A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiva...
详细信息
Randí et al. proposed a significant graphical representation for DNA sequences, which is very compact and avoids loss of information. In this paper, we build a fast algorithm for this graphical representation wit...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. That is, a polygon is divided into two parts by a line: S 1 and S 2 . Furthermore, we analyze the security and computational complexity, as well as the comparison of these two protocols. The results of analysis show that the proposed protocols are secure and efficient. We believe the two protocols will be useful in other geometric and combinatorial problems.
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by nume...
详细信息
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by numerical dispersion effectively. To absorb waves reflected from edges we implement convolutional perfectly matched layer (CPML) absorbing boundaries. It can efficiently absorb the reflections and greatly increase the computation efficiency. The surface-based reflection and cross-hole GPR modeling are simulated, and numerical results show the efficiency of the method.
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their bioche...
详细信息
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their biochemical functions characterized. Recently, many different methods have been used to predict protein functions including those based on Protein-Protein Interaction (PPI), structure, sequence relationship, gene expression data, etc. Among these approaches, methods based on protein interaction data are very promising. In this paper, we studied a network-based method using locally linear embedding (LLE). LLE is a robust learning algorithm that manipulates dimensionality reduction, neighborhood-preserving embedding for high-dimensional data. We first embed both annotated and unannotated proteins in a low dimensional Euclidean space;then, we apply semi-supervised learning techniques to classify unannotated proteins into different functional groups. Finally, we made predictions to the unknown functional proteins in yeast. 5-fold cross validation is then applied to the GO terms to compare the performance of different approaches, and the proposed method performs significantly better than the others.
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign the...
详细信息
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign these newly proteins with a biological function that can be verified by experiment. On the basis of thorough analysis of existing protein function prediction, we take double direction enumeration method combined with the distance constrains to find protein pathway, and propose a new predicting model based on topological structural of protein-protein interaction (PPI) network and protein pathway, which greatly increases the speed of the algorithm. To validate the method, the Yeast Saccharomyces cerevisiae protein-protein interaction network and corresponding protein pathways are analyzed. Comparing with other methods, our results can substantially improve the accuracy and robustness of functional annotation.
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th...
详细信息
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of the course "Digital Image processing Experiments" is discussed in this paper. The combined platform of experiments includes TI DSP experimental box and three different kinds of programming languages. The six experimental projects cover the basic theories of digital image processing. The result can offer a significant reference for the teaching innovations in the other related specialties.
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe...
详细信息
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. However, LDA suffers from the class separation problem. The projection to a subspace tends to merge close class pairs. A recent result, named maximizing the geometric mean of Kullback-Leibler (KL) divergences of class pairs (MGMD), can significantly reduce the class separation problem. Furthermore, maximizing the harmonic mean of Kullback-Leibler (KL) divergences of class pairs (MHMD) emphasizes smaller divergences more than MGMD, and deals with the class separation problem more effectively. However, in many applications, labeled data are very limited while unlabeled data can be easily obtained. The estimation of divergences of class pairs is unstable using inadequate labeled data. To take advantage of unlabeled data for subspace selection, semi-supervised MHMD (SSMHMD) is proposed using graph Laplacian as normalization. Quasi-Newton method is adopted to solve the optimization problem. Experiments on synthetic data and real image data show the validity of SSMHMD.
Conventional pulse compression use a periodical echo of single receive antenna, which is modulated by a certain carrier-frequency, in other words, single spectrum is exploited. But for MIMO radar, as the multi-carrier...
详细信息
Conventional pulse compression use a periodical echo of single receive antenna, which is modulated by a certain carrier-frequency, in other words, single spectrum is exploited. But for MIMO radar, as the multi-carrier-frequency signals are transmitted simultaneously, if the spectrum of the target echo after channel separation can be combined to form the whole band spectrum echo, the corresponding range resolution can improve several times as compared with the conventional method, and it will be more convenient for follow-up detection and tracking. Considering the difference between the frequency modulation band and the interval between the adjacent frequencies, the spectrum joint after channel separation will be overlapped or spaced. The methods of spectrum moving of each echo and the spectrum extrapolation with Root-MUSIC algorithm are proposed, by which high-resolution range profile of the target is obtained. Simulation results verify the validity of these methods.
暂无评论