Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP,...Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.展开更多
One research crucial to wider adoption of Radio Frequency Identification (RFID) technology is how to efficiently transform sequences of RFID readings into meaningful business events. Contrary to traditional events, ...One research crucial to wider adoption of Radio Frequency Identification (RFID) technology is how to efficiently transform sequences of RFID readings into meaningful business events. Contrary to traditional events, RFID readings are usually of high volume and velocity, and have the attributes representing their reading objects, occurrence times and spots. Based on these characteristics and the Non-deterministic Finite Automata (NFA) implementation framework, this paper studies the performance issues of RFID complex event processing and proposes corresponding optimization techniques. Our techniques include: (1) taking advantage of negation events or exclusiveness between events to prune intermediate results, thus reduces memory consumption; (2) with different selectivities of complex events, purposefully reordering the join operations between events to improve overall efficiency, achieve higher stream throughput; (3) utilizing the slot-based or B+-tree-based approach to optimizing the processing performance with the time window constraint. We present the analytical results of these techniques and validate their effectiveness through experiments.展开更多
In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but arrive ...In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but arrive at the central server out of order, due to the differences of network latencies. Most state-of-the-art techniques process out-of-order events by buffering the events until the total event order within a specified range can be guaranteed. Their main problems are leading to increasing response time and reducing system throughput. This paper aims to build a high performance out-of- order event processing mechanism, which can match events as soon as they arrive instead of buffering them till all arrive. A suffix-automaton-based event matching algorithm is proposed to speed up query processing, and a confidence-based accuracy evaluation is proposed to control the query result quality. The performance of our approach is evaluated through detailed accuracy and response time analysis. As experimental results show, our approach can obviously speed up the query matching time and produce reasonable query results.展开更多
Radio frequency identification(RFID) enabled retail store management needs workflow optimization to facilitate real-time decision making. In this paper, complex event processing(CEP) based RFID-enabled retail store ma...Radio frequency identification(RFID) enabled retail store management needs workflow optimization to facilitate real-time decision making. In this paper, complex event processing(CEP) based RFID-enabled retail store management is studied, particularly focusing on automated shelf replenishment decisions. We define different types of event queries to describe retailer store workflow action over the RFID data streams on multiple tagging levels(e.g., item level and container level). Non-deterministic finite automata(NFA)based evaluation models are used to detect event patterns. To manage pattern match results in the process of event detection, optimization algorithm is applied in the event model to share event detection results. A simulated RFID-enabled retail store is used to verify the effectiveness of the method, experiment results show that the algorithm is effective and could optimize retail store management workflow.展开更多
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle...Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.展开更多
The fabrication process dependent effects on single event effects (SEEs) are investigated in a commercial silicon- germanium heterojunction bipolar transistor (SiGe HBT) using three-dimensional (3D) TCAD simulat...The fabrication process dependent effects on single event effects (SEEs) are investigated in a commercial silicon- germanium heterojunction bipolar transistor (SiGe HBT) using three-dimensional (3D) TCAD simulations. The influences of device structure and doping concentration on SEEs are discussed via analysis of current transient and charge collection induced by ions strike. The results show that the SEEs representation of current transient is different from representation of the charge collection for the same process parameters. To be specific, the area of C/S junction is the key parameter that affects charge collection of SEE. Both current transient and charge collection are dependent on the doping of collector and substrate. The base doping slightly influences transient currents of base, emitter, and collector terminals. However, the SEEs of SiGe HBT are hardly affected by the doping of epitaxial base and the content of Ge.展开更多
