Non-Volatile Memory (NVM) has recently emerged for its nonvolatility, high density and energy efficiency. Hybrid memory systems composed of DRAM and NVM have the best of both worlds, because NVM can offer larger capac...
详细信息
The method to estimate the predictability of human mobility was proposed in [C. Song et al., science 327, 1018 (2010)], which is extensively followed in exploring the predictability of disparate time series. However, ...
详细信息
Sparse online learning and cost-sensitive learning are two important areas of machine learning and data mining research. Each has been well studied with many interesting algorithms developed. However, very limited pub...
详细信息
In this paper, we used the method of detrended fluctuation analysis(DFA) to study the self-similarity of MEG signals in the healthy subjects and the patients with depression. In the same negative emotional image stimu...
详细信息
In this paper, we used the method of detrended fluctuation analysis(DFA) to study the self-similarity of MEG signals in the healthy subjects and the patients with depression. In the same negative emotional image stimulation, the DFA algorithm was used to calculate the scaling exponent of MEG signals in the patients with depression and the healthy subjects, respectively. The result show: Under the same stimulation, the scaling exponent of the patients with depression is higher than that of the healthy subjects. As a general phenomenon, the scaling exponent is used as a discriminant basis for identifying MEG signals in the healthy subjects and the patients with depression, and in the experiment obtained a more satisfactory results, this is an important indication of clinical diagnosis.
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strat...
详细信息
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strategic technologies for some *** computing is currently undergoing vigorous development and promotion by many leading Chinese and foreign enterprises,and it has become the basis for a new
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati...
详细信息
The general notion of a metric space encompasses a diverse range of data types and accompanying similarity measures. Hence, metric search plays an important role in a wide range of settings, including multimedia retri...
详细信息
The performance of digital watermarking algorithm is mainly manifested in invisibility and robustness. At present, many algorithms improve these two aspects by sacrificing embedding capacity for the reason that if wat...
The performance of digital watermarking algorithm is mainly manifested in invisibility and robustness. At present, many algorithms improve these two aspects by sacrificing embedding capacity for the reason that if watermark embedding amount is small, the watermark has little influence on the visuality of the cover image, and its robustness is also higher. Therefore, how to improve the anti-attack performance of the algorithm without reducing the amount of embedding has become a major research direction. This paper proposed a new robust watermarking scheme based on feature extraction techniques. Firstly, the SIFT (scale invariant feature transform) algorithm is used to extract the stable feature points from cover image to form embedding region. Then watermark is composed of the cover's texture features obtained by LBP (local binary pattern) extracting method. Finally, embedding region is transformed by singular value decomposition (SVD) and the watermark is embedded into its singular value vector. The simulation results showed that the watermark embedding capacity of this algorithm is relatively high, and it has good resistance to common image processing and geometric transformation.
Breast cancer is the most prevalent disease to females in the worldwide. Its pathology remains unclear. Genetics factors is the ways to understand the molecular mechanism. This paper proposed a computational approach ...
详细信息
ISBN:
(纸本)9781538658871
Breast cancer is the most prevalent disease to females in the worldwide. Its pathology remains unclear. Genetics factors is the ways to understand the molecular mechanism. This paper proposed a computational approach to explore the interactions of genes2genes related to breast cancer. We first defined the interactions of genes2genes, and described the representation of interactions of genes2genes. Using the experimental dataset, we implemented the proposed approach for extracting the interactions of genes2genes. Moreover, we also represented the interactions of genes2genes in two forms: relationship matrix and network visualization. By manual analysis, we extracted the interactions of top 10 genes2genes is related to breast cancer, which show the approach is promising for studying molecular mechanism related to breast cancer.
In this work, a combined strategy is proposed to solve the unbalance problem in the classification of the short-text data sets. The improved K-means sampling method and category guide words are used to improve the cla...
详细信息
ISBN:
(纸本)9781538631218
In this work, a combined strategy is proposed to solve the unbalance problem in the classification of the short-text data sets. The improved K-means sampling method and category guide words are used to improve the classification accuracy of unbalanced data, and then VSM(vector space method) is used to express text. Finally, Naive Bayesian classifiers are used to classify the unbalanced short-text. Experiments show that this method is effective and feasible in the classification of small class events in unbalanced short-text data. The method can improve the small class classification accuracy and provide the decision basis for the government to respond quickly and precisely to emergencies.
暂无评论