In order to confirm the different pharmaceuticals have different or similar effect, the paper put forward a new federation approach in analysis of *** first to data preprocessing using wavelet compression,the second t...
详细信息
In order to confirm the different pharmaceuticals have different or similar effect, the paper put forward a new federation approach in analysis of *** first to data preprocessing using wavelet compression,the second to classify for pharmaceuticals based on OPLS/*** result indicate that the different pharmaceuticals have different or similar effect,The approach was proved to be feasible and effective after tested with 8 kinds of pharmaceuticals experimental data.
WMSNs is one of the most cutting-edge technologies of the field of informatics, and compared to other sensor technology has broad prospects for development. WMSNs has very high service quality, larger multimedia data ...
详细信息
WMSNs is one of the most cutting-edge technologies of the field of informatics, and compared to other sensor technology has broad prospects for development. WMSNs has very high service quality, larger multimedia data transmission amount, multimedia data flow model, a wide variety of application services and other characteristics. WMSNs support for education and teaching in support of ubiquitous learning environment. According to the characteristic of WMSNs expounds the WMSNs support ubiquitous learning environment and function principle, as well as WMSNs ubiquitous learning environment application.
With the rapid development of cloud computing, cloud service is becoming one of the research hotspots. As the current UDDI standard and implementation cannot describe the quality and low-level resources information of...
详细信息
With the rapid development of cloud computing, cloud service is becoming one of the research hotspots. As the current UDDI standard and implementation cannot describe the quality and low-level resources information of cloud service well, it is difficult to meet the new requirement of optimal cloud services query, selection and access. Therefore, the paper proposes an extended UDDI model CloudUDDI, which is suitable for the cloud computing environment. It supports the presentation and storage of the quality and low-level resource information of cloud services for facilitating cloud service's registry and selection. The experimental results show that it improves the precision ratio of cloud services selection and effectively access the optimal services that meet both quality and low-level resource requirements.
Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor *** this paper,1 we present the adaptive clustering strategy related...
详细信息
Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor *** this paper,1 we present the adaptive clustering strategy related to sink position for clustering protocols in wireless sensor *** protocol allows networks topology to be adaptive to the change of the sink position by using symmetrical clustering strategy that restricts the growth of clusters based on depth of the *** addition,it also guarantees each cluster the equal life-time,which may be extended compared with the existing clustering *** evaluated the performance of our clustering scheme comparing to LEACH and EEUC,and observe that our protocol is observed to outperform existing protocols in terms of energy consumption and longevity of the network.
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture(DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System(TS) and the Security System(SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel(TIC) to protect the information flow between TS and SS. In a word, the doublesystem architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
In order to meet the needs of rendering of large terrain, the loading and rendering methods of large-scale terrain texture are studied. A framework of terrain texture real-time loading and rendering is presented based...
详细信息
In order to meet the needs of rendering of large terrain, the loading and rendering methods of large-scale terrain texture are studied. A framework of terrain texture real-time loading and rendering is presented based on clipmap and texture blocks. Texture update and texture sampling are researched and the situations of viewer quickly moving and viewer in high are considered. A method of texture garbage collection based on viewer shift is presented to avoid the failure of fetching texture and to release the unused texture quickly. The results show that the method is simple, efficient and can be used in large terrain texture rendering.
U.S. academic research institutions spent public and private funds of 54 billion dollars solely in 2009. This is a significant investment considering recent harsh economic downturn. While there exists public acknowled...
详细信息
U.S. academic research institutions spent public and private funds of 54 billion dollars solely in 2009. This is a significant investment considering recent harsh economic downturn. While there exists public acknowledgement of importance of unremitting investment on research and development, U.S. research institutions still struggle to validate their performance and get reliable support from public and private stakeholders. Therefore, measuring their economic contribution based on robust and realistic approach is critical to improve their practices and secure sustainable growth by attracting more interests of taxpayer. Therefore, this paper contributes to a new approach which integrated the steps of identification of time-lags in licensing, efficiency change analysis and exploration of the influence of organizational characteristics on licensing performance. The study also included an innovative approach to resolve issues with the super efficiency DEA model, including mathematical infeasibility and zero data considerations. The results which are grounded on the comprehensive observations over multiple time durations provide an insight into the licensing practices of US research institutions.
Mining subtopics and analyzing their sentiment dynamics on weblogs have many applications in multiple domains. Current work pays little attention to the combination of topics and their sentiment evolution simultaneous...
详细信息
Mining subtopics and analyzing their sentiment dynamics on weblogs have many applications in multiple domains. Current work pays little attention to the combination of topics and their sentiment evolution simultaneously. In this paper, we study the problem of topic detection and sentiment-topic temporal evolution in weblogs, and propose a novel probabilistic model called topic sentiment trend model (TSTM). With the model, we can integrate the topic with sentiment, and analyze the temporal trend of the sentiment-topic. Experiments on two Chinese weblog datasets show that our approach is effective in modeling the topic facets and extracting their sentiment dynamics.
A hybrid encryption scheme based on the IMSI pseudonym is proposed in this paper. The security model of the scheme is deployed in a cloud environment, and the IMSI pseudonym as a unique identity of a user in the trans...
详细信息
A hybrid encryption scheme based on the IMSI pseudonym is proposed in this paper. The security model of the scheme is deployed in a cloud environment, and the IMSI pseudonym as a unique identity of a user in the transmission and storage process, which marks and identifies the user, to ensure the privacy of his identity information. Hybrid encryption scheme between communicating parties can be achieved by combining the public-private key pairs updated frequently and symmetric key related to the user identity information, which fully considers the privacy information on security of storage and wireless network transmission and effectively alleviates the current LBS security risks.
A Dynamic Time Warping (DTW) based voice recognition approach and its template training problem are discussed in this paper. In order to achieve better recognition accuracies, we proposed two kinds of incremental feed...
详细信息
A Dynamic Time Warping (DTW) based voice recognition approach and its template training problem are discussed in this paper. In order to achieve better recognition accuracies, we proposed two kinds of incremental feedback learning methods for DTW-based voice recognition, including the variable gain coefficient (VGC) based method and the time warping average (TWA) based method. Compared with the non-feedback recognition system, the proposed methods are easy to implement and more robust to noise. A number of comparison experiments are performed to demonstrate the effectiveness of the proposed method. It is also shown that the VGC-based method, whose implementation is easy, achieves significantly better performance than conventional batch template training method without feedback learning.
暂无评论