期刊文献+
共找到5,592篇文章
< 1 2 250 >
每页显示 20 50 100
Optimizing Memory Access Efficiency in CUDA Kernel via Data Layout Technique
1
作者 Neda Seifi Abdullah Al-Mamun 《Journal of Computer and Communications》 2024年第5期124-139,共16页
Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these adv... Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these advancements, efficiently programming GPUs remains a daunting challenge, often relying on trial-and-error optimization methods. This paper introduces an optimization technique for CUDA programs through a novel Data Layout strategy, aimed at restructuring memory data arrangement to significantly enhance data access locality. Focusing on the dynamic programming algorithm for chained matrix multiplication—a critical operation across various domains including artificial intelligence (AI), high-performance computing (HPC), and the Internet of Things (IoT)—this technique facilitates more localized access. We specifically illustrate the importance of efficient matrix multiplication in these areas, underscoring the technique’s broader applicability and its potential to address some of the most pressing computational challenges in GPU-accelerated applications. Our findings reveal a remarkable reduction in memory consumption and a substantial 50% decrease in execution time for CUDA programs utilizing this technique, thereby setting a new benchmark for optimization in GPU computing. 展开更多
关键词 data Layout Optimization CUDA Performance Optimization GPU Memory Optimization Dynamic Programming Matrix Multiplication Memory Access pattern Optimization in CUDA
下载PDF
Pattern recognition and data mining software based on artificial neural networks applied to proton transfer in aqueous environments 被引量:2
2
作者 Amani Tahat Jordi Marti +1 位作者 Ali Khwaldeh Kaher Tahat 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第4期410-421,共12页
In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occu... In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occurred' and transfer 'not occurred'. The goal of this paper is to evaluate the use of artificial neural networks in the classification of proton transfer events, based on the feed-forward back propagation neural network, used as a classifier to distinguish between the two transfer cases. In this paper, we use a new developed data mining and pattern recognition tool for automating, controlling, and drawing charts of the output data of an Empirical Valence Bond existing code. The study analyzes the need for pattern recognition in aqueous proton transfer processes and how the learning approach in error back propagation (multilayer perceptron algorithms) could be satisfactorily employed in the present case. We present a tool for pattern recognition and validate the code including a real physical case study. The results of applying the artificial neural networks methodology to crowd patterns based upon selected physical properties (e.g., temperature, density) show the abilities of the network to learn proton transfer patterns corresponding to properties of the aqueous environments, which is in turn proved to be fully compatible with previous proton transfer studies. 展开更多
关键词 pattern recognition proton transfer chart pattern data mining artificial neural network empiricalvalence bond
下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
3
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
下载PDF
Exploring Temporal Activity Patterns of Urban Areas Using Aggregated Network-driven Mobile Phone Data:A Case Study of Wuhu,China 被引量:3
4
作者 ZHANG Shanqi YANG Yu +1 位作者 ZHEN Feng LOBSANG Tashi 《Chinese Geographical Science》 SCIE CSCD 2020年第4期695-709,共15页
The increasing availability of data in the urban context(e.g.,mobile phone,smart card and social media data)allows us to study urban dynamics at much finer temporal resolutions(e.g.,diurnal urban dynamics).Mobile phon... The increasing availability of data in the urban context(e.g.,mobile phone,smart card and social media data)allows us to study urban dynamics at much finer temporal resolutions(e.g.,diurnal urban dynamics).Mobile phone data,for instance,are found to be a useful data source for extracting diurnal human mobility patterns and for understanding urban dynamics.While previous studies often use call detail record(CDR)data,this study deploys aggregated network-driven mobile phone data that may reveal human mobility patterns more comprehensively and can mitigate some of the privacy concerns raised by mobile phone data usage.We first propose an analytical framework for characterizing and classifying urban areas based on their temporal activity patterns extracted from mobile phone data.Specifically,urban areas’diurnal spatiotemporal signatures of human mobility patterns are obtained through longitudinal mobile phone data.Urban areas are then classified based on the obtained signatures.The classification provides insights into city planning and development.Using the proposed framework,a case study was implemented in the city of Wuhu,China to understand its urban dynamics.The empirical study suggests that human activities in the city of Wuhu are highly concentrated at the Traffic Analysis Zone(TAZ)level.This large portion of local activities suggests that development and planning strategies that are different from those used by metropolitan Chinese cities should be applied in the city of Wuhu.This article concludes with discussions on several common challenges associated with using network-driven mobile phone data,which should be addressed in future studies. 展开更多