Two types of persistent heavy rainfall events (PHREs) over the Yangtze River-Huaihe River Basin were determined in a recent statistical study: type A, whose precipitation is mainly located to the south of the Yangt...Two types of persistent heavy rainfall events (PHREs) over the Yangtze River-Huaihe River Basin were determined in a recent statistical study: type A, whose precipitation is mainly located to the south of the Yangtze River; and type B, whose precipitation is mainly located to the north of the river. The present study investigated these two PHRE types using a newly derived set of energy equations to show the scale interaction and main energy paths contributing to the persistence of the precipitation. The main results were as follows. The available potential energy (APE) and kinetic energy (KE) associated with both PHRE types generally increased upward in the troposphere, with the energy of the type-A PHREs stronger than that of the type-B PHREs (except for in the middle troposphere). There were two main common and universal energy paths of the two PHRE types: (1) the baroclinic energy conversion from APE to KE was the dominant energy source for the evolution of large-scale background circulations; and (2) the downscaled energy cascade processes of KE and APE were vital for sustaining the eddy flow, which directly caused the PHREs. The significant differences between the two PHRE types mainly appeared in the lower troposphere, where the baroclinic energy conversion associated with the eddy flow in type-A PHREs was from KE to APE, which reduced the intensity of the precipitation-related eddy flow; whereas, the conversion in type-B PHREs was from APE to KE, which enhanced the eddy flow.展开更多
This paper emphasizes that the interactive constraints of geology and isotopic dating is the best approach to construct the geological event sequence, and has compiled 106 data of reasonable isotopic ages for the igne...This paper emphasizes that the interactive constraints of geology and isotopic dating is the best approach to construct the geological event sequence, and has compiled 106 data of reasonable isotopic ages for the igneous rocks of the Yanshan belt. We propose a sequence of mgmatic-tectonic events in the Jurassic-Cretaceous Yanshan orogen of North China. Five orogenic episodes are divided, (1) pre-and initial orogenic episode (Early Jurassic); (2) early orogenic episode (Middle Jurassic); (3) peak orogenic episode (Late Jurassic); (4) late orogenic episode (early Early Cretaceous), and (5) post-orogenic episode. Each episode is a short cycle, all of the orogenic processes construct a longer cycle, and they, in general, followed a counter-clockwise (ccw) PTt path. Finally, it is suggested that the Yanshanian movement was so intensive that the magmatism and tectonic deformation had involved all the lithosphere thickness and the late-Achaean-formed cratonic lithosphere had been significantly reworked.展开更多
Business processes described by formal or semi-formal models are realized via information systems.Event logs generated from these systems are probably not consistent with the existing models due to insufficient design...Business processes described by formal or semi-formal models are realized via information systems.Event logs generated from these systems are probably not consistent with the existing models due to insufficient design of the information system or the system upgrade.By comparing an existing process model with event logs,we can detect inconsistencies called deviations,verify and extend the business process model,and accordingly improve the business process.In this paper,some abnormal activities in business processes are formally defined based on Petri nets.An efficient approach to detect deviations between the process model and event logs is proposed.Then,business process models are revised when abnormal activities exist.A clinical process in a healthcare information system is used as a case study to illustrate our work.Experimental results show the effectiveness and efficiency of the proposed approach.展开更多
Phase synchronization clustering method is used to detect the process of extreme weather events rather than extreme values events mathematically. The applicability is discussed from the aspects of noise intensity and ...Phase synchronization clustering method is used to detect the process of extreme weather events rather than extreme values events mathematically. The applicability is discussed from the aspects of noise intensity and sequence length and the observed data are applied practically. The detection process shows that clustering measure difference can detect the temporal process objectively to a certain degree and it has certain application to detect the temporal process of extreme weather events.展开更多
This study sought to test the processing of three types of sentences in Chinese, as correct sentences, semantic violation sentences, and sentences containing semantic and syntactic violations, based on the following s...This study sought to test the processing of three types of sentences in Chinese, as correct sentences, semantic violation sentences, and sentences containing semantic and syntactic violations, based on the following sentence pattern: "subject (noun) + yi/gang/zheng + predicate (verb)". Event-related potentials on the scalp were recorded using 32-channel electroencephalography. Compared with correct sentences, target words elicited an early left anterior negativity (N400) and a later positivity (P600) over frontal, central and temporal sites in sentences involving semantic violations. In addition, when sentences contained both semantic and syntactic violations, the target words elicited a greater N400 and P600 distributed in posterior brain areas. These results indicate that Chinese sentence comprehension involves covert grammar processes.展开更多
