IRC-based botnet is a serious cyber-security ***,Wang et *** an IRC-based botnet detection by evaluating channel distance,which calculates differences among nicknames within one *** et al.'s scheme provided real-t...
详细信息
IRC-based botnet is a serious cyber-security ***,Wang et *** an IRC-based botnet detection by evaluating channel distance,which calculates differences among nicknames within one *** et al.'s scheme provided real-time ***,this method only works when the number of clients in a channel is greater than *** this paper,we propose a dynamic partition approach for any *** detection algorithm achieves timeliness and accuracy for detecting IRC-based *** addition,our scheme has the less false positive rate compared with Wang et al.' scheme.
Sequence-based schemes determine beacon sequence to help sensor node *** to the ambiguity of RSS over distance,sequence-based scheme may have null-intersection problem,i.e.,no location in the localization space could ...
详细信息
Sequence-based schemes determine beacon sequence to help sensor node *** to the ambiguity of RSS over distance,sequence-based scheme may have null-intersection problem,i.e.,no location in the localization space could match the beacon ***,determining the matched location is *** this paper,we introduce null-intersection avoidance localization scheme,which takes *** scheme is applicable to real *** localization error in real sensors is less than 0.34×communication *** to the simulation results in NS-2,our scheme is more accurate and reliable than existing schemes.
Since the letter-by-letter spelling of English words or acronyms appears in Mandarin Chinese speech quite often, a prosodic modeling approach for Mandarin speech embedded with English spelling is proposed to make the ...
详细信息
Since the letter-by-letter spelling of English words or acronyms appears in Mandarin Chinese speech quite often, a prosodic modeling approach for Mandarin speech embedded with English spelling is proposed to make the foreign language congruous with the primary language's prosodyThis approach considers several additive affecting factors that contribute to the variations of prosodyThe weighting coefficients of affecting factors were automatically estimated using a regression modelOne particular feature – pause is modeled and its experimental results presented have confirmed its effectiveness on analyzing several main factors that seriously affect the pause.
Ankyrin repeat domain (ARD) proteins contain various numbers of internal repeat units. They are considered as one important factor to influence hypoxia response through hydroxylation interaction with Factor Inhibiting...
详细信息
ISBN:
(纸本)9781457716614
Ankyrin repeat domain (ARD) proteins contain various numbers of internal repeat units. They are considered as one important factor to influence hypoxia response through hydroxylation interaction with Factor Inhibiting HIF (FIH) enzymes which can repress HIF under normoxia environment. In this study, we adopted sequence based method and applied conserved hydroxylation motif patterns for identifying ASN/ASP/HIS hydroxylation sites on ARDs. First, a set of known ARD proteins was collected, and all corresponding repeat units were manually constructed and verified by removing redundant units. All extracted segments served as fundamental seed units to retrieve all ARDs proteins from 5 different species. Those ARD candidates were automatically segmented and a conserved hydroxylation motif pattern was applied for identifying all hydroxylation sites. As a result, the retrieval performance for ARDs achieved a sensitivity of 82% and a specificity of 98% for human species based on a testing dataset of 1,244 protein sequences. For hydroxylation site prediction, a sensitivity of 72.2% and a positive prediction value of 62% were achieved based on a set of 18 experimentally verified hydroxylation residues.
Cloud computing is rapidly growing as an alternative to conventional computing. However, it is based on models like cluster computing, distributed computing, utility computing and grid computing in general. This paper...
详细信息
Cloud computing is rapidly growing as an alternative to conventional computing. However, it is based on models like cluster computing, distributed computing, utility computing and grid computing in general. This paper presents an end-toend comparison between Cluster Computing, Grid Computing and Cloud Computing, along with the challenges they face. This could help in better understanding these models and to know how they differ from its related concepts, all in one go. It also discusses the ongoing projects and different applications that use these computing models as a platform for execution. An insight into some of the tools which can be used in the three computing models to design and develop applications is given. This could help in bringing out the innovative ideas in the field and can be explored to the needs in the computing world.
A great deal of research over the past several years has been devoted to the development of methodologies to create reusable software components and component libraries. But the issue of how to find the contribution o...
详细信息
A great deal of research over the past several years has been devoted to the development of methodologies to create reusable software components and component libraries. But the issue of how to find the contribution of the factor towards the successfulness of the reuse program is still in the na?ve stage and very less work is done on the modeling of the success of the *** success and failure factors are the key factors that predict the successful reuse of software. An algorithm has been proposed in which the inputs can be given to k-Means Clustering system in form of tuned values of the Data Factors and the developed model shows the high precision results, which describe the success of software reuse.
