Recently it has been predicted that materials with exceptionally strong optical activity may also possess a negative refractive index, allowing the realization of superlenses for super-resolution imaging and data stor...
详细信息
Recently it has been predicted that materials with exceptionally strong optical activity may also possess a negative refractive index, allowing the realization of superlenses for super-resolution imaging and data storage applications. Here we demonstrate experimentally and numerically that a chirality-induced negative index of refraction is possible. A negative index of refraction due to three-dimensional chirality is demonstrated for a bilayered metamaterial based on pairs of mutually twisted planar metal patterns in parallel planes, which also shows negative electric and magnetic responses and exceptionally strong optical activity and circular dichroism. Multilayered forms of the metamaterial are found to be suitable for use as ultrathin polarization rotators and circular polarizers for practical applications.
With the rapid development of storage technology, continuous data protection (CDP) has become an important data protection and recovery method for modern data storage systems now. According to the merits and shortcomi...
详细信息
With the rapid development of storage technology, continuous data protection (CDP) has become an important data protection and recovery method for modern data storage systems now. According to the merits and shortcomings of existing CDP mechanism, an improved mechanism based on TRAP-4 (timely recovery to any point-in-time) is provided. It reserves the basic data logging method of TRAP-4 first, and then inserts a few snapshot data into the recovery chain by a certain interval values d. This mechanism can not only avoid the latent recover chain crash problem, but also can shorten the data recovery time greatly. A quantitative mathematical model is used to analyze its performance and calculate an optimal d value for ST-CDP. This prototype system of block level ST-CDP mechanism has been implemented in a Linux block level device (MD RAID 5 device for Linux kernel). Contrastive experiments among three different CDP mechanisms are presented. The performance test results show that ST-CDP not only have lower storage space overhead and less infection to the storage system than those of the traditional snapshot mechanisms, but also have higher recovery efficiency and reliability than TRAP-4. It is affirmed that ST-CDP is an efficient continuous data protection mechanism with very low recovery cost.
Prostate cancer is one of the leading causes of cancer death for men. However, early detection before cancer spreads beyond the prostate can reduce the mortality. Therefore, in vivo imaging techniques play an importan...
详细信息
ISBN:
(纸本)9781424439317
Prostate cancer is one of the leading causes of cancer death for men. However, early detection before cancer spreads beyond the prostate can reduce the mortality. Therefore, in vivo imaging techniques play an important role to localize the prostate cancer for treatment. Although magnetic resonance imaging (MRI) has been proposed to localize prostate cancer, the studies on automated localization with multispectral MRI have been limited. In this study we propose combining the pharmacokinetic parameters derived from DCE MRI with T2 MRI and DWI. We also propose to use relevance vector machines (RVM) for automatic prostate cancer localization, compare its performance to support vector machines (SVM) and show that RVM can produce more accurate and more efficient segmentation results than SVM for automated prostate cancer localization with multispectral MRI.
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&...
详细信息
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities' analyses. Based on the analytic hierarchy structure, the fuzzy estimation consistency matrix was employed to analyze the weights of optional security components and services, and then the gained weight values were further used for the computing of security policies' utilities and the accomplishing the game, finally yielding Nash equilibriums, that is, optimal policies profiles, as well as pre-conditions for participants. The use case for a group of the typical security policies shows that the result of the game includes two different groups of security policies profiles, as well as contents/services provider could effectively deploy a DRM system in term of the number of consumers purchasing digital contents, and average purchase, thus achieving the balance between the digital copyrights protection and real payoffs of participants.
With the advent of semantic technology' access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. The ...
详细信息
With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships between entities in a semantic-aware environment. SBAC model...
详细信息
Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective strategy is an important problem. In this paper, by analyzing the...
详细信息
A novel coarse-to-fine facial profile detection and localization method in color images is proposed. First skin-tone regions are detected;Then removing some non-face regions by preprocessing rules;Thirdly the orientat...
详细信息
A novel coarse-to-fine facial profile detection and localization method in color images is proposed. First skin-tone regions are detected;Then removing some non-face regions by preprocessing rules;Thirdly the orientation of the facial profile is first detected, then extracting fiducial points on facial profile, finally these fiducial points are used to segment the facial profile based on the ratio relationship;At last final verification of the facial profiles is performed. Experiment results show the effectiveness of the proposed method.
In order to support large-scale mobile learning software running on the resource-limited mobile devices, a cache management on mobile terminal units in a mobile learning system based on Learning Unit (LU) is introduce...
详细信息
ISBN:
(纸本)9781424425105
In order to support large-scale mobile learning software running on the resource-limited mobile devices, a cache management on mobile terminal units in a mobile learning system based on Learning Unit (LU) is introduced. The generation-based algorithm in memory management according to the adaptive thinking is introduced Considering the different characteristics of the objects in the less-relied generation and the more relied generation, different allocating methods and garbage collecting algorithm are adopted These methods highly improve the efficiency of the cache management and avoid long-time problem in general garbage collecting algorithms. The experiment indicates that the cache management is reasonable and effectively supports the application of the mobile learning software for mobile terminal units.
In large-scale system-on-chips (SoCs), the power consumption on the communication infrastructure should be minimized for reliable, feasible, and cost-efficient implementations. An energy-efficient network-on-chip (NoC...
详细信息
暂无评论