Recent work has demonstrated the effectiveness of using complex networks for studying complex biological interactions. The process often involves conversion of biological data such as gene expressions or biochemical i...
详细信息
Recent work has demonstrated the effectiveness of using complex networks for studying complex biological interactions. The process often involves conversion of biological data such as gene expressions or biochemical interactions into one of numerous complex network file formats. However, the exact selection of an appropriate file format for a particular dataset often poses a non-trivial decision problem, biologists are non-specialist end-users and find it difficult to select a particular format for data storage and conversion. In this paper, we propose a solution to this problem of the selection of a suitable network format by means of a critical evaluation based on performance analysis of empirical experiments on biological data sets of different sizes. Experimental results substantiate the hypothesis of being extra careful in the selection of a suitable complex network format based primarily on the size of the biological dataset.
Mobile robots have been used widely in large number of intelligent based applications, where a random manoeuvring is an essential part of such systems, [1,2]. In this regards, experience has shown that mobile robots d...
详细信息
This paper introduces the Hybrid Decision Tree with Harmony Search (HDT-HS) optimization algorithm to improve the rate of accuracy for the decision tree algorithm so as to apply it to DNA data sets. The hybridization ...
详细信息
This paper introduces the Hybrid Decision Tree with Harmony Search (HDT-HS) optimization algorithm to improve the rate of accuracy for the decision tree algorithm so as to apply it to DNA data sets. The hybridization includes operating the decision tree method after the Improvisation step of the harmony search algorithm in order to navigate for several solutions at the same time. This is to improve the accuracy of the final results for the decision tree. The results show that the hybrid algorithm achieved better accuracy of about 96.73% compared to classifier algorithms such as Nave (94.8%), MBBC (95.99%); optimization algorithms such as bagging (94.5%) and boosting (94.7%); hybrid decision tree with genetic algorithm (70.7%) and another version from the decision tree such as C4.5 (94.3%) and PCL (94.4%).
For protecting the authenticity of multimedia objects, watermarking plays a vital role, since, they are much easier to get copied, exchanged and modified these days. Conventional watermarking techniques as available a...
详细信息
For protecting the authenticity of multimedia objects, watermarking plays a vital role, since, they are much easier to get copied, exchanged and modified these days. Conventional watermarking techniques as available are not always competent enough to protect the authenticity of multimedia objects as they are usually applied in the uncompressed domain. To address this deficiency, the subject paper presents a new compressed domain video watermarking scheme. The method proposed herein embeds several binary images decomposed from a single watermarked image into different scenes in a video sequence. The spatial spread spectrum watermark is embedded directly into the compressed bit streams by modifying the discrete cosine transform coefficients. In order to embed the watermark with minimum loss in image fidelity, a visual mask based on local image characteristics is incorporated. Simulation experiments demonstrate that the developed technique yields effective and robust protection against conventional spatial strikes, viz. scaling and frame averaging besides temporal attacks.
Synthesizing aliasing-free space compactor for built-in self-testing of very large scale integration circuits and systems is of great importance, especially because of the design paradigm shift in recent years from sy...
详细信息
Synthesizing aliasing-free space compactor for built-in self-testing of very large scale integration circuits and systems is of great importance, especially because of the design paradigm shift in recent years from system-on-board to system-on-chip. This paper investigates and provides additional results on a recently developed approach to designing aliasing-free space compaction hardware targeting particularly embedded cores-based system-on-chips for single stuck-line faults, extending well-known concept from conventional switching theory, viz. that of compatibility relation as used in the minimization of incomplete sequential machines. For a pair of response outputs of the circuit under test, the method introduces the notion of fault detection compatibility and conditional fault detection compatibility (conditional upon some other response output pair being simultaneously fault detection compatible) with respect to two-input XOR/XNOR logic. The process is illustrated with design details of space compactors for the International Symposium on Circuits and Systems (ISCAS 85) combinational (and ISCAS 89 full-scan sequential) benchmark circuits using simulation programs ATalANTA and FSIM, attesting to the importance of the technique from the viewpoint of simplicity, resultant low area overhead and full fault coverage for single stuck-line faults, thereby making it an appropriate choice in commercial design environments.
The conventional design of home security systems typically monitors only the property and lacks physical control aspects of the house itself. also, the term security is not well defined because there is a time delay b...
详细信息
The conventional design of home security systems typically monitors only the property and lacks physical control aspects of the house itself. also, the term security is not well defined because there is a time delay between the alarm system going on and actual arrival of the security personnel. This paper discusses the development of a home security and monitoring system that works where the traditional security systems that are mainly concerned about curbing burglary and gathering evidence against trespassing fail. The paper presents the design and implementation details of this new home control and security system based on field programmable gate array (FPGA) The user here can interact directly with the system through a web-based interface over the Internet, while home appliances like air conditioners, lights, door locks and gates are remotely controlled through a user-friendly web page. An additional feature that enhances the security aspect of the system is its capability of monitoring entry points such as doors and windows so that in the event any breach, an alerting email message is sent to the home owner instantly.
Path selection for a firefighter in complex fire scene is challenge problem. In this paper, we discuss how to assistant a firefighter to select safe path in fire scene. By dynamic triangular schema and ad hoc robot ne...
详细信息
Path selection for a firefighter in complex fire scene is challenge problem. In this paper, we discuss how to assistant a firefighter to select safe path in fire scene. By dynamic triangular schema and ad hoc robot network, we establish directed graph and directed ad hoc robot network based on smoke density gradient. Using the directed graph, we discuss how to calculate directed paths and how to select the shortest directed path in detail. On the situation that there is no path could be selected for a firefighter, we present a virtual directed gradient method to modify directed graph, and provide the shortest directed path for a firefighter in the end.
Productive information system has high-level security requirements, but Trusted Computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a ...
详细信息
Social-web giants - like ***, ***, and *** - are quickly becoming the driving force behind content generation on the web. Because these sites have incredibly large user-bases and content is frequently cross-posted bet...
详细信息
暂无评论