The ambiguity and complexity of medical cerebrovascular image makes the skeleton gained by conventional skeleton algorithm discontinuous, which is sensitive at the weak edges, with poor robustness and too many burrs. ...
详细信息
Sidechain prediction is an important subproblem of protein design and structure prediction. Construction of rotamer library is the basis for protein sidechain prediction because it provides the basic searching space f...
详细信息
Sidechain prediction is an important subproblem of protein design and structure prediction. Construction of rotamer library is the basis for protein sidechain prediction because it provides the basic searching space for prediction. However, the state-of-the-art rotamer libraries focus on the statistical information of individual amino acids, ignoring the direct affection of its adjacent amino acids. This article presents a sequence- and backbone-dependent rotamer library. Both the conformation information of adjacent amino acids and torsion angle of the current residue are taken into account to construct a sequence- and backbone-dependent library by HMM. Evaluation on all 13 free modeling targets of CASP8 based on our rotamer library is conducted. Comparing with side-chain prediction based on the state-of-the-art rotamer library, our library outperforms the sidechain prediction accuracy on all the test targets to a certain extent.
With the development of the 3G technology, M-learning enters a period of rapid development. But meanwhile 3G also restrains the development of M-learning due to several drawbacks in its early days. According to the ap...
详细信息
With the development of the 3G technology, M-learning enters a period of rapid development. But meanwhile 3G also restrains the development of M-learning due to several drawbacks in its early days. According to the application analysis, it comes out Flash has its unique features: small capacity, easy to develop high-quality and etc, which can make up for 3G initial stage's disadvantages. Through case design, this paper proves that Flash can be a new effective approach and way for M-learning in the 3G network. In the end, from the aspects of technical and artistic, this paper makes a further research on how to improve the flash animation to serve the M-learning better.
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol...
详细信息
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbolic operational semantics of higher order open processes, and give some symbolic bisimulations for higher order processes. The relation between symbolic bisimulations and other bisimulations is also studied. At last, we introduce a higher order π-calculus with sum and conditional operators, then we study open bisimulations and symbolic bisimulations for this calculus.
Based on some special advantages of both rough set analysis in knowledge reduction and formal concept analysis in formal concept representation, a novel hybrid approach for incomplete knowledge system mining based on ...
详细信息
A quick and effective extension rough formal concept mining algorithm named DCO-ERFC based on dynamic co-evolution is put forward in this paper. Firstly, some electronic patient records are converted into different re...
详细信息
By use of the properties of ant colony algorithm and genetic algorithm, a novel ant colony genetic hybrid algorithm, whose framework of hybrid algorithm is genetic algorithm, is proposed to solve the traveling salesma...
详细信息
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record database. By this technology the useful knowledge is extracted and the scientific and aux...
详细信息
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record database. By this technology the useful knowledge is extracted and the scientific and auxiliary decision-making is proved for the diagnosis and treatment of disease. In this paper, a rough knowledge mining algorithm (named RKMA) based on extension decision rule lattice is presented. Firstly the electronic patient records are converted into different recordings in order to be further reduced and classified in the medical database. Secondly both variable rough thresholding and concept lattice are related. A novel extension decision rule lattice is constructed. This extension lattice can rough reduce the mutative knowledge attributions and well mine all disease diagnosis rules without more redundancy by avoiding finding frequent item sets. The experimental results show this RKMA algorithm well can mine consistent decision rules, and it is better robustness than other algorithms on the capability of attribution reduction and rule mining for electronic patient records.
Image segmentation based on Bee Colony Algorithm (BCA) and fuzzy entropy is presented in this paper. The fuzzy entropy function is simplified with single parameter. The BCA is applied to search the minimum value of fu...
详细信息
Image segmentation based on Bee Colony Algorithm (BCA) and fuzzy entropy is presented in this paper. The fuzzy entropy function is simplified with single parameter. The BCA is applied to search the minimum value of fuzzy entropy function. According to the minimum function value, the optimal image threshold is obtained. Experimental results are provided to demonstrate the superior performance of the proposed approach.
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak...
详细信息
ISBN:
(纸本)9781424476718
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our IB-HPS scheme, we construct directly an efficient leakage-resilient identity-based encryption(IBE) scheme in the model.
暂无评论