The goal of this paper is to provide an approach to investigate the variation of fiber quantity in a certain cross-section of the drafting zone. This model with discrete-event simulation( DES)method was presented to s...The goal of this paper is to provide an approach to investigate the variation of fiber quantity in a certain cross-section of the drafting zone. This model with discrete-event simulation( DES)method was presented to simulate the dynamic drafting process. This model described the behavior of individual fibers,which was divided into four phases and simulated by corresponding modules. Three sets of processing conditions in industry were simulated and demonstrated the applications of this model. The comparison between experiments and simulation results could also validate this model. This model could be used to simulate various drafting process with appropriate drafting settings.展开更多
Multimedia Sensor Networks(MSNs)have enhanced the ability to analyze the environment and provide responses based on its current status.Generally,MSNs are composed of scalar and multimedia sensors that have fixed locat...Multimedia Sensor Networks(MSNs)have enhanced the ability to analyze the environment and provide responses based on its current status.Generally,MSNs are composed of scalar and multimedia sensors that have fixed locations.However,given the advancement of smart mobile device technologies,it is currently possible to dynamically integrate mobile sensors into MSNs.In this paper,we propose a formal platform to manage MSNs and the data gathered from them to detect complex events.Our main contributions include:M^(2)SSN-Onto,a Mobile and Multimedia Semantic Sensor Networks Ontology;Py-CEMiD,an engine for detecting complex events and generate reactions to them;a mobile device location engine to locate mobile sensors;and a proof-of-concept in the context of detecting emergency situations in smart buildings.Several scenarios are validated for emergency events,combining simulated sensor measurements with real measurements of mobile devices.Results show complex events can be detected in near real time(less than 1 s).展开更多
The express delivery induslry of China is relatively backward in the automation degree of critical business processes. The basic reason is that the business-related supporting data, which is scattered in the multidime...The express delivery induslry of China is relatively backward in the automation degree of critical business processes. The basic reason is that the business-related supporting data, which is scattered in the multidimensional space, is difficult to utilize and process. This paper proposes an automatic data acquisition fi-amework to resolve such difficulty, which synthetically utilize intelligent inemet of things (IoT), semantic web and complext event processing (CEP) technology. We also implement a SCEP prototype system with the capability of real-time detecting complex business events on the goods sorting line, which adopts a detection method consisting of four stages. The simulation results show that the system has good performance and feasible enough to deal with the complex business which need data support fTom multidimensional space.展开更多
Our study area covered the Eastern Himalayan Syntaxis (EHS) and its southern extension (Hengduan Mountain or western Sichuan and Yunnan (WSY)) which is located at the orthogonal and oblique collisional front between I...Our study area covered the Eastern Himalayan Syntaxis (EHS) and its southern extension (Hengduan Mountain or western Sichuan and Yunnan (WSY)) which is located at the orthogonal and oblique collisional front between Indian and Asian continents during Cenozoic.Based on geometric and kinematic mapping of the major boundary or regional faults (Dongjug—Mainling(1), Anigiao(2) and Jali(3), Guyu(4) faults in EHS, Ailaoshan—Red River(5), Lancangjiang(6), Gaoligong(7), Binlangjiang(8) and Magok(9) faults in WSY) (see Fig.1), especially on abundant geochronological dating of the mylonitic rocks along these faults, and coupled with magmato\|metamorphic sequences of this region, we try to deal with the temporal and spatial relationships of collisional process to answer questions such as: (1) when did collision start ? (2) is thrusting as a initial and dominant deformation mode to absorb the crustal shortening after suturing, or earlier thrusting usually followed by large\|scale strike\|slip faults? (3) are the two structural patterns coeval at times, or do they occur alternatively during deformation history? (4) are the collisional and associate uplift processes a continuous one or periodic? Insight into such questions is crucial for better understanding of the continental deformation and testing the models available or constraining a new one.展开更多
The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they rece...The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format.展开更多
Based on the El Nino event data sequence from 1854 to 1993, the nature of sequences was de-termined by using statistical normal and independent tests, etc. With the Markov random process and first order auto-regressio...Based on the El Nino event data sequence from 1854 to 1993, the nature of sequences was de-termined by using statistical normal and independent tests, etc. With the Markov random process and first order auto-regression predictive model, we set up the prognostication mode and give the time limit of the occurrence of next El Nino event, which probably occurs around 2002.The occurring probability for 2001 is 44 %, and it is 61 % for 2002.展开更多
文摘Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.
