期刊文献+
共找到6,641篇文章
< 1 2 250 >
每页显示 20 50 100
Machine learning for carbonate formation drilling: Mud loss prediction using seismic attributes and mud loss records
1
作者 Hui-Wen Pang Han-Qing Wang +4 位作者 Yi-Tian Xiao Yan Jin Yun-Hu Lu Yong-Dong Fan Zhen Nie 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期1241-1256,共16页
Due to the complexity and variability of carbonate formation leakage zones, lost circulation prediction and control is one of the major challenges of carbonate drilling. It raises well-control risks and production exp... Due to the complexity and variability of carbonate formation leakage zones, lost circulation prediction and control is one of the major challenges of carbonate drilling. It raises well-control risks and production expenses. This research utilizes the H oilfield as an example, employs seismic features to analyze mud loss prediction, and produces a complete set of pre-drilling mud loss prediction solutions. Firstly, 16seismic attributes are calculated based on the post-stack seismic data, and the mud loss rate per unit footage is specified. The sample set is constructed by extracting each attribute from the seismic trace surrounding 15 typical wells, with a ratio of 8:2 between the training set and the test set. With the calibration results for mud loss rate per unit footage, the nonlinear mapping relationship between seismic attributes and mud loss rate per unit size is established using the mixed density network model.Then, the influence of the number of sub-Gausses and the uncertainty coefficient on the model's prediction is evaluated. Finally, the model is used in conjunction with downhole drilling conditions to assess the risk of mud loss in various layers and along the wellbore trajectory. The study demonstrates that the mean relative errors of the model for training data and test data are 6.9% and 7.5%, respectively, and that R2is 90% and 88%, respectively, for training data and test data. The accuracy and efficacy of mud loss prediction may be greatly enhanced by combining 16 seismic attributes with the mud loss rate per unit footage and applying machine learning methods. The mud loss prediction model based on the MDN model can not only predict the mud loss rate but also objectively evaluate the prediction based on the quality of the data and the model. 展开更多
关键词 Lost circulation Risk prediction Machine learning Seismic attributes Mud loss records
在线阅读 下载PDF
The Location Differences of Attributes in EST Translation
2
作者 李清平 黄晨 《海外英语》 2013年第18期137-138,共2页
There are similarities and differences about the order of the attributes between English sentences and Chinese sentenc es. As a result, mistakes can often be observed; those mistakes are the results of unfamiliarity w... There are similarities and differences about the order of the attributes between English sentences and Chinese sentenc es. As a result, mistakes can often be observed; those mistakes are the results of unfamiliarity with the proper order of the attri butes. But here, special attention is paid to the EST(English for Science and Technology) translation in which their differences are much more distinct. Generally speaking, the attributes in English can be divided into pre-attributes and post-attributes in terms of their positions in a sentence. But in Chinese an attribute is usually put before a noun, and rarely put after it, so several simple comparisons are tried to find out some rules to translate English attributes into Chinese. 展开更多
关键词 attribute EST Order LOCATION TRANSLATION
在线阅读 下载PDF
A Look at Contrastive Linguistics--Differences and Similarities between English Attributes and Chinese Attributes
3
作者 崔维 《海外英语》 2013年第15期274-275,共2页
Contrastive linguistics is a branch of linguistics which mainly involves contrast or comparison,and it can leave us some useful insights into our problems,especially for translation work.This paper discusses similarit... Contrastive linguistics is a branch of linguistics which mainly involves contrast or comparison,and it can leave us some useful insights into our problems,especially for translation work.This paper discusses similarities and differences between English attributes and Chinese attributes from the perspective of the location,the composition,and the function,for the purpose of presenting a sound version for the original text. 展开更多
关键词 CONTRASTIVE LINGUISTICS attributes LOCATION compos
在线阅读 下载PDF
The Implications of Different Attributes in English and Chinese for Translation Teaching
4
作者 金良友 《海外英语》 2015年第21期258-259,共2页
