Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Video shot boundary detection is an important step in many video applications. Since the rapid development of video editing technology, especially, the extensive use of sub-window in news video, the original method of...
详细信息
Cell's immunological information is acquired through analyzing color immunofluorescence image. A pixel growing algorithm with dynamic seed values is proposed to extract fluorescent regions in the CIE (L*, a*, b*) ...
详细信息
Cell's immunological information is acquired through analyzing color immunofluorescence image. A pixel growing algorithm with dynamic seed values is proposed to extract fluorescent regions in the CIE (L*, a*, b*) uniform color space. Ellipse matching method is proposed to extract cells from the obtained fluorescent regions. Finally antigen information is acquired through computing and decomposing color of the cell with the pre-computation and discretization method. The methods proposed for the acquirement of cell's immmunological information are appropriately evaluated. The experiment indicates that acquired the immunological information meets practical medicine analysis.
For solving problems in a large-scale distributed Web environment, we propose the distributed β-PSML (problem solver markup language). The distributed β-PSML is an extension of the β-PSML that we have proposed befo...
详细信息
For solving problems in a large-scale distributed Web environment, we propose the distributed β-PSML (problem solver markup language). The distributed β-PSML is an extension of the β-PSML that we have proposed before for complex adaptive, distributed problem solving, and can be easily used for automatic reasoning on the Web. By incorporating global information sources from the Semantic Web and social networks with locally operational knowledge-data bases in an enterprise portal together for decision-making and e-business intelligence, the reason of a distributed β-PSML can be implemented. The experimental results show that our considerations are valid by combining global and local information sources and our preliminary solution works well on the semantic Web.
In this paper, inspired by a unified probabilistic model of information retrieval, we propose a general framework of targeted marketing by considering three types of information, namely, the customer profiles, the pro...
详细信息
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, w...
详细信息
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, which are different from that of ordinary architecture, are highlighted firstly, and then a solution for extending Darwin is presented. Using the extended Darwin, service components and connectors can be described explicit by the extended construct, as well as precise operational semantics of SOA by the π-calculus. Finally an example of supply-chain management system is given for manifesting the effect of the extended Darwin.
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model uses mathematical method to express diverse entities in information and disaster recovery system such as applications, facilities, resources, sub disaster recovery plans, budget, etc. It classifies various resources according to their utilization and payment, and identifies the significance of applications and the conflicts among sub disaster recovery plans. Through expressing relationships among applications, facilities, resources and sub plans, this model selects the best set of sub plans. This model has less subjective parameter and can evaluate disaster recovery planning objectively and quantitatively.
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable command on disaster recovery. It uses selfsupervision function to monitor the integrality and security of system itself. Through GIS, this model makes disaster recovery system easier to use, manage and maintain. RDRSM possesses features of security, robustness and controllability and can be applied to environments such as e-government and bank. This model successfully conducted the construction of an important e-government disaster recovery system, which verified its feasibility and the significance of its components, such as disaster recovery planning, system supervision and robust communication support.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
In recent years, more and more people studied the Bayesian networks learning algorithm that integrates independence test with scoring metric. Based on the proposed hybrid algorithm I-B&B-MDL, a modified method is ...
详细信息
In recent years, more and more people studied the Bayesian networks learning algorithm that integrates independence test with scoring metric. Based on the proposed hybrid algorithm I-B&B-MDL, a modified method is developed. There are two major contributions. Firstly, order-0 and partial order-1 independence tests are used to obtain an original graph of the network, which reduces the number of independence tests and database passes while effectively restricting the search space. Secondly, by means of the heuristic knowledge of mutual information, sort order for candidate parent nodes increases the cut-offs of the B&B search tree and accelerates search process. The experimental results show that the modified algorithm has high accuracy, and is more efficient in time complexity than other algorithms.
暂无评论