Learn More
Data-driven intelligent transportation systems utilize data resources generated within intelligent systems to improve the performance of transportation systems and provide convenient and reliable services. Traffic data refer to datasets generated and collected on moving vehicles and objects. Data visualization is an efficient means to represent(More)
Monitoring a computing cluster requires collecting and understanding log data generated at the core, computer, and cluster levels at run time. Visualizing the log data of a computing cluster is a challenging problem due to the complexity of the underlying dataset: it is streaming, hierarchical, heterogeneous, and multi-sourced. This paper presents an(More)
OBJECTIVE To evaluate the effect of bleomyin A5 combined with phosphorus-32 colloid in the treatment of mucocele. METHODS A total of 214 patients divided into three groups, bleomyin A5 (50 cases), phosphorus-32 colloid (50 cases) and bleomyin A5 combined with phosphorus-32 colloid (114 cases). RESULTS The efficacy of bleomyin A5 group, phosphorus-32(More)
1. Introduction Dental caries, or tooth decay/cavity, is a dental disease caused by bacterial infection. Of people from different age groups, preschooler children requires more attention since caries has become the most common chronic childhood diseases. More importantly, a skewed distribution of the diseases has been observed in Europe, US and Singapore(More)
DataV.js is an open source Javascript library based on D3.js and Rafael.js. It allows people with no programming knowledge to visualize their data freely. It is now applied in some websites such as Ali-pay.com and Taobao Index. I am one of the algorithm designers and the programmers. I designed and implemented some core components, such as the chord and the(More)
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This(More)
  • 1