Comparative study between English and Chinese attributes has been a research hotspot.The differences between English and Chinese attributes are elaborated by examples and translation strategies of English and Chinese ... Comparative study between English and Chinese attributes has been a research hotspot.The differences between English and Chinese attributes are elaborated by examples and translation strategies of English and Chinese attributes are discussed in this paper,from which the implications for translation teaching are stated at the same time. 展开更多
关键词 English and Chinese attributes translation strategy translation teaching
在线阅读 下载PDF
Seismic attributes and integrated prediction of fractured and caved carbonate reservoirs in the Tarim Basin,China 被引量:6
5
作者 Liu Lifeng Sam Zandong Sun +4 位作者 Yang Haijun Han Jianfa Gao Hongliang Jing Bing Zhu Xinghui 《Petroleum Science》 SCIE CAS CSCD 2011年第4期455-461,共7页
The carbonate reservoirs in the Tarim Basin are characterized by anisotropy and strong heterogeneity.Combined with an integrated analysis of data from seismic,geology,and drilling results,a series of attributes which ... The carbonate reservoirs in the Tarim Basin are characterized by anisotropy and strong heterogeneity.Combined with an integrated analysis of data from seismic,geology,and drilling results,a series of attributes which are suitable for fractured and caved carbonate reservoir prediction is discussed,including amplitude,coherence analysis,spectra decomposition,seismic absorption attenuation analysis and impedance inversion.Moreover,3-D optimization of these attributes is achieved by integration of multivariate discriminant analysis and principle component analysis,where the logging data are taken as training samples.Using the optimized results,the spatial distribution and configuration features of the caved reservoirs can be characterized in detail.This technique not only improves the understanding of the spatial distribution of current reservoirs but also provides a significant basis for the discovery and production of carbonate reservoirs in the Tarim Basin. 展开更多
关键词 Coherence analysis spectra decomposition seismic absorption and attenuation impedance inversion seismic attribute optimization
在线阅读 下载PDF
A Generic Construction of Ciphertext-Policy Attribute- Based Encryption Supporting Attribute Revocation 被引量:7
6
作者 WU Qiuxin 《China Communications》 SCIE CSCD 2014年第A01期93-100,共8页
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap... Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its application is how to revoke the attributes of the users, though some ABE schemes have realized revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or attribute revocation under the indirect revocation model such that all the users' private keys will be affected by the revocation. In this paper, we define the model of CP-ABE supporting the attribute revocation under the direct revocation model, in which the revocation list is embed in the ciphertext and none of the users' private keys will be affected by the revocation process. Then we propose a generic construction, and prove its security with the decision q-BDHE assumption. 展开更多
关键词 attribute revocation attribute based encryption ciphertext-Policy generic construction.
在线阅读 下载PDF
Face Detection Detection, Alignment Alignment, Quality Assessment and Attribute Analysis with Multi-Task Hybrid Convolutional Neural Networks 被引量:5
7
作者 GUO Da ZHENG Qingfang +1 位作者 PENG Xiaojiang LIU Ming 《ZTE Communications》 2019年第3期15-22,49,共9页
This paper proposes a universal framework,termed as Multi-Task Hybrid Convolutional Neural Network(MHCNN),for joint face detection,facial landmark detection,facial quality,and facial attribute analysis.MHCNN consists ... This paper proposes a universal framework,termed as Multi-Task Hybrid Convolutional Neural Network(MHCNN),for joint face detection,facial landmark detection,facial quality,and facial attribute analysis.MHCNN consists of a high-accuracy single stage detector(SSD)and an efficient tiny convolutional neural network(T-CNN)for joint face detection refinement,alignment and attribute analysis.Though the SSD face detectors achieve promising results,we find that applying a tiny CNN on detections further boosts the detected face scores and bounding boxes.By multi-task training,our T-CNN aims to provide five facial landmarks,facial quality scores,and facial attributes like wearing sunglasses and wearing masks.Since there is no public facial quality data and facial attribute data as we need,we contribute two datasets,namely FaceQ and FaceA,which are collected from the Internet.Experiments show that our MHCNN achieves face detection performance comparable to the state of the art in face detection data set and benchmark(FDDB),and gets reasonable results on AFLW,FaceQ and FaceA. 展开更多