关键词 mobile phone data human mobility urban travel patterns prefectural-level Chinese city Wuhu
下载PDF
An Efficient Outlier Detection Approach on Weighted Data Stream Based on Minimal Rare Pattern Mining 被引量:1
5
作者 Saihua Cai Ruizhi Sun +2 位作者 Shangbo Hao Sicong Li Gang Yuan 《China Communications》 SCIE CSCD 2019年第10期83-99,共17页
The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional... The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining. 展开更多
关键词 OUTLIER detection WEIGHTED data STREAM MINIMAL WEIGHTED RARE pattern MINING deviation factors
下载PDF
Local binary pattern-based reversible data hiding 被引量:4
6
作者 Monalisa Sahu Neelamadhab Padhy +1 位作者 Sasanko Sekhar Gantayat Aditya Kumar Sahu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第4期695-709,共15页
A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided ... A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP-based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego-image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal-to-noise ratio and structural similarity index,is found to be superior to that of some of the recent and state-of-the-art techniques.In addition,the proposed technique has shown excellent resilience to various stego-attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out-off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed. 展开更多
关键词 hiding capacity(HC) local binary pattern(LBP) peak signal-to-noise ratio(PSNR) reversible data hiding
下载PDF
Wind Speed and Altitude Dependent AMDAR Observational Error and Its Impacts on Data Assimilation and Forecasting 被引量:1
7
作者 陈耀登 周炳君 +1 位作者 陈敏 王元兵 《Journal of Tropical Meteorology》 SCIE 2020年第3期261-274,共14页
Aircraft Meteorological Data Relay(AMDAR)observations have been widely used in numerical weather prediction(NWP)because of its high spatiotemporal resolution.The observational error of AMDAR is influenced by aircraft ... Aircraft Meteorological Data Relay(AMDAR)observations have been widely used in numerical weather prediction(NWP)because of its high spatiotemporal resolution.The observational error of AMDAR is influenced by aircraft flight altitude and atmospheric condition.In this study,the wind speed and altitude dependent observational error of AMDAR is estimated.The statistical results show that the temperature and the observational error in wind speeds slightly decrease as altitude increases,and the observational error in wind speed increases as wind speed increases.Pseudo single AMDAR observation assimilation tests demonstrate that the wind speed and altitude dependent observational error can provide more reasonable analysis increment.Furthermore,to assess the performance of wind speed and altitude dependent observational error on data assimilation and forecasting,two-month 3-hourly cycling data assimilation and forecast experiments based on the Weather Research and Forecasting Model(WRF)and its Data Assimilation system(WRFDA)are performed for the period during 1 September-31 October,2017.The results of the two-month 3-hourly cycling experiments indicate that new observational error improves analysis and forecast of wind field and geo-potential height,and has slight improvements on temperature.The Fractions Skill Score(FSS)of the 6-h accumulated precipitation shows that new wind speed and altitude dependent observational error leads to better precipitation forecast skill than the default observational error in the WRFDA does. 展开更多
关键词 numerical weather prediction data assimilation AMDAR observational error variational assimilation
下载PDF
Multidimensional Visualization of Bikeshare Travel Patterns Using a Visual Data Mining Technique: Data Cubes
8
作者 Xinwei Ma Yanjie Ji +2 位作者 Yang Liu Yuchuan Jin Chenyu Yi 《Journal of Beijing Institute of Technology》 EI CAS 2019年第2期265-277,共13页
