The increase of microarray experiments brings a fresh challenge to analyze microarray data across datasets. Several methods have been developed and implemented. But the current tools were either complicated software w...
详细信息
The extensions for logic-based knowledge bases with integrity constraints are rather popular. We put forward an alternative criteria for analysis of integrity constraints in Web ontology language (OWL) ontology unde...
详细信息
The extensions for logic-based knowledge bases with integrity constraints are rather popular. We put forward an alternative criteria for analysis of integrity constraints in Web ontology language (OWL) ontology under the closed world assumption. According to this criteria, grounded circumscription is applied to define integrity constraints in OWL ontology and the satisfaction of the integrity constraints by minimizing extensions of the predicates in integrity con- straints. According to the semantics of integrity constraints, we provide a modified tableau algorithm which is sound and complete for deciding the consistency of an extended ontol- ogy. Finally, the integrity constraint validation is converted into the corresponding consistency of the extended ontology. Comparing our approach with existing integrity constraint validation approaches, we show that the results of our approach are more in accordance with user requirements than other approaches in certain cases.
This paper finds the most expressive segments of a shape category called similar and discriminative parts, which can distinguish the learned shape class from other groups. The proposed model chooses a computationally ...
详细信息
engineering systems have become quite complicated in recent days. The requirements of design are complex and it is hard to meet them by considering only one discipline. In this paper, we suggest a hybrid Multi-objecti...
详细信息
In this paper, a hybrid TS-DE algorithm based on Tabu search and differential evolution algorithm is proposed to solve the reliability redundancy optimization problem. A differential evolution algorithm is embedded in...
详细信息
In this paper, a hybrid TS-DE algorithm based on Tabu search and differential evolution algorithm is proposed to solve the reliability redundancy optimization problem. A differential evolution algorithm is embedded in Tabu search algorithm. TS is applied for searching solutions space, and DE is used for generating neighborhood solutions. The advantages of both algorithms are considered simultaneously. And an adaptive hybrid TS-DE approach is developed to solve three benchmark reliability redundancy allocation problems. By comparing with other algorithms reported in previous literatures, experimental results show that the proposed method is effective and efficient for solving the reliability redundancy optimization problem.
During an epidemic, the spatial, temporal and demographical patterns of disease transmission are determined by multiple factors. Besides the physiological properties of pathogenes and hosts, the social contacts of hos...
详细信息
ISBN:
(纸本)9781479943012
During an epidemic, the spatial, temporal and demographical patterns of disease transmission are determined by multiple factors. Besides the physiological properties of pathogenes and hosts, the social contacts of host population, which characterize individuals' reciprocal exposures of infection in view of demographical structures and various social activities, are also pivotal to understand and further predict the prevalence of infectious diseases. The means of measuring social contacts will dominate the extent how precisely we can forecast the dynamics of infections in the real world. Most current works focus their efforts on modeling the spatial patterns of static social contacts. In this work, we address the problem on how to characterize and measure dynamical social contacts during an epidemic from a novel perspective. We propose an epidemic-model-based tensor deconvolution framework to address this issue, in which the spatiotemporal patterns of social contacts are represented by the factors of tensors, which can be discovered by a tensor deconvolution procedure with an integration of epidemic models from rich types of data, mainly including heterogeneous outbreak surveillance, social-demographic census and physiological data from medical reports. Taking SIR model as a case study, the efficacy of the proposed method is theoretically analyzed and empirically validated through a set of rigorous experiments on both synthetic and real-world data.
Most researches on co-authorship network analyze the author's information globally according to the overall network topology structure, instead of analyzing the author's local network. Therefore, this paper pr...
详细信息
Most researches on co-authorship network analyze the author's information globally according to the overall network topology structure, instead of analyzing the author's local network. Therefore, this paper presents a community mining algorithm and divides big co-authorship network into small communities, in which entities' relationship is closer. Then we mine central authors in community by three different centrality standards including closeness centrality, eigenvector centrality and a new proposed measure termed extensity degree centrality. We choose the SIGMOD data as datasets and measure the centrality from different views. And experiments in co-authorship network achieve many interesting results, which indicate our technique is efficient and feasible, and also have reference value for scientific evaluation.
In this paper we use an improved Particle Swarm Optimization algorithm to solve Multiple Sequence Alignment (MSA). MSA is a key problem in bioinformatics. The thesis starts with the theory of Particle swarm optimizati...
详细信息
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday life. However, people are no longer satisfied with accessing to ordinary information, and they ...
详细信息
A text mining algorithm named HMM-TFM (Hidden Markov Model based transcription factor name mining) is presented. The proposed algorithm does not need a dictionary of transcription factor names. A small verb set is def...
详细信息
暂无评论