Recently, a method for estimating permittivity distributions was reported. The method combined a numerical technique (Finite Element Method) with Genetic Algorithm (GA). However, methods for estimating the distributio...
详细信息
With the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in fo...
详细信息
Thunder, as the most popular P2P download software in China, has token up a large amount of bandwidth. And it is almost impossible to identify the encrypted thunder traffic. This paper proposes a method to detect encr...
详细信息
In this abstract, we describe provenance traces generated from executions of scientific workflows managed by the Swift parallel scripting system. They follow a provenance data model, used by MTCProv, the provenance ma...
Poster walk 11: miscellaneous drug hypersensitivity 2 (P92–P94, P96–P101) P92 16 years of experience with proton pump inhibitors (PPIs) Javier Dionicio Elera, Cosmin Boteanu, Maria Aranzazu Jimenez Blanco, ...
详细信息
Poster walk 11: miscellaneous drug hypersensitivity 2 (P92–P94, P96–P101) P92 16 years of experience with proton pump inhibitors (PPIs) Javier Dionicio Elera, Cosmin Boteanu, Maria Aranzazu Jimenez Blanco, Rosario Gonzalez-Mendiola, Irene Carrasco García, Antonio Alvarez, Jose Julio Laguna Martinez P93 Allergy evaluation of quinolone induced adverse reactions Jaume Martí Garrido, Carla Torán Barona, Carolina Perales Chorda, Ramón López Salgueiro, Miguel Díaz Palacios, Dolores Hernández Fernández De Rojas P94 Bupropion-induced acute urticaria and angioedema, a case report Emre Ali Acar, Ayse Aktas, Aylin Türel Ermertcan, Peyker Temiz P96 Delayed type hypersensitivity and study of cross-reactivity between proton-pump inhibitors Chien-Yio Lin, Chung-Yee Rosaline Hui, Ya-Ching Chang, Chih-Hsun Yang, Wen-Hung Chung P97 Diagnostic work-up in suspected hypersensitivity to proton-pump inhibitors: looking at cross-reactivity Fabrícia Carolino, Diana Silva, Eunice Dias De Castro, Josefina R. Cernadas P98 Management of infusion-related hypersensitivity reactions to enzyme replacement therapy for lysosomal diseases Luis Felipe Ensina, Carolina Aranda, Ines Camelo Nunes, Alex Lacerda, Ana Maria Martins, Ekaterini Goudouris, Marcia Ribeiro, José Francisco Da Silva Franco, Leandra Queiroz, Dirceu Solé P99 Management of insulin allergy with continuous subcutaneous insulin infusion Ceyda Tunakan Dalgiç, Aytül Zerrin Sin, Fatma Düsünür Günsen, Gökten Bulut, Fatma Ömür Ardeniz, Okan Gülbahar, Emine Nihal Mete Gökmen, Ali Kokuludag P100 Off-label use of icatibant for management of serious angioedema associated with angiotensin inhibitors Ana M. Montoro De Francisco, Talía Mª De Vicente Jiménez, Adriana M. Mendoza Parra, Angella M. Burgos Pimentel, Amelia García Luque P101 Thiocolchicoside anaphylaxis: an unusual suspect? Luis Amaral, Fabricia Carolino, Leonor Carneiro Leão, Eunice Castro, Josefina Cernadas Poster walk 12: betalactam hypersensitivity (P102–P111) P102 A curious dela
Description Logics based languages have emerged as the standard knowledge representation scheme for ontologies. Typically, an ontology formalizes a number of dependent and related concepts in a domain, encompassed as ...
详细信息
Description Logics based languages have emerged as the standard knowledge representation scheme for ontologies. Typically, an ontology formalizes a number of dependent and related concepts in a domain, encompassed as a terminology. As defining such terminologies manually is a complex, time consuming and error-prone task, there is great interest and even demands for methods that learn terminologies automatically. Learning a terminology in Descriptions Logics concerns to learn several related concepts. This process would greatly benefit of an ideal order to determine which concept should be learned before another concept. Arguably, such an order would yield rich and readable terminologies, as previously, and interrelated concepts formerly learned could be used to induce the description of further concepts. In this work, we contribute with a formal definition of the concept and terminology learning problems and from such definitions we devise an algorithm for finding an ordering through concept taxonomy discovery, that should be followed when learning several related concepts. We show through an experiment that by following the order detected by the algorithm, we are able to afford a more readable terminology than methods that do not conceive an ideal order or do not learn concepts in a dependent way.
Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without ap...
详细信息
Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. Meanwhile, the natures of smart grids and smart buildings—such as having limited computation power of smart devices and constraints in communication network capabilities, while requiring being highly reliable—make privacy preservation a challenging task. In this paper, we propose a group key scheme to safeguard multicast privacy with the provisions of availability, fault-tolerance, and efficiency in the context of smart buildings as a part the smart grid. In particular, hybrid architecture accommodating both centralized and contributory modes is constructed in order to achieve both fault-tolerance and efficiency with only one set of group key installed. Key trees are sophisticatedly managed to reduce the number of exponentiation operations. In addition, an individual rekeying scheme is introduced for occasional joining and leaving of member smart meters. Experimental results, on a simulation platform, show that our scheme is able to provide significant performance gains over state-of-the-art methods while effectively preserving the participants’ privacy.
Visible light face images usually have a high resolution;however, the performance of face recognition using visible light face images is usually affected by the varying illumination. It seems that near infrared face r...
详细信息
Nowadays, we can observe that finding answers on social networks is a hard and time-consuming task. The main contribution of this article is the creation of a model and algorithm that allows users to find answers to t...
详细信息
Nowadays, we can observe that finding answers on social networks is a hard and time-consuming task. The main contribution of this article is the creation of a model and algorithm that allows users to find answers to their questions using a spontaneous social network called Mingle. This algorithm uses the Mingle ontology-based knowledge base to find expert users. To achieve this, two important steps are taken: Mingle ontology is updated to support user-oriented expertise and a detailed model is created for the given algorithm. This model was created considering other three similar applications and algorithms. Moreover, we used a semantic web framework. In the end, an evaluation using real-life scenarios is applied to evaluate if the created algorithm meets the initial goals.
Thunder, as the most popular P2P download software in China, has token up a large amount of bandwidth. And it is almost impossible to identify the encrypted thunder traffic. This paper proposes a method to detect encr...
详细信息
暂无评论