In order to explore the travel characteristics and space-time distribution of different groups of bikeshare users,an online analytical processing(OLAP)tool called data cube was used for treating and displaying multi-d... In order to explore the travel characteristics and space-time distribution of different groups of bikeshare users,an online analytical processing(OLAP)tool called data cube was used for treating and displaying multi-dimensional data.We extended and modified the traditionally threedimensional data cube into four dimensions,which are space,date,time,and user,each with a user-specified hierarchy,and took transaction numbers and travel time as two quantitative measures.The results suggest that there are two obvious transaction peaks during the morning and afternoon rush hours on weekdays,while the volume at weekends has an approximate even distribution.Bad weather condition significantly restricts the bikeshare usage.Besides,seamless smartcard users generally take a longer trip than exclusive smartcard users;and non-native users ride faster than native users.These findings not only support the applicability and efficiency of data cube in the field of visualizing massive smartcard data,but also raise equity concerns among bikeshare users with different demographic backgrounds. 展开更多
关键词 bikeshare smartcard data TRAVEL pattern MULTIDIMENSIONAL VISUALIZATION
下载PDF
A Test Pattern Identification Algorithm and Its Application to CINRAD/SA(B) Data
9
作者 JIANG Yuan LIU Liping 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2014年第2期331-343,共13页
A variety of faulty radar echoes may cause serious problems with radar data applications,especially radar data assimilation and quantitative precipitation estimates.In this study,"test pattern" caused by test signal... A variety of faulty radar echoes may cause serious problems with radar data applications,especially radar data assimilation and quantitative precipitation estimates.In this study,"test pattern" caused by test signal or radar hardware failures in CINRAD (China New Generation Weather Radar) SA and SB radar operational observations are investigated.In order to distinguish the test pattern from other types of radar echoes,such as precipitation,clear air and other non-meteorological echoes,five feature parameters including the effective reflectivity data percentage (Rz),velocity RF (range folding) data percentage (RRF),missing velocity data percentage (RM),averaged along-azimuth reflectivity fluctuation (RNr,z) and averaged along-beam reflectivity fluctuation (RNa,z) are proposed.Based on the fuzzy logic method,a test pattern identification algorithm is developed,and the statistical results from all the different kinds of radar echoes indicate the performance of the algorithm.Analysis of two typical cases with heavy precipitation echoes located inside the test pattern are performed.The statistical results show that the test pattern identification algorithm performs well,since the test pattern is recognized in most cases.Besides,the algorithm can effectively remove the test pattern signal and retain strong precipitation echoes in heavy rainfall events. 展开更多
关键词 quality control test pattern fuzzy logic radar data
下载PDF
Detection of Alzheimer’s disease onset using MRI and PET neuroimaging:longitudinal data analysis and machine learning 被引量:2
10
作者 Iroshan Aberathne Don Kulasiri Sandhya Samarasinghe 《Neural Regeneration Research》 SCIE CAS CSCD 2023年第10期2134-2140,共7页
The scientists are dedicated to studying the detection of Alzheimer’s disease onset to find a cure, or at the very least, medication that can slow the progression of the disease. This article explores the effectivene... The scientists are dedicated to studying the detection of Alzheimer’s disease onset to find a cure, or at the very least, medication that can slow the progression of the disease. This article explores the effectiveness of longitudinal data analysis, artificial intelligence, and machine learning approaches based on magnetic resonance imaging and positron emission tomography neuroimaging modalities for progression estimation and the detection of Alzheimer’s disease onset. The significance of feature extraction in highly complex neuroimaging data, identification of vulnerable brain regions, and the determination of the threshold values for plaques, tangles, and neurodegeneration of these regions will extensively be evaluated. Developing automated methods to improve the aforementioned research areas would enable specialists to determine the progression of the disease and find the link between the biomarkers and more accurate detection of Alzheimer’s disease onset. 展开更多
关键词 deep learning image processing linear mixed effect model NEUROIMAGING neuroimaging data sources onset of Alzheimer’s disease detection pattern recognition
下载PDF
Spatial-Temporal Features of Wuhan Urban Agglomeration Regional Development Pattern—Based on DMSP/OLS Night Light Data
11
作者 Mengjie Zhang Wenwei Miao +2 位作者 Yingpin Yang Chong Peng Yaping Huang 《Journal of Building Construction and Planning Research》 2017年第1期14-29,共16页
