With the implementation of the "Internet+" strategy, electronic medical records are generally applied in the medical field. Deep mining of electronic medical record content data is an effective means to obta...
详细信息
K-means algorithm is one of the most famous unsupervised clustering algorithms. Many theoretical improvements for the performance of original algorithms have been put forward, while almost all of them are based on Sin...
详细信息
There may be many groups of candidate results after the step of candidate generation in model-based diagnosis. Hwee Tou Ng proposed the Inc-Diagnose approach to further reduce the candidate results. However, the effic...
详细信息
Time Delay Neural Network (TDNN) is a well-performing structure for deep neural network-based speaker recognition systems. In this paper we introduce a novel structure, named Crossed-Time Delay Neural Network (CTDNN) ...
详细信息
Conventional models based on crisp regions can not deal with the Direction Relations between Uncertain Regions (DRUR). Using broad boundary to represent the uncertain boundary, a novel approach is proposed based on mo...
详细信息
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, ...
详细信息
Three kinds of constrained traveling salesman problems (TSP) arising from application problems, namely the open route TSP, the end-fixed TSP, and the path-constrained TSP, are proposed. The corresponding approaches ba...
详细信息
Three kinds of constrained traveling salesman problems (TSP) arising from application problems, namely the open route TSP, the end-fixed TSP, and the path-constrained TSP, are proposed. The corresponding approaches based on modified genetic algorithms (GA) for solving these constrained TSPs are presented. Numerical experiments demonstrate that the algorithm for the open route TSP shows its advantages when the open route is required, the algorithm for the end-fixed TSP can deal with route optimization with constraint of fixed ends effectively, and the algorithm for the path-constraint could benefit the traffic problems where some cities cannot be visited from each other.
It has been observed that both cancer tissue cells and normal proliferating cells(NPCs)have the Warburg *** goal here is to demonstrate that they do this for different *** accomplish this,we have analyzed the transcri...
详细信息
It has been observed that both cancer tissue cells and normal proliferating cells(NPCs)have the Warburg *** goal here is to demonstrate that they do this for different *** accomplish this,we have analyzed the transcriptomic data of over 7000 cancer and control tissues of 14 cancer types in TCGA and data of five NPC types in *** analyses reveal that NPCs accumulate large quantities of ATPs produced by the respiration process before starting the Warburg effect,to raise the intracellular pH from 6.8 to 7.2 and to prepare for cell division *** cell cycle starts,the cells start to rely on glycolysis for ATP generation followed by ATP hydrolysis and lactic acid release,to maintain the elevated intracellular pH as needed by cell division since together the three processes are pH *** cells go back to the normal respirationbased ATP production once the cell division phase *** comparison,cancer cells have reached their intracellular pH at 7.4 from top down as multiple acid-loading transporters are up-regulated and most acid-extruding ones except for lactic acid exporters are *** cells use continuous glycolysis for ATP production as way to acidify the intracellular space since the lactic acid secretion is decoupled from glycolysis-based ATP generation and is pH balanced by increased expressions of acid-loading ***-expression analyses suggest that lactic acid secretion is regulated by external,non-pH related ***,our data strongly suggest that the two cell types have the Warburg effect for very different reasons.
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac...
详细信息
ISBN:
(纸本)9781601321916
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system;and use phase correlation method to obtain rotation angle, scaling size and position offset;and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copy-paste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.
The satisfiability(SAT) problem is a core problem of artificial intelligence. Research findings in SAT are widely used in many areas. The main methods solving SAT problem are resolution principle, tableau calculus and...
详细信息
暂无评论