基金supported by the National Natural Science Foundation of China under Grant No.60720106001
文摘One research crucial to wider adoption of Radio Frequency Identification (RFID) technology is how to efficiently transform sequences of RFID readings into meaningful business events. Contrary to traditional events, RFID readings are usually of high volume and velocity, and have the attributes representing their reading objects, occurrence times and spots. Based on these characteristics and the Non-deterministic Finite Automata (NFA) implementation framework, this paper studies the performance issues of RFID complex event processing and proposes corresponding optimization techniques. Our techniques include: (1) taking advantage of negation events or exclusiveness between events to prune intermediate results, thus reduces memory consumption; (2) with different selectivities of complex events, purposefully reordering the join operations between events to improve overall efficiency, achieve higher stream throughput; (3) utilizing the slot-based or B+-tree-based approach to optimizing the processing performance with the time window constraint. We present the analytical results of these techniques and validate their effectiveness through experiments.
基金supported by the National Natural Science Foundation of China under Grant Nos.61003058,60933001the Fundamental Research Funds for the Central Universities under Grant No.N090104001
文摘In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but arrive at the central server out of order, due to the differences of network latencies. Most state-of-the-art techniques process out-of-order events by buffering the events until the total event order within a specified range can be guaranteed. Their main problems are leading to increasing response time and reducing system throughput. This paper aims to build a high performance out-of- order event processing mechanism, which can match events as soon as they arrive instead of buffering them till all arrive. A suffix-automaton-based event matching algorithm is proposed to speed up query processing, and a confidence-based accuracy evaluation is proposed to control the query result quality. The performance of our approach is evaluated through detailed accuracy and response time analysis. As experimental results show, our approach can obviously speed up the query matching time and produce reasonable query results.
基金supported by National Social Science Fund (No. 16CTQ013)the Application Fundamental Research Foundation of Sichuan Province, China (No. 2017JY0011)the Key Project of Sichuan Provincial Department of Education, China (No. 2017GZ0333)
文摘Radio frequency identification(RFID) enabled retail store management needs workflow optimization to facilitate real-time decision making. In this paper, complex event processing(CEP) based RFID-enabled retail store management is studied, particularly focusing on automated shelf replenishment decisions. We define different types of event queries to describe retailer store workflow action over the RFID data streams on multiple tagging levels(e.g., item level and container level). Non-deterministic finite automata(NFA)based evaluation models are used to detect event patterns. To manage pattern match results in the process of event detection, optimization algorithm is applied in the event model to share event detection results. A simulated RFID-enabled retail store is used to verify the effectiveness of the method, experiment results show that the algorithm is effective and could optimize retail store management workflow.
文摘Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.
基金supported by the National Natural Science Foundation of China(Grant Nos.61274106,11175138,and 61601352)
文摘The fabrication process dependent effects on single event effects (SEEs) are investigated in a commercial silicon- germanium heterojunction bipolar transistor (SiGe HBT) using three-dimensional (3D) TCAD simulations. The influences of device structure and doping concentration on SEEs are discussed via analysis of current transient and charge collection induced by ions strike. The results show that the SEEs representation of current transient is different from representation of the charge collection for the same process parameters. To be specific, the area of C/S junction is the key parameter that affects charge collection of SEE. Both current transient and charge collection are dependent on the doping of collector and substrate. The base doping slightly influences transient currents of base, emitter, and collector terminals. However, the SEEs of SiGe HBT are hardly affected by the doping of epitaxial base and the content of Ge.
