DNA microarrays provide such a huge amount of data that unsupervised methods are required to reduce the dimension of the data set and to extract meaningful biological information. This work shows that Independent Comp...
详细信息
ISBN:
(纸本)9783540737490
DNA microarrays provide such a huge amount of data that unsupervised methods are required to reduce the dimension of the data set and to extract meaningful biological information. This work shows that Independent Component Analysis (ICA) is a promising approach for the analysis of genome-wide transcriptomic data. The paper first presents an overview of the most popular algorithms to perform ICA. These algorithms are then applied on a microarray breast-cancer data set. Some issues about the application of ICA and the evaluation of biological relevance of the results are discussed. This study indicates that ICA significantly outperforms Principal Component Analysis (PCA).
IP lookup is a key task in packet processing to guarantee the high performance of the IP routers. It has been proposed to use TCAMs to implement IP-lookup accelerators for IP forwarding. In the paper, a new TCAM-based...
详细信息
IP lookup is a key task in packet processing to guarantee the high performance of the IP routers. It has been proposed to use TCAMs to implement IP-lookup accelerators for IP forwarding. In the paper, a new TCAM-based IP-lookup scheme MSMB-LPT is proposed and studied. It is shown that MSMB-LPT scheme significantly improve the performance of the state-of-art MSMB-PT scheme in terms of speedup and power consumption by simulations. These performance improvements are achieved with reduced cost.
In this paper, a simple method is proposed to evolve artificial neural networks(ANNs) using augmenting weight matrix method(AWMM). ANNs' architecture and connection weights can be evolved simultaneously by AWMM, a...
In this paper, a simple method is proposed to evolve artificial neural networks(ANNs) using augmenting weight matrix method(AWMM). ANNs' architecture and connection weights can be evolved simultaneously by AWMM, and their structures incrementally are growing up from minimal structure. It is a non-mating method. It employs 5 mutation operators: add connection, add node, delete connection, delete node, and new initial weight. And the connection weight is trained by the simplified alopex method, which is a correlation based method for solving optimization problem. In AWMM, structural information is encoded to weighting matrix, and the matrix is augmenting as the hidden nodes are added.
Mean-shift algorithm shows robust performances in various object-tracking technologies including face tracking. Due to its robustness and accuracy, mean-shift algorithm is regarded as one of the best ways to apply in ...
详细信息
Mean-shift algorithm shows robust performances in various object-tracking technologies including face tracking. Due to its robustness and accuracy, mean-shift algorithm is regarded as one of the best ways to apply in object-tracking technology in computer vision fields. However, it has a drawback of getting into a bottleneck state when faced with a speedy object moving beyond its window size within one image frame interval time. The time required to calculate mean-shift vector could be much lessened with lesser memory when color model is adjusted to the previously known target information. This paper shows the building process of target-adjusted model with a non-uniform quantization. The target color model dealt in this paper is the one used for deriving mean-shift vector. It is a kernel model containing both the color and distance information. This paper gives scheme to efficiently deal with color information in the model. Through a proper selection of color bins, unimportant color values were reduced to a small amount. As a result, the computing time of the mean-shift vector in face-tracking was shortened while maintaining robustness and accuracy.
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student is attentive, drowsy or absent. If teachers can know the student's affective state, they can overcome the difficult. The research applies the image recognition technologies to capture the face images of students when they are learning and analyzes their face features to evaluate the student's affective state by Fuzzy Integral. Finally, teachers can monitor the student's behavior by the detection results on the system interface.
The objective of this study is to propose a model for planning course registration by using a data mining technique: Bayesian network. The proposed model can be used to predict the sequences of courses to be registere...
详细信息
ISBN:
(纸本)9781424414895
The objective of this study is to propose a model for planning course registration by using a data mining technique: Bayesian network. The proposed model can be used to predict the sequences of courses to be registered by undergraduate students whose majors are computerscience or engineering. The data set was obtained from student enrollments and include GPA and grades in each subject for first and second year students from a private university in Thailand. Evaluations show that the predictive power of this model is acceptable. The implications from this studypsilas findings suggest that the model can be applied for advising students in planning courses to be registered in each semester. Further, the model appears to be useful for improving curriculum development in order to fit both studentspsila and university requirements.
Since the appearance in 1993, first approaching the Shannon limit, the turbo codes gave a new direction for the channel encoding field, especially since they were adopted for multiple norms of telecommunications, such...
详细信息
Since the appearance in 1993, first approaching the Shannon limit, the turbo codes gave a new direction for the channel encoding field, especially since they were adopted for multiple norms of telecommunications, such as deeper communication. To obtain an excellent performance, it is necessary to design robust turbo code interleaver. In this research, we investigated genetic algorithms as a promising optimization method to find good performing interleavers for large frame sizes. In this paper, we present our work, compare with several previous approaches and present experimental results.
We demonstrate methods for collecting gaseous and aerosolized particles into microfluidic channels. Surface tension creates gas-liquid interfaces to permit an analyte to transfer from a gaseous environment to a liquid...
详细信息
We demonstrate methods for collecting gaseous and aerosolized particles into microfluidic channels. Surface tension creates gas-liquid interfaces to permit an analyte to transfer from a gaseous environment to a liquid microfluidic channel. In one device, hydrophobic/hydrophilic boundaries create a virtual channel of liquid in which analyte is collected. In the other device, pinning points create circular pillars of air within a mircofluidic channel. Multiple methods demonstrate feasibility of these devices. Nesslerpsilas Reagent (NR) with gaseous ammonia (NH 3 ) showed the real-time and collection-for-later-analysis acquisition abilities. Deionized (DI) water with varying concentrations of gaseous ammonia (30%, 15%, and 7.5%) showed that the devices proportionally changed impedance (~50% per step) in real-time. Aerosolized solid particles showed that these devices were also able to collect larger sample analytes.
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fraction of time instants of significantly mis-...
详细信息
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fraction of time instants of significantly mis-matched sensor readings exceed the given percentage-threshold. Discovering flow anomalies (FA) is an important problem in environmental flow monitoring networks and early warning detection systems for water quality problems. However, mining FAs is computationally expensive because of the large (potentially infinite) number of time instants of measurement and potentially long delays due to stagnant (e.g. lakes) or slow moving (e.g. wetland) water bodies between consecutive sensors. Traditional outlier detection methods (e.g. t-test) are suited for detecting transient FAs (i.e., time instants of significant mis-matches across consecutive sensors) and cannot detect persistent FAs (i.e., long variable time-windows with a high fraction of time instant transient FAs) due to a lack of a pre-defined window size. In contrast, we propose a Smart Window Enumeration and Evaluation of persistence-Thresholds (SWEET) method to efficiently explore the search space of all possible window lengths. Computation overhead is brought down significantly by restricting the start and end points of a window to coincide with transient FAs, using a smart counter and efficient pruning techniques. Experimental evaluation using a real dataset shows our proposed approach outperforms Nainodotve alternatives.
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configu...
详细信息
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configuration. The overall goal of this research is to improve the correlation of the autonomic self{sup}* properties and doing so also enhance the overall self-management capacity of the desktop (autonomicity). We introduce the Circulatory Computing (CC) model, a self-managing system initiative based on the biological metaphor of the cardiovascular system, and use its concepts in the design and implementation of the architecture.
暂无评论