关键词 FACE DETECTION FACE ALIGNMENT FACIAL attribute CNN MULTI-TASK training
在线阅读 下载PDF
Pedestrian Attributes Recognition in Surveillance Scenarios with Hierarchical Multi-Task CNN Models 被引量:2
8
作者 Wenhua Fang Jun Chen Ruimin Hu 《China Communications》 SCIE CSCD 2018年第12期208-219,共12页
Pedestrian attributes recognition is a very important problem in video surveillance and video forensics. Traditional methods assume the pedestrian attributes are independent and design handcraft features for each one.... Pedestrian attributes recognition is a very important problem in video surveillance and video forensics. Traditional methods assume the pedestrian attributes are independent and design handcraft features for each one. In this paper, we propose a joint hierarchical multi-task learning algorithm to learn the relationships among attributes for better recognizing the pedestrian attributes in still images using convolutional neural networks(CNN). We divide the attributes into local and global ones according to spatial and semantic relations, and then consider learning semantic attributes through a hierarchical multi-task CNN model where each CNN in the first layer will predict each group of such local attributes and CNN in the second layer will predict the global attributes. Our multi-task learning framework allows each CNN model to simultaneously share visual knowledge among different groups of attribute categories. Extensive experiments are conducted on two popular and challenging benchmarks in surveillance scenarios, namely, the PETA and RAP pedestrian attributes datasets. On both benchmarks, our framework achieves superior results over the state-of-theart methods by 88.2% on PETA and 83.25% on RAP, respectively. 展开更多
关键词 attributes RECOGNITION CNN MULTI-TASK learning
在线阅读 下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
9
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
在线阅读 下载PDF
Model of interval multi-attribute optimization for overseas oil-gas projects 被引量:3
10
作者 Yong-Zhang Huang Bao-Sheng Zhang +1 位作者 Xin-Qiang Wei Ren-Jin Sun 《Petroleum Science》 SCIE CAS CSCD 2015年第2期345-354,共10页
Because of the incompleteness and uncertainty in the information on overseas oil-gas projects, project evaluation needs models able to deal with such problems. A new model is, therefore, presented in this paper based ... Because of the incompleteness and uncertainty in the information on overseas oil-gas projects, project evaluation needs models able to deal with such problems. A new model is, therefore, presented in this paper based on interval multi-attribute decision-making theory. Analysis was made on the important attributes (index) and the re- lationships affecting the basic factors to the project eco- nomic results were described. The interval numbers are used to describe the information on overseas oil and gas projects. On these bases, an improved TOPSIS model is introduced for the evaluation and ranking of overseas oil and gas projects. The practical application of the new model was carried out for an oil company in selecting some promising blocks from 13 oil and gas blocks in eight dif- ferent countries in the Middle East. Based on these inno- vative studies, some conclusions are given from theoretical and application aspects. The practical application shows that the introduction of interval numbers into the evaluation and ranking of the overseas oil and gas projects can lead to more reasonable decisions. The users can do the project evaluation based on the comprehensive values as well as based on some preferred index in the project evaluation and ranking. 展开更多
关键词 Interval data Improved TOPSIS modelMultiple attribute decision making Overseas oil-gasproject Alternative ranking
在线阅读 下载PDF
An attribute recognition model based on entropy weight for evaluating the quality of groundwater sources 被引量:22
11
作者 CHEN Suo-zhong WANG Xiao-jing ZHAO Xiu-jun 《Journal of China University of Mining and Technology》 EI 2008年第1期72-75,共4页
In our study, entropy weight coefficients, based on Shannon entropy, were determined for an attribute recognition model to model the quality of groundwater sources. The model follows the theory previously proposed by ... In our study, entropy weight coefficients, based on Shannon entropy, were determined for an attribute recognition model to model the quality of groundwater sources. The model follows the theory previously proposed by Chen Q S. In the model, firstly, the author establishes the attribute space matrix and determines the weight based on Shannon entropy theory; secondly, calculates attribute measure; thirdly, evaluates that with confidence criterion and score criterion; finally, an application example is given. The results show that the water quality of the groundwater sources for the city comes up to the grade II or III standard. There is no pollution that obviously exceeds the standard and the water can meet people’s needs .The results from an evaluation of this model are in basic agreement with the observed situation and with a set pair analysis (SPA) model. 展开更多