Based on the night light data, urban area data, and economic data of Wuhan Urban Agglomeration from 2009 to 2015, we use spatial correlation dimension, spatial self-correlation analysis and weighted standard deviation... Based on the night light data, urban area data, and economic data of Wuhan Urban Agglomeration from 2009 to 2015, we use spatial correlation dimension, spatial self-correlation analysis and weighted standard deviation ellipse to identify the general characteristics and dynamic evolution characteristics of urban spatial pattern and economic disparity pattern. The research results prove that: between 2009 and 2013, Wuhan Urban Agglomeration expanded gradually from northwest to southeast and presented the dynamic evolution features of “along the river and the road”. The spatial structure is obvious, forming the pattern of “core-periphery”. The development of Wuhan Urban Agglomeration has obvious imbalance in economic geography space, presenting the development tendency of “One prominent, stronger in the west and weaker in the east”. The contract within Wuhan Urban Agglomeration is gradually decreased. Wuhan city and its surrounding areas have stronger economic growth strength as well as the cities along The Yangtze River. However, the relative development rate of Wuhan city area is still far higher than other cities and counties. 展开更多
关键词 NIGHT LIGHT data URBAN Spatial pattern Economic DISPARITY pattern Wuhan URBAN Agglomeration
下载PDF
Design and Implementation of Novel Precision Internet Marketing Patterns under the Big Data and Cloud Environment 被引量:1
12
作者 Zaixia HAN 《International Journal of Technology Management》 2015年第7期86-88,共3页
关键词 网络广告 营销模式 环境 用户访问 设计 动态网页 静态页面 企业营销
下载PDF
Distribution Pattern of Urban Housing Price Based on Multiple Big Data:A Case Study of Beijing,Shanghai,Guangzhou,and Wuhan
13
作者 LIN Yichen WANG Li +2 位作者 LIU Yating GONG Yue XU Jingyi 《Journal of Landscape Research》 2021年第4期57-61,66,共6页
The housing price has been paid close attention by people in all walks of life,and the development of big data provides a new data environment for the study of urban housing price.Housing price data of four national c... The housing price has been paid close attention by people in all walks of life,and the development of big data provides a new data environment for the study of urban housing price.Housing price data of four national central cities (Beijing,Shanghai,Guangzhou and Wuhan) are taken as research samples.With the help of software GIS,exploratory spatial data analysis method is used to depict the spatial distribution pattern of urban housing price,and commonness and difference of spatial distribution of housing price are explored.The conclusions are as below:①regional imbalance of housing price in national central cities is significant.②Spatial distribution of urban housing price in Beijing,Shanghai,Guangzhou and Wuhan presents a polycentric pattern,and there is obvious spatial agglomeration.③The internal change of housing price in different cities has significant spatial difference.Beijing,Shanghai,Guangzhou and Wuhan are taken as typical city samples for research,with reference and practical significance,which could help to effectively predict spatial development trend of housing prices in other first and second tier cities.The research aims to provide certain reference for the government implementing real estate control policies according to local conditions,project location and reasonable pricing of real estate developers. 展开更多
关键词 Multiple big data BEIJING SHANGHAI Guangzhou and Wuhan Urban housing price Distribution pattern
下载PDF
Research on the Modern Precision E-commerce Marketing Model under the Big Data and Pattern Recognition Background
14
作者 Junhua Wang 《International Journal of Technology Management》 2016年第6期51-53,共3页
In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp ... In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp the user consumption pattern and the basis of the electric business enterprise through the use of big data can be personalized, accurate and intelligent advertising push service, service mode for the creation of more interesting and effective. Under this basis, electricity companies can also pass the assurance of pair of big data, looking for better increase user stickiness, development of new products and services, the ways and methods to reduce operational costs and accordingly, we propose the novel perspectives on the corresponding issues for the systematic level enhancement that provides the novel methodology of precision e-commerce marketing. 展开更多
关键词 E-COMMERCE MARKETING BIG data pattern Recognition PRECISION BACKGROUND
下载PDF
5-33 Design Pattern in Data Acquisition Monitor System for HIMM Power Supply
15
作者 Wang Qiang Yang Feng Zhao Dongsheng 《IMP & HIRFL Annual Report》 2014年第1期243-243,共1页
