This paper describes an image compression method based on block truncation coding (BTC) and linear regression coding (LRC) hybrid strategy. BTC is simple and easy to use, but only two representative values can not ade...
详细信息
Hadoop MapReduce has been proven an effective computing model to deal with big data for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ...
详细信息
Super-resolution microscopy techniques have overcome the limit of optical diffraction. Recently, the Bayesian analysis of Bleaching and Blinking data (3B) method has emerged as an important tool to obtain super-reso...
详细信息
Super-resolution microscopy techniques have overcome the limit of optical diffraction. Recently, the Bayesian analysis of Bleaching and Blinking data (3B) method has emerged as an important tool to obtain super-resolution fluorescence images. 3B uses the change in information caused by adding or removing fiuorophores in the cell to fit the date. When adding a new fluorophore, 3B selects a random initial position, optimizes this position and then determines its reliability. However, the fluorophores are not evenly distributed in the entire image region, and the fluorescence intensilty at a given position positively correlates with the probability of observing a fluorophore at this position. In this paper, we present a Bayesian analysis of Bleaching and Blinking microscopy method based on fluorescence intensity distribution (FID3B). We utilize the intensity distribution to select more reliable positions as the initial positions of fluorophores. This approach can improve the reconstruction results and significantly reduce the computational time. We validate the perfor. mance of our method using both simulated date and experimental date from cellular structures. The results confirm the effectiveness of our method.
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a...
详细信息
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a wide adoption of IoT technology. Application development is done at a low level, very close to the operating system and requires pro- grammers to focus on low-level system issues. The under- lying APIs can be very complicated and the amount of data collected can be huge. This can be very hard to deal with as a developer. In this paper, we present a runtime model based approach to IoT application development. First, the manage- ability of sensor devices is abstracted as runtime models that are automatically connected with the corresponding systems. Second, a customized model is constructed according to a personalized application scenario and the synchronization be- tween the customized model and sensor device runtime mod- els is ensured through model transformation. Thus, all the application logic can be carried out by executing programs on the customized model. An experiment on a real-world ap- plication scenario demonstrates the feasibility, effectiveness, and benefits of the new approach to IoT application develop- ment.
In the current social background,Existing facilities and tools already can not meet the needs of big data in expanding and analysis ***'s data storage and analysis work is achieved under cloud conditions and Hadoo...
详细信息
ISBN:
(纸本)9789462520677
In the current social background,Existing facilities and tools already can not meet the needs of big data in expanding and analysis ***'s data storage and analysis work is achieved under cloud conditions and Hadoop were set *** the conditions for cloud computing,cloud computing applications who have remote data files were not authorized to read its contents,which results in unauthorized manipulation,and it will produce a lot of security risks for large *** this paper,according to the cloud of different modes,Hadoop different stages of the operation,subject to the threat of non- confidence and security to steal big data generated to analyze a variety of privacy,with threat model as an example,it explores ways to address security threats.
This paper proposes an improved performance metric for multiobjective evolutionary algorithms with user preferences. This metric uses the idea of decomposition to transform the preference information into m+1 points o...
详细信息
Online hot event discovery has become a flourishing frontier where online document streams are monitored to discover newly occurring events or assigned to previously detected events. However, hot events have the natur...
详细信息
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data tr...
详细信息
ISBN:
(纸本)9781785610899
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data transmission and packet loss rate can be decreased when the route or the transmission fails. To solve the problems, we need to study the routing path selection strategies. This paper optimizes the routing path that meets the QoS constraints under the SDN pre planning routing, and proposes a routing mechanism that can solve problems in polynomial time. Firstly, the paper combined with Clustering and Gauss algorithm to simulate the network simulation, obtain the initial experimental data. It can reflect the network status more accurately. Secondly, simplify the multi-objectives based on the AHP, It reduces the complexity of the problem and meets QoS requirements. Finally, select the disjoint communication paths and backup paths with the heuristic algorithms in order to balance the load of network and improve the transmission reliability. The selection mechanism can improve the efficiency of data transmission, and the survival of network communication.
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple antennas, one desired single-antenna inf...
详细信息
Protein folding, prediction of protein structure and functions are most important problems in bioinformatics. The protein fold process mainly reflects in the kinetic order of folding. Predicting the structural classes...
详细信息
暂无评论