关键词 water quality evaluation groundwater sources entropy weigh attribute recognition model
在线阅读 下载PDF
Improved Rough Set Algorithms for Optimal Attribute Reduct 被引量:1
12
作者 C.Velayutham K.Thangavel 《Journal of Electronic Science and Technology》 CAS 2011年第2期108-117,共10页
Feature selection(FS) aims to determine a minimal feature(attribute) subset from a problem domain while retaining a suitably high accuracy in representing the original features. Rough set theory(RST) has been us... Feature selection(FS) aims to determine a minimal feature(attribute) subset from a problem domain while retaining a suitably high accuracy in representing the original features. Rough set theory(RST) has been used as such a tool with much success. RST enables the discovery of data dependencies and the reduction of the number of attributes contained in a dataset using the data alone,requiring no additional information. This paper describes the fundamental ideas behind RST-based approaches,reviews related FS methods built on these ideas,and analyses more frequently used RST-based traditional FS algorithms such as Quickreduct algorithm,entropy based reduct algorithm,and relative reduct algorithm. It is found that some of the drawbacks in the existing algorithms and our proposed improved algorithms can overcome these drawbacks. The experimental analyses have been carried out in order to achieve the efficiency of the proposed algorithms. 展开更多
关键词 Data mining entropy based reduct Quickreduct relative reduct rough set selection of attributes
在线阅读 下载PDF
An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service 被引量:3
13
作者 Nyamsuren Vaanchig Wei Chen Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第1期90-98,共9页
Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based e... Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption(CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner(DO) direct control on access policy and enforces the access policy cryptographically. However,the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semitrusted cloud service provider(CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attributerevocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service. 展开更多
关键词 attribute cloud challenging encryption token challenge enable secret reasonably inherent
在线阅读 下载PDF
Attribute Disturbance of Knowledge and Attribute Disturbance Theorems 被引量:3
14
作者 ZHANG Guan-yu DU Ying-ling 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2008年第4期574-581,共8页
By using the dynamic characteristic of one direction S-rough sets(one direction singular rough sets) and dual of one direction S-rough sets(dual of one direction singular rough sets), the concepts of attribute dis... By using the dynamic characteristic of one direction S-rough sets(one direction singular rough sets) and dual of one direction S-rough sets(dual of one direction singular rough sets), the concepts of attribute disturbance of knowledge, the attribute disturbance degree of knowledge, and the disturbance coefficient of knowledge are given. By employing these concepts, the cardinal order theorem of the attribute disturbance knowledge, the unit circle theorem of the attribute disturbance knowledge, and the discernible theorem of the attribute disturbance knowledge are presented. 展开更多
关键词 KNOWLEDGE attribute disturbance cardinal order theorem unit circle theorem knowledge discernment
在线阅读 下载PDF
Academic Collaborator Recommendation Based on Attributed Network Embedding 被引量:2
15
作者 Ouxia Du Ya Li 《Journal of Data and Information Science》 CSCD 2022年第1期37-56,共20页
Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator... Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator recommendation tasks.Design/methodology/approach:We propose an academic collaborator recommendation model based on attributed network embedding(ACR-ANE),which can get enhanced scholar embedding and take full advantage of the topological structure of the network and multi-type scholar attributes.The non-local neighbors for scholars are defined to capture strong relationships among scholars.A deep auto-encoder is adopted to encode the academic collaboration network structure and scholar attributes into a low-dimensional representation space.Findings:1.The proposed non-local neighbors can better describe the relationships among scholars in the real world than the first-order neighbors.2.It is important to consider the structure of the academic collaboration network and scholar attributes when recommending collaborators for scholars simultaneously.Research limitations:The designed method works for static networks,without taking account of the network dynamics.Practical implications:The designed model is embedded in academic collaboration network structure and scholarly attributes,which can be used to help scholars recommend potential collaborators.Originality/value:Experiments on two real-world scholarly datasets,Aminer and APS,show that our proposed method performs better than other baselines. 展开更多
关键词 Academic relationships mining Collaborator recommendation attributed network embedding Deep learning
在线阅读 下载PDF
Homogeneity Analysis of Multiairport System Based on Airport Attributed Network Representation Learning 被引量:2
16
作者 LIU Caihua CAI Rui +1 位作者 FENG Xia XU Tao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第4期616-624,共9页
The homogeneity analysis of multi-airport system can provide important decision-making support for the route layout and cooperative operation.Existing research seldom analyzes the homogeneity of multi-airport system f... The homogeneity analysis of multi-airport system can provide important decision-making support for the route layout and cooperative operation.Existing research seldom analyzes the homogeneity of multi-airport system from the perspective of route network analysis,and the attribute information of airport nodes in the airport route network is not appropriately integrated into the airport network.In order to solve this problem,a multi-airport system homogeneity analysis method based on airport attribute network representation learning is proposed.Firstly,the route network of a multi-airport system with attribute information is constructed.If there are flights between airports,an edge is added between airports,and regional attribute information is added for each airport node.Secondly,the airport attributes and the airport network vector are represented respectively.The airport attributes and the airport network vector are embedded into the unified airport representation vector space by the network representation learning method,and then the airport vector integrating the airport attributes and the airport network characteristics is obtained.By calculating the similarity of the airport vectors,it is convenient to calculate the degree of homogeneity between airports and the homogeneity of the multi-airport system.The experimental results on the Beijing-Tianjin-Hebei multi-airport system show that,compared with other existing algorithms,the homogeneity analysis method based on attributed network representation learning can get more consistent results with the current situation of Beijing-Tianjin-Hebei multi-airport system. 展开更多
关键词 air transportation multi-airport system homogeneity analysis network representation learning airport attribute network
在线阅读 下载PDF
Quantitative evaluation of gas hydrate reservoir by AVO attributes analysis based on the Brekhovskikh equation 被引量:1
17
作者 Yao Wang Yan-Fei Wang 《Petroleum Science》 SCIE EI CAS CSCD 2023年第4期2045-2059,共15页
AVO (Amplitude variation with offset) technology is widely used in gas hydrate research. BSR (Bottom simulating reflector), caused by the huge difference in wave impedance between the hydrate reservoir and the underly... AVO (Amplitude variation with offset) technology is widely used in gas hydrate research. BSR (Bottom simulating reflector), caused by the huge difference in wave impedance between the hydrate reservoir and the underlying free gas reservoir, is the bottom boundary mark of the hydrate reservoir. Analyzing the AVO attributes of BSR can evaluate hydrate reservoirs. However, the Zoeppritz equation which is the theoretical basis of conventional AVO technology has inherent problems: the Zoeppritz equation does not consider the influence of thin layer thickness on reflection coefficients;the approximation of the Zoeppritz equation assumes that the difference of wave impedance between the two sides of the interface is small. These assumptions are not consistent with the occurrence characteristics of natural gas hydrate. The Brekhovskikh equation, which is more suitable for thin-layer reflection coefficient calculation, is used as the theoretical basis for AVO analysis. The reflection coefficients calculated by the Brekhovskikh equation are complex numbers with phase angles. Therefore, attributes of the reflection coefficient and its phase angle changing with