197 research outputs found
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network tra c data, and stock market. Data streams consist of mostly numeric data but what is more interesting is the events derived from the numerical data that need to be monitored. The events obtained from streaming data form event streams. Event streams have similar properties to data streams, i.e., they are seen only once in a fixed order as a continuous stream. Events appearing in the event stream have time stamps associated with them in a certain time granularity, such as second, minute, or hour. One type of frequently asked queries over event streams is count queries, i.e., the frequency of an event occurrence over time. Count queries can be answered over event streams easily, however, users may ask queries over di erent time granularities as well. For example, a broker may ask how many times a stock increased in the same time frame, where the time frames specified could be hour, day, or both. This is crucial especially in the case of event streams where only a window of an event stream is available at a certain time instead of the whole stream. In this paper, we propose a technique for predicting the frequencies of event occurrences in event streams at multiple time granularities. The proposed approximation method e ciently estimates the count of events with a high accuracy in an event stream at any time granularity by examining the distance distributions of event occurrences. The proposed method has been implemented and tested on di erent real data sets and the results obtained are presented to show its e ectiveness
Wireless model-based predictive networked control system over cooperative wireless network
Owing to their distributed architecture, networked control systems (NCSs) are proven to be feasible in scenarios where a spatially distributed feedback control system is required. Traditionally, such NCSs operate over real-time wired networks. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment, and maintainability, wireless networks such as IEEE 802.11 wireless local area networks (LANs) are being preferred over dedicated wired networks. However, conventional NCSs with event-triggered controllers and actuators cannot operate over such general purpose wireless networks since the stability of the system is compromised due to unbounded delays and unpredictable packet losses that are typical in the wireless medium. Approaching the wireless networked control problem from two perspectives, this work introduces a practical wireless NCS and an implementation of a cooperative medium access control protocol that work jointly to achieve decent control under severe impairments, such as unbounded delay, bursts of packet loss and ambient wireless traffic. The proposed system is evaluated on a dedicated test platform under numerous scenarios and significant performance gains are observed, making cooperative communications a strong candidate for improving the reliability of industrial wireless networks
Congestion control in interconnected computer networks
Ankara : The Department of Computer Engineering and Information Sciences and the Institute of Engineering and Sciences of Bilkent Univ. , 1988.Thesis (Master's) -- Bilkent University, 1988.Includes bibliographical references leaves 62-65.A computer network has a collection of resources shared by multiple users.
The capacity of the resources is limited, and if the user demands exceed the
capacity, the network becomes ’congested’. The congestion causes a degradation
in system performance. In interconnected networks there are two classes
of traffic within a network. One class is the local traffic that is generated and
transmitted within the network. The other class is the internetwork traffic
transmitted to or from other networks. In this thesis, the effect of internetwork
traffic on the performance of a network is investigated. Computer
simulation of an interconnected network model is provided in order to evaluate
the effectiveness of a window-based congestion control mechanism on
preventing congestion in gateways and in attached networks caused by the
overload of internetwork traffic. Also two dynamic window congestion control
algorithms are provided and studied. These algorithms provide further
control to window mechanism by adjusting the window size in accordance
with the availability of the network resources at the destination. Dynamic
algorithms are evaluated comparing them with static window control.Ulusoy, ÖzgürM.S
xDBTagger: Explainable Natural Language Interface to Databases Using Keyword Mappings and Schema Graph
Translating natural language queries (NLQ) into structured query language
(SQL) in interfaces to relational databases is a challenging task that has been
widely studied by researchers from both the database and natural language
processing communities. Numerous works have been proposed to attack the natural
language interfaces to databases (NLIDB) problem either as a conventional
pipeline-based or an end-to-end deep-learning-based solution. Nevertheless,
regardless of the approach preferred, such solutions exhibit black-box nature,
which makes it difficult for potential users targeted by these systems to
comprehend the decisions made to produce the translated SQL. To this end, we
propose xDBTagger, an explainable hybrid translation pipeline that explains the
decisions made along the way to the user both textually and visually. We also
evaluate xDBTagger quantitatively in three real-world relational databases. The
evaluation results indicate that in addition to being fully interpretable,
xDBTagger is effective in terms of accuracy and translates the queries more
efficiently compared to other state-of-the-art pipeline-based systems up to
10000 times.Comment: 20 pages, 6 figures. This work is the extended version of
arXiv:2101.04226 that appeared in PVLDB'2
Sharp Curvature of Premolar Resulting in External Apical Root Resorption of the Neighbouring Molar
This case report describes an external apical root resorption resulted from the unusual root morphology of the neighbouring tooth. A 28-year-old female was referred to the department of endodontics with a complaint of intense pain in her maxillary second premolar tooth. The clinical and radiographical evaluation revealed an external apical resorption in the mesial root of the maxillary first molar, which shows close proximity to the severely curved root of the premolar. A successful root canal treatment of the premolar was performed using anticurvature filing method. However, molar tooth received no curative treatment. One-year followup of the apical external resorption did not show any progression. External apical root resorption affecting single permanent tooth may be induced from the pressure exerted during the eruption of the adjacent tooth with unusual root morphology. The preferred approach for the management of such apical resorption cases includes long-term observation and no curative treatment
International competitiveness power and human development of countries
Human development should be the ultimate objective of human activity and its aim should be healthier, longer, and fuller lives. It is expected that if the competitiveness of a country is suitably managed, human welfare will be enhanced as a consequence. The research described here seeks to explore the relationship between the competitiveness of a country and its use for human development. For this purpose, 45 countries were evaluated using data envelopment analysis, where
the global competitiveness indicators are taken as input variables and the human development index indicators as output variables. A detailed analysis is also conducted for the emerging economies
Static index pruning in web search engines
Static index pruning techniques permanently remove a presumably redundant part of an inverted file, to reduce the file size and query processing time. These techniques differ in deciding which parts of an index can be removed safely; that is, without changing the top-ranked query results. As defined in the literature, the query view of a document is the set of query terms that access to this particular document, that is, retrieves this document among its top results. In this paper, we first propose using query views to improve the quality of the top results compared against the original results. We incorporate query views in a number of static pruning strategies, namely term-centric, document-centric, term popularity based and document access popularity based approaches, and show that the new strategies considerably outperform their counterparts especially for the higher levels of pruning and for both disjunctive and conjunctive query processing. Additionally, we combine the notions of term and document access popularity to form new pruning strategies, and further extend these strategies with the query views. The new strategies improve the result quality especially for the conjunctive query processing, which is the default and most common search mode of a search engine
A study on technology management process: the parts and components suppliers in the Turkish automotive industry
This paper summarizes part of an empirical study on technology management process in the Turkish automotive parts and components industry. In this study, technology management practices in the Turkish automotive parts and components suppliers' sector are described and evaluated. Practices, techniques, and approaches are proposed to improve the level of technology management so as to turn technology into a competitive weapon. The investigation is organized within the framework of a process model for technology management that consists of technology identification, selection, acquisition, exploitation, protection, and abandonment. A comprehensive questionnaire addressing all phases of this process is developed and the results of 21 companies are presented
- …