期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Service Composition Approach Based on Sequence Mining for Migrating E-learning Legacy System to SOA 被引量:1
1
作者 Zhuo Zhang Dong-Dai Zhou +1 位作者 Hong-Ji Yang Shao-Chun Zhong 《International Journal of Automation and computing》 EI 2010年第4期584-595,共12页
With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there e... With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach. 展开更多
关键词 Service composition E-LEARNING sequence mining algorithm service-oriented architecture (SOA) legacy system
下载PDF
Optimal mining sequence for coal faces under a bedding slope:insight from landslide prevention
2
作者 LI Qingmiao ZHAO Jianjun +3 位作者 LI Zhichao DENG Jie ZUO Jing LAI Qiyi 《Journal of Mountain Science》 SCIE CSCD 2024年第5期1775-1798,共24页
Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in p... Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes. 展开更多
关键词 Bedding rock landslides mining-induced deformation Bedding slope stability Underground mining sequences Fractal-based strength reduction method
下载PDF
Stability analysis of backflling in subsiding area and optimization of the stoping sequence 被引量:7
3
作者 Ping Wang Huiqiang Li +1 位作者 Yan Li Bo Cheng 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2013年第6期478-485,共8页
In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the... In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the subsiding area. In this paper, taking Zhangfushan iron mine as an example, the ore body and the general layout are focused on the safety of backflling of mined-out area. Then, we use the ANSYS software to construct a three-dimensional(3D) model for the mining area in the Zhangfushan iron mine. According to the simulation results of the initial mining stages, the ore body is stoped step by step as suggested in the design. The stability of the backflling is back analyzed based on the monitored displacements, considering the stress distribution to optimize the stoping sequence. The simulations show that a reasonable stoping sequence can minimize the concentration of high compressive stress and ensure the safety of stoping of the ore body. 展开更多
关键词 mining engineering Backflling body Numerical simulations Stability analysis Stoping sequence optimization
下载PDF
Abnormal Event Correlation and Detection Based on Network Big Data Analysis 被引量:2
4
作者 Zhichao Hu Xiangzhan Yu +1 位作者 Jiantao Shi Lin Ye 《Computers, Materials & Continua》 SCIE EI 2021年第10期695-711,共17页
With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack p... With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction. 展开更多
关键词 Attack scene false positive alarm correlation sequence mining multi-step attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部