In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversif...
详细信息
In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversification search, are designed to exploit the local regions around the current solution and explore the unvisited space, respectively. Simulation experiments are conducted for six RNA sequences to show that the proposed method is feasible and effective.
In this paper we review the major approaches to nonrigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more impo...
详细信息
In this paper we review the major approaches to nonrigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more importance in the literature. In this context most of the paper is devoted to present all kinds of approaches for non-rigid object reconstruction based on multiview images. A number of references are provided that describe applications of non-rigid object reconstruction based on multiview images The paper ends by addressing some important issues and open questions that can be subject of future research.
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t...
详细信息
ISBN:
(纸本)9781424471645;9781424471638
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In the proposed method, each individual component of the protection system in the simulated plane is modeled. Then, the threat report of each component according to the specific tactics is determined based on its real environment. Finally, the comprehensive threat distribution is obtained based on through the D-S evidence theory to combine multi-sources information. The proposed method can easily applied to the evaluation of the effectiveness of the protection system. We make the total threat of the protection system lowest through changes of the protection resources allocation. A numerical example is used to illustrate the efficiency of the proposed method.
In this paper, a novel algorithm for image classification is presented which uses the projective value of adjacency spectrum as classified samples. Firstly, the eigenvalues of adjacency matrices constructed on the fea...
详细信息
In this paper, a novel algorithm for image classification is presented which uses the projective value of adjacency spectrum as classified samples. Firstly, the eigenvalues of adjacency matrices constructed on the feature point-sets of images are obtained by singular value decomposition. Secondly, the eigenvalues are projected onto the eigenspace by means of the covariance matrix. Finally, image classification is performed by adopting RBF and PNN neural networks as classifiers respectively. Meanwhile, some theoretical analyses are given to support the proposed method.
Tranditionally the medical monitoring used in hospital brought a lot inconvenience because of the complex wires between patients and equipments. In order to solve these problems, a human health wireless monitoring sys...
详细信息
This article develops a discrete time dynamic feedback model of a congestion control system for a simple network with TCP Westwood (TCPW) connections and a single bottleneck link with random early detection (RED) ...
详细信息
This article develops a discrete time dynamic feedback model of a congestion control system for a simple network with TCP Westwood (TCPW) connections and a single bottleneck link with random early detection (RED) gateway. By using this model, the nonlinear dynamics of the TCPW/RED network are analyzed and its parameter sensitivities are studied. It is shown that periodic doubling bifurcation occurs when the RED control parameters or other parameters are varied. By theoretical analysis, the fixed point, the critical value of parameters and the nature of the bifurcation are determined. Moreover, by using bifurcation diagrams and Lyapunov exponent, the result of theoretical analysis is validated and the bifurcation and chaotic phenomena are numerically studied of the congestion control system with TCPW connections and RED gateway.
This paper introduces an improved BCI system based on alpha rhythm, the main composition units of the system are electrodes, acquisition circuit, online detecting algorithm and outer devices. For improving the perform...
详细信息
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t...
详细信息
As Magnetic Resonance Imaging (MRI) is an important technology of radiological evaluation and computeraided diagnosis, the accuracy of the MR image segmentation directly influences the validity of following processing...
详细信息
Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise, which is due to the coherent nature of scattering phenomena. This paper presents a despeckling method for SAR images based...
详细信息
暂无评论