Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ...
详细信息
作者:
Bin LiuXiaolong WangSchool of Computer Science and Technology
Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China School of Computer Science and Technology
Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to impro...
详细信息
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to improve the performance of the SVM-based methods is to find a general protein representation method that is able to convert proteins with different lengths into fixed length vectors and captures the different properties of the proteins for the discrimination. The bottleneck of designing the protein representation method is that native proteins have different lengths. Motivated by the success of the pseudo amino acid composition (PseAAC) proposed by Chou, we applied this approach for protein remote homology detection. Some new indices derived from the amino acid index (AAIndex) database are incorporated into the PseAAC to improve the generalization ability of this method. Our experiments on a well-known benchmark show this method achieves superior or comparable performance with current state-of-the-art methods.
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base...
详细信息
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati...
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communication system. In this paper, we propose an optimal relay selective cooperation (ORSC) scheme without the acknowledgment from the destination as if it succeeds in decoding or not. The main purpose of this paper is to evaluate the performance of ORSC transmission schemes. Specifically, the closed-form outage probabilities for ORSC transmission scheme are derived. By comparing obtained outage probability of ORSC with the non-cooperation transmission scheme, we find the ORSC transmission has better performance, better reliability and significantly eliminates the impact of the carriage passing loss.
In this paper, an efficient iterated greedy algorithm is proposed for the SDST (Sequence Dependent Setup Time) no-wait flowshop with makespan minimization, which is known to be NP-hard. By introducing effective operat...
详细信息
In this paper, Harmony Search is applied to the blocking job shop problem with makespan minimization. According to the characteristics of the considered problem, a decoding method is introduced to generate feasible so...
详细信息
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th...
详细信息
Resource limited real-time wireless sensor network is a new type of application of sensor network. In this kind of networks, there are numerous invalid real-time packets, which have already expired or are destined to ...
详细信息
In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems ...
详细信息
In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems violate this assumption, and thus overlapping community detection has become a hot research topic. The existing work on this topic uses either content or link information, but not both of them. In this paper, we deal with the issue of overlapping community detection by combining content and link information. We develop an effective solution called subgraph overlapping clustering (SOC) and evaluate this new approach in comparison with several peer methods in the literature that use either content or link information. The evaluations demonstrate the effectiveness and promise of SOC in dealing with large scale real datasets.
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation...
详细信息
暂无评论