In Heavy-Ion Medical Machine (HIMM), it is very necessary to monitor the power supply's current value bythe data acquisition The hardware of the data acquisition monitor system is NI PXIe-6366 DAQ card, which has1... In Heavy-Ion Medical Machine (HIMM), it is very necessary to monitor the power supply's current value bythe data acquisition The hardware of the data acquisition monitor system is NI PXIe-6366 DAQ card, which has16-bits resolution, 8 differential channels, 2MS/s per channel's sample rate, and also has a good synchronizationperformance. The hardware architecture is shown in Fig. 1. 展开更多
关键词 DESIGN pattern data
下载PDF
Determination of Causal Effect in Observational Studies: Analysis of Correlated Data with Binary End-Points 被引量:1
16
作者 Maupi Eric Letsoalo Maseka Lesaoana 《Journal of Mathematics and System Science》 2012年第2期119-125,共7页
关键词 因果关系 观测 二元 LOGISTIC回归 测定 逻辑回归模型 卡方检验 线性模型
下载PDF
Relational Logging Design Pattern
17
作者 Savas Takan Gokmen Katipoglu 《Computers, Materials & Continua》 SCIE EI 2023年第4期51-65,共15页
Observability and traceability of developed software are crucial to its success in software engineering.Observability is the ability to comprehend a system’s internal state from the outside.Monitoring is used to dete... Observability and traceability of developed software are crucial to its success in software engineering.Observability is the ability to comprehend a system’s internal state from the outside.Monitoring is used to determine what causes system problems and why.Logs are among the most critical technology to guarantee observability and traceability.Logs are frequently used to investigate software events.In current log technologies,software events are processed independently of each other.Consequently,current logging technologies do not reveal relationships.However,system events do not occur independently of one another.With this perspective,our research has produced a new log design pattern that displays the relationships between events.In the design we have developed,the hash mechanism of blockchain technology enables the display of the logs’relationships.The created design pattern was compared to blockchain technology,demonstrating its performance through scenarios.It has been determined that the recommended log design pattern outperforms blockchain technology in terms of time and space for software engineering observability and traceability.In this context,it is anticipated that the log design pattern we provide will strengthen the methods used to monitor software projects and ensure the traceability of relationships. 展开更多
关键词 Blockchain LOGGING software engineering data structure design pattern
下载PDF
Numerical Comparison of Shapeless Radial Basis Function Networks in Pattern Recognition
18
作者 Sunisa Tavaen Sayan Kaennakham 《Computers, Materials & Continua》 SCIE EI 2023年第2期4081-4098,共18页
This work focuses on radial basis functions containing no parameters with themain objective being to comparatively explore more of their effectiveness.For this,a total of sixteen forms of shapeless radial basis functi... This work focuses on radial basis functions containing no parameters with themain objective being to comparatively explore more of their effectiveness.For this,a total of sixteen forms of shapeless radial basis functions are gathered and investigated under the context of the pattern recognition problem through the structure of radial basis function neural networks,with the use of the Representational Capability(RC)algorithm.Different sizes of datasets are disturbed with noise before being imported into the algorithm as‘training/testing’datasets.Each shapeless radial basis function is monitored carefully with effectiveness criteria including accuracy,condition number(of the interpolation matrix),CPU time,CPU-storage requirement,underfitting and overfitting aspects,and the number of centres being generated.For the sake of comparison,the well-known Multiquadric-radial basis function is included as a representative of shape-contained radial basis functions.The numerical results have revealed that some forms of shapeless radial basis functions show good potential and are even better than Multiquadric itself indicating strongly that the future use of radial basis function may no longer face the pain of choosing a proper shape when shapeless forms may be equally(or even better)effective. 展开更多
关键词 Shapeless RBF-neural networks pattern recognition large scattered data
下载PDF
SWFP-Miner: an efficient algorithm for mining weighted frequent pattern over data streams
19
作者 Wang Jie Zeng Yu 《High Technology Letters》 EI CAS 2012年第3期289-294,共6页
关键词 频繁模式挖掘 挖掘算法 数据流 加权 矿工 滑动窗口 剪枝策略 WFP
下载PDF
Mining Time Pattern Association Rules in Temporal Database
20
作者 Nguyen Dinh Thuan 《通讯和计算机(中英文版)》 2010年第3期50-56,共7页
关键词 挖掘关联规则 时间模式 时态数据库 大型数据库 时间间隔 优化技术 验算法
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部