Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and during the last few years enormous research efforts have been dedicated to the development of e-learning systems...
详细信息
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and during the last few years enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In our previous work, we implemented a e-learning system that is able to increase the learning efficiency by stimulating learners motivation. In this work, we designed and implemented new functions to improve the system performance.
Low-power design is one of the most important issues in wireless sensor networks (WSNs) , while reliable information transmitting should be ensured as well. Transmitting power (TP) control is a simple method to make t...
详细信息
Low-power design is one of the most important issues in wireless sensor networks (WSNs) , while reliable information transmitting should be ensured as well. Transmitting power (TP) control is a simple method to make the power consumption down, but excessive interferences from potential adjacent operating links and communication reliability between nodes should be considered. In this paper, a reliable and energy efficient protocol is presented, which adopts adaptive rate control based on an optimal TP. A mathematical model considering average interference and network connectivity was used to predict the optimal TP. Then for the optimal TP, active nodes adaptively chose the data rate with the change of bit-error–rate(BER) performance. The efficiency of the new strategy was validated by mathematical analysis and simulations. Compared with 802.11 DCF which uses maximum unified TP and BASIC protocol, it is shown that the higher average throughput can achieve while the energy consumption per useful bit can be reduced according to the results.
In mobile cellular systems the handover is a very important process to maintain the desired Quality of Service (QoS). Many handover algorithms are proposed in the literature. However, to make a better handover and kee...
详细信息
In mobile cellular systems the handover is a very important process to maintain the desired Quality of Service (QoS). Many handover algorithms are proposed in the literature. However, to make a better handover and keep the QoS in wireless networks is very difficult. In this paper, by using random walk model and fuzzy theory we propose a new handover system. The proposed system uses 3 parameters for handoff decision: signal strength from the present Base Station (BS), signal strength from the neighbor BS, and the distance between Mobile Station (MS) and BS. The performance evaluation via simulations shows that proposed system can avoid ping-pong effect and has a good handover decision.
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserved sequence domains. Then, for each cluster, we built the profile using the structure and sequence information. Finally we use the profile and structural alignments as anchors to increase the alignment accuracy between a query and its templates. Our preliminary results show that this method can be used for the partial prediction for a majority of known protein sequences with better qualities. Copyright 2007 ACM.
Vision based surveillance systems are used for example for the observation of large areas to detect intruders and protect safety critical equipment. These large areas may be maritime ports or aprons of airports and ca...
详细信息
Vision based surveillance systems are used for example for the observation of large areas to detect intruders and protect safety critical equipment. These large areas may be maritime ports or aprons of airports and can usually not be guarded solely by human staff due to the costs arising. Most of today's surveillance systems used for the observation of these areas rely on a centralised systemarchitecture with a central entity being the system's single point of failure. In this paper, a self-optimising systemarchitecture for networked SCs is proposed. This implies SCs being able to decide autonomously how to arrange their fields of view to achieve an optimal spatial surveillance coverage. Additionally, a distributed algorithm allowing for online spatial partitioning and detection of failing nodes is described and evaluated. The evaluation shows that near optimal spatial partitioning can be achieved without any node having knowledge of all cameras in the system.
RNA secondary structure prediction is a broadly studied problem and remains a challenging task in molecular biology. In this paper, we present a new parallel algorithm based on the improved transiently chaotic neural ...
详细信息
RNA secondary structure prediction is a broadly studied problem and remains a challenging task in molecular biology. In this paper, we present a new parallel algorithm based on the improved transiently chaotic neural network (TCNN) for predicting RNA secondary structure. It consists of three steps. First, Search and list all possible helices. Second, consider the RNA secondary structure prediction problem as the maximum independent set problem. Third, apply the proposed improved transiently chaotic neural network to solve the problem and achieve the predicted RNA secondary structure. In order to demonstrate the confidence of the proposed algorithm, tests on three RNA sequences: tRNAphe, pre-tRNAtyr and Saccharomyces cerevisiae are performed. The results show that the proposed parallel algorithm is effective and has an accepted accuracy compared with the most-used method.
Superimpose one protein tertiary structure to another can help to find similarity between them and further identify functional and evolutionary relationships. We first extract invariant features under rigid body trans...
详细信息
Structure alignment could help to find shape similarities between proteins and guide structure classification and fold recognition. Common substructure detection and extraction are especially important, for which coul...
详细信息
ISBN:
(纸本)9781424415786
Structure alignment could help to find shape similarities between proteins and guide structure classification and fold recognition. Common substructure detection and extraction are especially important, for which could guide the biologist to discover binding site or active site. We represent each segment of alpha-carbon backbone by using dihedral angles and curve moment invariants. Then, local and global structure alignment could be performed by iterative closest point algorithm. Maximum common substructures between a pair of proteins or within a protein could be found. Active sites also could be detected by the proposed algorithm.
Trend towards providing heterogeneous services concurrently by ISPs and low utilization of servers make it necessary to consolidate various services computing into a single platform. In such a shared environment, meet...
详细信息
ISBN:
(纸本)9781595939036
Trend towards providing heterogeneous services concurrently by ISPs and low utilization of servers make it necessary to consolidate various services computing into a single platform. In such a shared environment, meeting application-level QoS goals and avoiding interaction among services become challenges as each application consumes different amount of resource and requires different QoS. Video-on-demand (VoD) has been identified as an important application among multimedia services. In this paper, we study a case of interaction among services concurrently running on a virtualized computing environment. The contributions of this paper are follows. 1) We design a novel capability service computing framework for service computing consolidation (CSCF) to study the interaction among concurrent services in a VM-Based Virtualized Computing Environment;2) A dynamic and lazy memory flowing algorithm (DLMFaVM) among VMs is proposed to partially fulfill this computing model by resource flowing;3) We also develop a virtualized computing platform to study the possibility of service computing consolidation;4) We analyze the interaction among VoD service and other typical enterprise services in our capability service computing environment and draw a conclusion that the VoD streaming service co-existing with other services on a VM-based virtualized computing platform is a trend for ISPs. But it presents some challenges for the designers of service soft and the designers of service computing platform. Copyright 2007 ACM.
2-D projective moment invariants were firstly proposed by Suk and Flusser in [12]. We point out here that there is a useless projective moment invariant which is equivalent to zero in their paper. 3-D projective momen...
详细信息
2-D projective moment invariants were firstly proposed by Suk and Flusser in [12]. We point out here that there is a useless projective moment invariant which is equivalent to zero in their paper. 3-D projective moment invariants are generated theoretically by investigating the property of signed volume of a tetrahedron. The main part is the selection of permutation invariant cores for multiple integrals to generate independent and nonzero 3-D projective moment invariants. We give the conclusion that projective moment invariants don't exist strictly speaking because of their convergence problem.
暂无评论