Learn More
An algorithm of 3D model watermarking which has an effective resistance to the affine transform is designed. The algorithm uses high-capacity gray image as the watermark information, and chooses Nielson norm combining with redundancies of triangle meshes. Experimental results show that the algorithm can effectively resist attacks such as translation,(More)
Association rule mining, in which generating frequent patterns is a key step, is an effective way of identifying inherent and unknown interrelationships between characteristics of celestial spectra data and its physicochemical properties. In this study, we first make use of the first-order predicate logic to represent knowledge derived from celestial(More)
Seeking the unknown celestial body is one of the profound goals for the mankind explores pursued universe. Outlier mining is a kind of effective way of finding the spectrum data of unknown celestial body. Using outlier mining as the way of analyzing star spectrum data and VC++, Oracle9i as development tools, the outlier mining system on star spectrum data(More)
In this paper, we present a thermal-aware file assignment technique called TIGER for reducing the cooling cost of storage clusters in data centers. We show that peak inlet temperatures of storage nodes depend on not only CPU utilization but also I/O activities, which rely on file assignments in a cluster. The TIGER scheme aims to lower peak inlet(More)
Traditional outlier mining methods identify outliers from a global point of view. These methods are inefficient to find locally-biased data points (outliers) in low dimensional subspaces. Constrained concept lattices can be used as an effective formal tool for data analysis because constrained concept lattices have the characteristics of high constructing(More)