The problem of extracting data from a Web page has been studied by many works. In this paper, we present a novel approach that extracts data records from Web pages based on techniques of XML encoding. Firstly, our app...
详细信息
The problem of extracting data from a Web page has been studied by many works. In this paper, we present a novel approach that extracts data records from Web pages based on techniques of XML encoding. Firstly, our approach formats a given Web data page into an XML document. Then instead of using DOM-based approaches, we make use of XML encoding model to transform the XML document into a linear sequence. Our algorithm identifies the data records of a Web page from the sequence, which avoids the complex matching between sub trees in DOM model. Moreover, we address the problem of repetitive subparts in records and propose an algorithm for data alignment. Experimental results show that our approach can extract data records accurately from web pages.
Mobile users traveling over roads often issue KNN queries based on their current locations with their mobile terminals (e.g. where is the nearest gas station?). However, exact location information transmitted to an un...
详细信息
Mobile users traveling over roads often issue KNN queries based on their current locations with their mobile terminals (e.g. where is the nearest gas station?). However, exact location information transmitted to an unsecure server will easily lead the mobile user to be tracked. Thus it is important to protect mobile users' location privacy while providing location-based services. People traveling over roads always follow a road network. We observe that two cloaking subgraph structures, which we name cloaking cycle and cloaking tree, can be used to protect mobile users' location privacy effectively in road network environment. Based on these two subgraph structures, we propose a novel location privacy preserving approach using cloaking cycle and forest, which can effectively protect mobile users' location privacy while efficiently providing exact location-based services.
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obs...
详细信息
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes an important research direction. An image encryption algorithm based on DNA sequences for the big image is presented in this paper. The main purpose of this algorithm is to reduce the big image encryption time. This algorithm is implemented by using the natural DNA sequences as main keys. The first part is the process of pixel scrambling. The original image is confused in the light of the scrambling sequence is generated by the DNA sequence. The second part is the process of pixel replacement. The pixel gray values of the new image and the one of the three encryption templates are generated by the other DNA sequence are XORed bit-by-bit in turn. The experimental result demonstrates that the image encryption algorithm is feasible and simple. Through performance analysis, this algorithm is robust against all kinds of attacks and owns higher security.
In this article, a novel approach is proposed to predict RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS). In the RNATS algorithm, two search models, intensification searc...
详细信息
In this article, a novel approach is proposed to predict RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS). In the RNATS algorithm, two search models, intensification search and diversification search, are developed to exploit the local regions around the current solution and explore the unvisited solution space, respectively. Simulation experiments are conducted on eight RNA sequences to show that the proposed method is feasible and effective.
In this paper, top-down and bottom-up approaches are used to predict material properties of group III-nitride nanostructures. The first approach calculates the melting temperature, melting enthalpy, Debye temperature ...
DNA self-assembly that is fast developed in the fields of DNA computing and nano technology has become the focus of scientific fields. DNA self-assembly is a method that uses the characteristics of base-pair to form p...
详细信息
DNA self-assembly that is fast developed in the fields of DNA computing and nano technology has become the focus of scientific fields. DNA self-assembly is a method that uses the characteristics of base-pair to form polyhedron or super molecular structure. This is a complex progress from disordered to ***, from simple to complicated. This paper mainly introduces that the DNA self-assembly technology is applied into the image encryption. In this paper, we proposed a complete design scheme of DNA tiles that is suitable for the image encryption. The DNA tiles mainly include five types, namely DNA tiles of the plaintext, DNA tiles of the encryption, DNA tiles of the cipertext, DNA tiles of the key and DNA tiles of the decryption. Through a simulate example, the effect of the image encryption algorithm is shown.
In the system of the PV grid-connected generation, because of the dispersion of the PV panel, difference of the sun radiation condition and the shadow of a part of the PV panel, they will cause the serious loss of ene...
详细信息
In this paper, a worm propagation model with pulse quarantine strategy is proposed to control the spread of the worm. This model which combines both the pulse quarantine and the constant quarantine strategy not only d...
详细信息
In this paper, a worm propagation model with pulse quarantine strategy is proposed to control the spread of the worm. This model which combines both the pulse quarantine and the constant quarantine strategy not only describes the propagation of the worm well and but also makes the infections eradicated effectively. Here, we show that there exits a stable infection-free periodic solution of the system and its stability condition is obtained. Finally, the numerical and simulation results of the pulse quarantine strategy is given, which indicate that the infections will get eliminated and the pulse quarantine policy has a nice performance on the worm control.
Spectral alignment, which studies the matching of ion peaks between the investigated spectrum and theoretical spectrum of peptide in the peptide database, is a very useful topic in computational proteomics. So far, th...
详细信息
Spectral alignment, which studies the matching of ion peaks between the investigated spectrum and theoretical spectrum of peptide in the peptide database, is a very useful topic in computational proteomics. So far, the efficient, accurate and practical spectral alignment algorithm is still urgently needed due to its important application in the PTM unrestrictive peptide identification. In this paper, a multi-stage spectral alignment algorithm called MS-SA is proposed with the following two features: (a) it provided four different levels of alignment aims according to the alignment quality which can be specified by users, (b) it provided the capability of analyzing the detail modification types and locations for spectrum with multiple PTM sites. Therefore, MS-SA is of high practicality and can be applied to different specific applications such as being a filter in the large-scale database searching, a tool for detail modification types and locations analysis in small-scale spectral alignment and so on. A large number of experiments on real MS/MS data have been done for testing the performance of MS-SA. Also, the results of MS-SA are compared with those of same type of algorithms such as SA and SPC. The results show that MS-SA possesses strong practicality and outperforms the SA and SPC algorithms on several aspects.
暂无评论