored. The events obtained from streaming data form event streams. Event streams have similar properties to data streams, i.e., they are seen only once in a fixed order as a continuous stream. Events appearing in the event stream have time stamps associated with them in a certain time granularity, such as second, minute, or hour. One type of frequently asked queries over event streams is count queries, i.e., the frequency of an event occurrence over time. Count queries can be answered over event streams easily, however, users may ask queries over di erent time granularities as well. For example, a broker may ask how many times a stock increased in the same time frame, where the time frames specified could be hour, day, or both. This is crucial especially in the case of event streams where only a window of an event stream is available at a certain time instead of the whole stream. In this paper, we propose a technique for predicting the frequencies of event occurrences in event streams at multiple time granularities. The proposed approximation method e ciently estimates the count of events with a high accuracy in an event stream at any time granularity by examining the distance distributions of event occurrences. The proposed method has been implemented and tested on di erent real data sets and the results obtained are presented to show its e ectiveness

    Wireless model-based predictive networked control system over cooperative wireless network

    Get PDF
    Owing to their distributed architecture, networked control systems (NCSs) are proven to be feasible in scenarios where a spatially distributed feedback control system is required. Traditionally, such NCSs operate over real-time wired networks. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment, and maintainability, wireless networks such as IEEE 802.11 wireless local area networks (LANs) are being preferred over dedicated wired networks. However, conventional NCSs with event-triggered controllers and actuators cannot operate over such general purpose wireless networks since the stability of the system is compromised due to unbounded delays and unpredictable packet losses that are typical in the wireless medium. Approaching the wireless networked control problem from two perspectives, this work introduces a practical wireless NCS and an implementation of a cooperative medium access control protocol that work jointly to achieve decent control under severe impairments, such as unbounded delay, bursts of packet loss and ambient wireless traffic. The proposed system is evaluated on a dedicated test platform under numerous scenarios and significant performance gains are observed, making cooperative communications a strong candidate for improving the reliability of industrial wireless networks

    Congestion control in interconnected computer networks

    Get PDF
    Ankara : The Department of Computer Engineering and Information Sciences and the Institute of Engineering and Sciences of Bilkent Univ. , 1988.Thesis (Master's) -- Bilkent University, 1988.Includes bibliographical references leaves 62-65.A computer network has a collection of resources shared by multiple users. The capacity of the resources is limited, and if the user demands exceed the capacity, the network becomes ’congested’. The congestion causes a degradation in system performance. In interconnected networks there are two classes of traffic within a network. One class is the local traffic that is generated and transmitted within the network. The other class is the internetwork traffic transmitted to or from other networks. In this thesis, the effect of internetwork traffic on the performance of a network is investigated. Computer simulation of an interconnected network model is provided in order to evaluate the effectiveness of a window-based congestion control mechanism on preventing congestion in gateways and in attached networks caused by the overload of internetwork traffic. Also two dynamic window congestion control algorithms are provided and studied. These algorithms provide further control to window mechanism by adjusting the window size in accordance with the availability of the network resources at the destination. Dynamic algorithms are evaluated comparing them with static window control.Ulusoy, ÖzgürM.S

    xDBTagger: Explainable Natural Language Interface to Databases Using Keyword Mappings and Schema Graph

    Full text link
    Translating natural language queries (NLQ) into structured query language (SQL) in interfaces to relational databases is a challenging task that has been widely studied by researchers from both the database and natural language processing communities. Numerous works have been proposed to attack the natural language interfaces to databases (NLIDB) problem either as a conventional pipeline-based or an end-to-end deep-learning-based solution. Nevertheless, regardless of the approach preferred, such solutions exhibit black-box nature, which makes it difficult for potential users targeted by these systems to comprehend the decisions made to produce the translated SQL. To this end, we propose xDBTagger, an explainable hybrid translation pipeline that explains the decisions made along the way to the user both textually and visually. We also evaluate xDBTagger quantitatively in three real-world relational databases. The evaluation results indicate that in addition to being fully interpretable, xDBTagger is effective in terms of accuracy and translates the queries more efficiently compared to other state-of-the-art pipeline-based systems up to 10000 times.Comment: 20 pages, 6 figures. This work is the extended version of arXiv:2101.04226 that appeared in PVLDB'2

    Sharp Curvature of Premolar Resulting in External Apical Root Resorption of the Neighbouring Molar

    Get PDF
    This case report describes an external apical root resorption resulted from the unusual root morphology of the neighbouring tooth. A 28-year-old female was referred to the department of endodontics with a complaint of intense pain in her maxillary second premolar tooth. The clinical and radiographical evaluation revealed an external apical resorption in the mesial root of the maxillary first molar, which shows close proximity to the severely curved root of the premolar. A successful root canal treatment of the premolar was performed using anticurvature filing method. However, molar tooth received no curative treatment. One-year followup of the apical external resorption did not show any progression. External apical root resorption affecting single permanent tooth may be induced from the pressure exerted during the eruption of the adjacent tooth with unusual root morphology. The preferred approach for the management of such apical resorption cases includes long-term observation and no curative treatment

    International competitiveness power and human development of countries

    Get PDF
    Human development should be the ultimate objective of human activity and its aim should be healthier, longer, and fuller lives. It is expected that if the competitiveness of a country is suitably managed, human welfare will be enhanced as a consequence. The research described here seeks to explore the relationship between the competitiveness of a country and its use for human development. For this purpose, 45 countries were evaluated using data envelopment analysis, where the global competitiveness indicators are taken as input variables and the human development index indicators as output variables. A detailed analysis is also conducted for the emerging economies

    Static index pruning in web search engines

    Get PDF
    Static index pruning techniques permanently remove a presumably redundant part of an inverted file, to reduce the file size and query processing time. These techniques differ in deciding which parts of an index can be removed safely; that is, without changing the top-ranked query results. As defined in the literature, the query view of a document is the set of query terms that access to this particular document, that is, retrieves this document among its top results. In this paper, we first propose using query views to improve the quality of the top results compared against the original results. We incorporate query views in a number of static pruning strategies, namely term-centric, document-centric, term popularity based and document access popularity based approaches, and show that the new strategies considerably outperform their counterparts especially for the higher levels of pruning and for both disjunctive and conjunctive query processing. Additionally, we combine the notions of term and document access popularity to form new pruning strategies, and further extend these strategies with the query views. The new strategies improve the result quality especially for the conjunctive query processing, which is the default and most common search mode of a search engine

    A study on technology management process: the parts and components suppliers in the Turkish automotive industry

    Get PDF
    This paper summarizes part of an empirical study on technology management process in the Turkish automotive parts and components industry. In this study, technology management practices in the Turkish automotive parts and components suppliers' sector are described and evaluated. Practices, techniques, and approaches are proposed to improve the level of technology management so as to turn technology into a competitive weapon. The investigation is organized within the framework of a process model for technology management that consists of technology identification, selection, acquisition, exploitation, protection, and abandonment. A comprehensive questionnaire addressing all phases of this process is developed and the results of 21 companies are presented
    corecore