基金supported by the National Key Basic Research and Development Project of China(Grant No.2012CB417201)the National Natural Science Foundation of China(Grant Nos.41375053 and 41505038)
文摘Two types of persistent heavy rainfall events (PHREs) over the Yangtze River-Huaihe River Basin were determined in a recent statistical study: type A, whose precipitation is mainly located to the south of the Yangtze River; and type B, whose precipitation is mainly located to the north of the river. The present study investigated these two PHRE types using a newly derived set of energy equations to show the scale interaction and main energy paths contributing to the persistence of the precipitation. The main results were as follows. The available potential energy (APE) and kinetic energy (KE) associated with both PHRE types generally increased upward in the troposphere, with the energy of the type-A PHREs stronger than that of the type-B PHREs (except for in the middle troposphere). There were two main common and universal energy paths of the two PHRE types: (1) the baroclinic energy conversion from APE to KE was the dominant energy source for the evolution of large-scale background circulations; and (2) the downscaled energy cascade processes of KE and APE were vital for sustaining the eddy flow, which directly caused the PHREs. The significant differences between the two PHRE types mainly appeared in the lower troposphere, where the baroclinic energy conversion associated with the eddy flow in type-A PHREs was from KE to APE, which reduced the intensity of the precipitation-related eddy flow; whereas, the conversion in type-B PHREs was from APE to KE, which enhanced the eddy flow.
文摘This paper emphasizes that the interactive constraints of geology and isotopic dating is the best approach to construct the geological event sequence, and has compiled 106 data of reasonable isotopic ages for the igneous rocks of the Yanshan belt. We propose a sequence of mgmatic-tectonic events in the Jurassic-Cretaceous Yanshan orogen of North China. Five orogenic episodes are divided, (1) pre-and initial orogenic episode (Early Jurassic); (2) early orogenic episode (Middle Jurassic); (3) peak orogenic episode (Late Jurassic); (4) late orogenic episode (early Early Cretaceous), and (5) post-orogenic episode. Each episode is a short cycle, all of the orogenic processes construct a longer cycle, and they, in general, followed a counter-clockwise (ccw) PTt path. Finally, it is suggested that the Yanshanian movement was so intensive that the magmatism and tectonic deformation had involved all the lithosphere thickness and the late-Achaean-formed cratonic lithosphere had been significantly reworked.
基金supported by the National Natural Science Foundation of China(61170078,61472228,61903229,61902222)the “Taishan Scholar” Construction Project of Shandong Province,China,the Natural Science Foundation of Shandong Province(ZR2018MF001)+1 种基金the Scientific Research Foundation of Shandong University of Science and Technology for Recruited Talents(2017RCJJ044)the Key Research and Development Program of Shandong Province(2018GGX101011)
文摘Business processes described by formal or semi-formal models are realized via information systems.Event logs generated from these systems are probably not consistent with the existing models due to insufficient design of the information system or the system upgrade.By comparing an existing process model with event logs,we can detect inconsistencies called deviations,verify and extend the business process model,and accordingly improve the business process.In this paper,some abnormal activities in business processes are formally defined based on Petri nets.An efficient approach to detect deviations between the process model and event logs is proposed.Then,business process models are revised when abnormal activities exist.A clinical process in a healthcare information system is used as a case study to illustrate our work.Experimental results show the effectiveness and efficiency of the proposed approach.
文摘Phase synchronization clustering method is used to detect the process of extreme weather events rather than extreme values events mathematically. The applicability is discussed from the aspects of noise intensity and sequence length and the observed data are applied practically. The detection process shows that clustering measure difference can detect the temporal process objectively to a certain degree and it has certain application to detect the temporal process of extreme weather events.
基金the Foundation of National Social Sciences hosted by Professor Huanhai Fang, No. 03BYY013
文摘This study sought to test the processing of three types of sentences in Chinese, as correct sentences, semantic violation sentences, and sentences containing semantic and syntactic violations, based on the following sentence pattern: "subject (noun) + yi/gang/zheng + predicate (verb)". Event-related potentials on the scalp were recorded using 32-channel electroencephalography. Compared with correct sentences, target words elicited an early left anterior negativity (N400) and a later positivity (P600) over frontal, central and temporal sites in sentences involving semantic violations. In addition, when sentences contained both semantic and syntactic violations, the target words elicited a greater N400 and P600 distributed in posterior brain areas. These results indicate that Chinese sentence comprehension involves covert grammar processes.