This paper proposed a level set method with shape model to segment breast mass on the breast magnetic resonance imaging(MRI).Because the level set model proposed by Chan and Vese can not work well on the breast mass s...
详细信息
This paper proposed a level set method with shape model to segment breast mass on the breast magnetic resonance imaging(MRI).Because the level set model proposed by Chan and Vese can not work well on the breast mass segmentation,this paper adds the shape knowledge into the segmentation *** will first apply the Chan-Vese level set model to get pre-segmented breast mass and then the position and the size of the pre-segmented breast mass will be calculated to establish the initial shape *** then this paper used dilation processing to calculate the distance to the shape model contour that taken into consideration to update the level set *** the proposed method is applied to segment the breast *** experimental result will show that the breast mass can be correctly segmented by the above mechanism.
There is a problem if a mobile target (mouse) tries to avoid detection by one or more mobile sensors (cats) in a closed network. We see this problem as a game between two participants the mouse and the collection of c...
详细信息
There is a problem if a mobile target (mouse) tries to avoid detection by one or more mobile sensors (cats) in a closed network. We see this problem as a game between two participants the mouse and the collection of cats. The game ends when mouse comes in the range of one or more spying cats. A cat tries to minimize the expected detection time of the mouse. The mouse tries to maximize the expected detection time. When the mouse has spying range less than or equal to the cats we develop a dynamic programming solution for the mouse, assuming high level information about the cats movement model. We see how the cats chosen movement model will affect its presence matrix in the network and its outcome of the game. When the mouse has a larger sensing range than the cats, we show how the mouse can determine its movement based on local observations of the cats movements. We give a coordination protocol for the cats to catch the mouse by (1) forming an associate to limit the mouse's degree of freedom in escaping detection and (2) minimizing the overlap in the spatial coverage of the associate members. Extensive experimental results verify and illustrate the analytical results, and evaluate the game's outcome as a function of several important system parameters.
An effective table lookup decoding algorithm(TLDA),called the syndrome and syndrome difference decoding algorithm(SSDDA),is developed to correct the binary systematic(47,24,11)quadratic residue(QR)code up to five-bit ...
详细信息
ISBN:
(纸本)9781612842387
An effective table lookup decoding algorithm(TLDA),called the syndrome and syndrome difference decoding algorithm(SSDDA),is developed to correct the binary systematic(47,24,11)quadratic residue(QR)code up to five-bit errors in this *** key point of the SSDDA is based on the properties of the weight of syndrome and the weight of syndrome difference to largely reduce the memory size of the lookup *** SSDDA requires a small lookup table,called compact lookup table(CLT),which only consists of 2,324 syndromes and their corresponding error *** advantage of the SSDDA over the previous TLDA is that the memory size of the proposed CLT is only about 37.2%of the lookup table needed in the decoding algorithm given by Lin et al.
Deploying FemtoCells in WiMAX network, also called WiMAX FemtoCell architecture, gains a lot of attention due to better indoor services can be provided and WiMAX network traffic can be shared by the FemtoCell. However...
详细信息
Deploying FemtoCells in WiMAX network, also called WiMAX FemtoCell architecture, gains a lot of attention due to better indoor services can be provided and WiMAX network traffic can be shared by the FemtoCell. However, since the signal of WiMAX base station (BS) is stronger than FemtoCell Base Station (fBS), the handover procedure may not be triggered even though fBS is within the BS coverage. Besides, since the coverage of FemtoCell is small, it is possible that a huge number of fBSs are deployed in a WiMAX BS coverage, which causes a large volume of power consumption to scan all indoor fBSs for a handover. In this paper, we propose a beacon-based handover scanning mechanism with Quality of Service (QoS) support. In the proposed mechanism, through the beacon and modified MOB_NBR-ADV messages, a neighbor cell list with QoS parameters is generated automatically at mobile station (MS). The decision criteria for triggering the handover procedure and selecting an appropriate target indoor cell from many candidate fBSs are developed. Through the adoption of the proposed mechanism, the system throughput can be improved and the traffic load through the WiMAX BS can be reduced effectively. A simulation was conducted using QualNet simulator. The simulation results demonstrate that along with the numbe of FemtoCells increases, both the system throughput and the utilization of FemtoCells increase significantly, as compared with conventional handover mechanisms.
暂无评论