offset are used to analyze the hydrate reservoir's porosity, saturation, and thickness. Finally, the random forest algorithm is used to predict the reservoir porosity, hydrate saturation, and thickness of the hydrate reservoir. In the synthetic data, the inversion results based on the four attributes of the Brekhovskikh equation are better than the conventional inversion results based on the two attributes of Zoeppritz, and the thickness can be accurately predicted. The proposed method also achieves good results in the application of Blake Ridge data. According to the method proposed in this paper, the hydrate reservoir in the area has a high porosity (more than 50%), and a medium saturation (between 10% and 20%). The thickness is mainly between 200m and 300m. It is consistent with the previous results obtained by velocity analysis. 展开更多
关键词 Natural gas hydrate Brekhovskikh equation AVO attributes Random forest
在线阅读 下载PDF
Knowledge Law and Attribute Disturbance of Law 被引量:3
18
作者 ZHANG Guan-yu DU Ying-ling QIU Yu-feng 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2008年第2期245-251,共7页
By employing the knowledge(R-element equivalence class) in one direction S-rough sets and dual of one direction S-rough sets, the concept of knowledge law is given; the generation theorem of knowledge law, the excur... By employing the knowledge(R-element equivalence class) in one direction S-rough sets and dual of one direction S-rough sets, the concept of knowledge law is given; the generation theorem of knowledge law, the excursion theorem of knowledge law, and the attribute disturbance discernible theorem of knowledge law are proposed. Knowledge law is a new characteristic of S-rough sets. 展开更多
关键词 knowledge law attribute disturbance the balance theorem of law the excursion theorem of law the discernible theorem of law
在线阅读 下载PDF
A Method of Attribute Reduction Based on Rough Set 被引量:3
19
作者 李昌彪 宋建平 《Journal of Electronic Science and Technology of China》 2005年第3期234-237,共4页
The logging attribute optimization is an important task in the well-logging interpretation. A method of attribute reduction is presented based on rough set. Firstly, the core information of the sample by a general red... The logging attribute optimization is an important task in the well-logging interpretation. A method of attribute reduction is presented based on rough set. Firstly, the core information of the sample by a general reductive method is determined. Then, the significance of dispensable attribute in the reduction-table is calculated. Finally, the minimum relative reduction set is achieved. The typical calculation and quantitative computation of reservoir parameter in oil logging show that the method of attribute reduction is greatly effective and feasible in logging interpretation. 展开更多
关键词 rough set attribute reduction quantitative computation oil logging interpretation
在线阅读 下载PDF
Efficient Task Scheduling for Many Task Computing with Resource Attribute Selection 被引量:3
20
作者 ZHAO Yong CHEN Liang LI Youfu TIAN Wenhong 《China Communications》 SCIE CSCD 2014年第12期125-140,共16页
Many Task Computing(MTC)is a new class of computing paradigm in which the aggregate number of tasks,quantity of computing,and volumes of data may be extremely large.With the advent of Cloud computing and big data era,... Many Task Computing(MTC)is a new class of computing paradigm in which the aggregate number of tasks,quantity of computing,and volumes of data may be extremely large.With the advent of Cloud computing and big data era,scheduling and executing large-scale computing tasks efficiently and allocating resources to tasks reasonably are becoming a quite challenging problem.To improve both task execution and resource utilization efficiency,we present a task scheduling algorithm with resource attribute selection,which can select the optimal node to execute a task according to its resource requirements and the fitness between the resource node and the task.Experiment results show that there is significant improvement in execution throughput and resource utilization compared with the other three algorithms and four scheduling frameworks.In the scheduling algorithm comparison,the throughput is 77%higher than Min-Min algorithm and the resource utilization can reach 91%.In the scheduling framework comparison,the throughput(with work-stealing)is at least 30%higher than the other frameworks and the resource utilization reaches 94%.The scheduling algorithm can make a good model for practical MTC applications. 展开更多
关键词 task scheduling resource attribute selection many task computing resource utilization work-stealing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部