Location privacy receives considerable attentions in emerging location based *** current practices however either ignore users' preferences or incompletely fulfill privacy *** this paper,we propose a privacy protecti...
详细信息
Location privacy receives considerable attentions in emerging location based *** current practices however either ignore users' preferences or incompletely fulfill privacy *** this paper,we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN).Particularly,users are permitted to choose privacy preferences by specifying minimum inferred *** Hilbert curve based transformation,the additional workload from users' preferences is ***,this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D ***,the time efficiency,as well as communication efficiency,is greatly improved due to clustering properties of Hilbert ***,details of choosing anchor points are theoretically *** empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs.
The integrated substation auxiliary system is a project composed by software and hardware to help operators of a substation carry daily maintain works. The intelligent terminal is the key part of the system and it pro...
详细信息
The integrated substation auxiliary system is a project composed by software and hardware to help operators of a substation carry daily maintain works. The intelligent terminal is the key part of the system and it provides important UI and communication functions for the user. Smart phones can achieve higher bandwidth data communication, and at the same time can carry Bluetooth communication, video call, multimedia display and other functions. Smart phone is a potential common platform, suitable for the deployment of substation integrated auxiliary system terminal. Based on the Android Smart phone platform, this paper develops intelligent client-side software for the integrated substation auxiliary system and it can realize the operation ticket control, the video call, the substation map display and other functions. This client-side software has been applied in practice, and has gained good effects.
Finding justifications for an entailment in an OWL ontology is an important reasoning service in the development and maintenance of OWL ontologies. In this paper, we consider the problem of finding all the justificati...
详细信息
Finding justifications for an entailment in an OWL ontology is an important reasoning service in the development and maintenance of OWL ontologies. In this paper, we consider the problem of finding all the justifications of an entailment in description logic EL+, which underpins OWL 2 EL. Our method for computing all the justifications utilizes the classification result of an EL+ ontology by an OWL EL reasoner. We first give an algorithm for finding all the justifications of an entailment by constructing an explanation dependency graph from the entailment and the classification result. We then propose some pruning strategies to optimize this algorithm. We implement a prototype system by using the multi-core technology. The experimental results show that in many cases, our optimized algorithm outperforms an existing algorithm for finding all the justifications for an entailment in EL+ that is optimized with the module extraction technology.
This The IEEE 802.15.4 devices are proposed to operate in the 2.4 GHz industrial, scientific and medical(ISM) band. The other devices that use IEEE 802.11 b, g and n share the same frequency band. The interference cau...
详细信息
This The IEEE 802.15.4 devices are proposed to operate in the 2.4 GHz industrial, scientific and medical(ISM) band. The other devices that use IEEE 802.11 b, g and n share the same frequency band. The interference caused by these technologies can degrade the performance of an IEEE 802.15.4 based wireless network. In this paper we study such degrading effects on a network equipped with IEEE 802.15.4 devices that is exposed to interference in turn with IEEE 802.11 b, g and n. The performance measure in this paper is the link Packet Receive Rate(PRR). Measurements are performed with real-life equipment, in order to quantify coexistence issues. We test all 16 channels of IEEE 802.15.4 in 2.4G band and the results show the decrease of PRR when suffering in close frequency with IEEE 802.11. The connection between energy detection and PRR is also exhibited in this paper.
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading...
详细信息
ISBN:
(纸本)9781467327626
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.
Aspect extraction aims to extract fine-grained opinion targets from opinion texts. Recent work has shown that the syntactical approach performs well. In this paper, we show that Logic Programming, particularly Answer ...
详细信息
Aspect extraction aims to extract fine-grained opinion targets from opinion texts. Recent work has shown that the syntactical approach performs well. In this paper, we show that Logic Programming, particularly Answer Set Programming (ASP), can be used to elegantly and efficiently implement the key components of syntax based aspect extraction. Specifically, the well known double propagation (DP) method is implemented using 8 ASP rules that naturally model all key ideas in the DP method. Our experiment on a widely used data set also shows that the ASP implementation is much faster than a Java-based implementation. Syntactical approach has its limitation too. To further improve the performance of syntactical approach, we identify a set of general words from Word Net that have little chance to be an aspect and prune them when extracting aspects. The concept of general words and their pruning are concisely captured by 10 new ASP rules, and a natural extension of the 8 rules for the original DP method. Experimental results show a major improvement in precision with almost no drop in recall compared with those reported in the existing work on a typical benchmark data set. Logic Programming provides a convenient and effective tool to encode and thus test knowledge needed to improve the aspect extraction methods so that the researchers can focus on the identification and discovery of new knowledge to improve aspect extraction.
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approa
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approa
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approach to improve the performance of the SVM-based met...
详细信息
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approach to improve the performance of the SVM-based methods is to find a general protein representation method that is able to convert proteins with different lengths into fixed length vectors and captures the different properties of the proteins for the *** bottleneck of designing the protein representation method is that native proteins have different *** by the success of the pseudo amino acid composition(PseAAC) proposed by Chou,we applied this approach for protein remote homology *** new indices derived from the amino acid index(AAIndex) database are incorporated into the PseAAC to improve the generalization ability of this *** experiments on a well-known benchmark show this method achieves superior or comparable performance with current state-of-the-art methods.
Correction for ‘Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes’ by Yeping Sun et al., RSC Adv., 2015, 5, 2318–2327.
Correction for ‘Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes’ by Yeping Sun et al., RSC Adv., 2015, 5, 2318–2327.
Possibilistic Description Logics (DLs) extend description logics with possibilistic semantics to reason with inconsistent and uncertain knowledge. In possibilistic DLs, a crucial reasoning task is to compute the incon...
详细信息
Possibilistic Description Logics (DLs) extend description logics with possibilistic semantics to reason with inconsistent and uncertain knowledge. In possibilistic DLs, a crucial reasoning task is to compute the inconsistency degree of a possibilistic DL knowledge base. In this work, we first point out a shortcoming of a previous tableaux algorithm for possibilistic DL ALC and propose a new tableaux algorithm. We then propose a tableaux algorithm for computing the inconsistency degree of a knowledge base in possibilistic DL ALCI(R + ), which extends possibilistic DL ALC with inverse roles and transitive roles. A blocking condition is proposed to ensure the termination of the algorithm. Although the tableaux algorithm for possibilistic DL ALCI(R + ) is easy to understand and to implement, it may need exponential space in the worst case. Therefore, we give another tableaux algorithm to improve it and show that the complexity of this algorithm is PSpace-complete. This shows that the flexibility in representing uncertain information is handled without extra computational costs.
暂无评论