基金the Key Grant Project of Ministry of Education of the People’s Republic of China through Project,China(No.113027A)the Fundamental Research Funds for the Central Universities,China
文摘The goal of this paper is to provide an approach to investigate the variation of fiber quantity in a certain cross-section of the drafting zone. This model with discrete-event simulation( DES)method was presented to simulate the dynamic drafting process. This model described the behavior of individual fibers,which was divided into four phases and simulated by corresponding modules. Three sets of processing conditions in industry were simulated and demonstrated the applications of this model. The comparison between experiments and simulation results could also validate this model. This model could be used to simulate various drafting process with appropriate drafting settings.
文摘Multimedia Sensor Networks(MSNs)have enhanced the ability to analyze the environment and provide responses based on its current status.Generally,MSNs are composed of scalar and multimedia sensors that have fixed locations.However,given the advancement of smart mobile device technologies,it is currently possible to dynamically integrate mobile sensors into MSNs.In this paper,we propose a formal platform to manage MSNs and the data gathered from them to detect complex events.Our main contributions include:M^(2)SSN-Onto,a Mobile and Multimedia Semantic Sensor Networks Ontology;Py-CEMiD,an engine for detecting complex events and generate reactions to them;a mobile device location engine to locate mobile sensors;and a proof-of-concept in the context of detecting emergency situations in smart buildings.Several scenarios are validated for emergency events,combining simulated sensor measurements with real measurements of mobile devices.Results show complex events can be detected in near real time(less than 1 s).
文摘The express delivery induslry of China is relatively backward in the automation degree of critical business processes. The basic reason is that the business-related supporting data, which is scattered in the multidimensional space, is difficult to utilize and process. This paper proposes an automatic data acquisition fi-amework to resolve such difficulty, which synthetically utilize intelligent inemet of things (IoT), semantic web and complext event processing (CEP) technology. We also implement a SCEP prototype system with the capability of real-time detecting complex business events on the goods sorting line, which adopts a detection method consisting of four stages. The simulation results show that the system has good performance and feasible enough to deal with the complex business which need data support fTom multidimensional space.
文摘Our study area covered the Eastern Himalayan Syntaxis (EHS) and its southern extension (Hengduan Mountain or western Sichuan and Yunnan (WSY)) which is located at the orthogonal and oblique collisional front between Indian and Asian continents during Cenozoic.Based on geometric and kinematic mapping of the major boundary or regional faults (Dongjug—Mainling(1), Anigiao(2) and Jali(3), Guyu(4) faults in EHS, Ailaoshan—Red River(5), Lancangjiang(6), Gaoligong(7), Binlangjiang(8) and Magok(9) faults in WSY) (see Fig.1), especially on abundant geochronological dating of the mylonitic rocks along these faults, and coupled with magmato\|metamorphic sequences of this region, we try to deal with the temporal and spatial relationships of collisional process to answer questions such as: (1) when did collision start ? (2) is thrusting as a initial and dominant deformation mode to absorb the crustal shortening after suturing, or earlier thrusting usually followed by large\|scale strike\|slip faults? (3) are the two structural patterns coeval at times, or do they occur alternatively during deformation history? (4) are the collisional and associate uplift processes a continuous one or periodic? Insight into such questions is crucial for better understanding of the continental deformation and testing the models available or constraining a new one.
文摘The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format.
基金Research project of meteorological science and technology in China (96-908-05-03)
文摘Based on the El Nino event data sequence from 1854 to 1993, the nature of sequences was de-termined by using statistical normal and independent tests, etc. With the Markov random process and first order auto-regression predictive model, we set up the prognostication mode and give the time limit of the occurrence of next El Nino event, which probably occurs around 2002.The occurring probability for 2001 is 44 %, and it is 61 % for 2002.