In recent years, it has become obvious that mRNA expression does not always correlate with protein expression. It seems that a full understanding of the complexity of life can only be obtained by examining abundances ...
详细信息
With the rapid development of data mining technologies, preserving privacy in certain data becomes a challenge to data mining applications in many fields, especially in medical, financial and homeland security fields....
详细信息
Four novel models define the fundamental temporal semantics upon which the Streamonas DSMS has been architected, as also the fundamental temporal semantics for application development on the system. Extensive experime...
详细信息
作者:
El-Owny, H.Bergische Universität Wuppertal
Faculty C - Department of Mathematics and Computer Science Scientific Computing / Software Engineering Gaußstraße 20 42097 Wuppertal Germany
This paper addresses the problem of solving parametric linear systems of equations whose coefficients are, in the general case, nonlinear functions of interval parameters. Such systems, are encountered in many practic...
详细信息
ISBN:
(纸本)076952821X
This paper addresses the problem of solving parametric linear systems of equations whose coefficients are, in the general case, nonlinear functions of interval parameters. Such systems, are encountered in many practical problems, e.g in electrical engineering and mechanical systems. A C-XSC[8] implementation of a parametric fixed-point iteration method for computing an outer enclosure for the solution set is proposed in this paper. Numerical examples illustrating the applicability of the proposed method are solved, and compared with other methods.
The era of petascale computing brought machines with hundreds of thousands of processors. The next generation of exascale supercomputers will make available clusters with millions of processors. In those machines, mea...
详细信息
A decade of work with the Linda coordination model in both academic and commercial settings has made clear that the need for coordination arises in a broad range of application domains, from parallel computing to info...
详细信息
We explore the use of quantum generative adversarial networks QGANs for modeling eye movement velocity data. We assess whether the advanced computational capabilities of QGANs can enhance the modeling of complex stoch...
详细信息
With the development of magnetic resonance imaging techniques for acquiring diffusion tensor data from biological tissue, visualization of tensor data has become a new research focus. The diffusion tensor describes th...
ISBN:
(纸本)9780780358973
With the development of magnetic resonance imaging techniques for acquiring diffusion tensor data from biological tissue, visualization of tensor data has become a new research focus. The diffusion tensor describes the directional dependence of water molecules' diffusion and can be represented by a three-by-three symmetric matrix. Visualization of second-order tensor fields is difficult because the data values have many degrees of freedom. Existing visualization techniques are best at portraying the tensor's properties over a two-dimensional field, or over a small subset of locations within a three-dimensional field. A means of visualizing the global structure in measured diffusion tensor data is needed. We propose the use of direct volume rendering, with novel approaches for the tensors' coloring, lighting, and opacity assignment. Hueballs use a two-dimensional colormap on the unit sphere to illustrate the tensor's action as a linear operator. Lit-tensors provide a lighting model for tensors which includes as special cases both lit-lines (from streamline vector visualization) and standard Phong surface lighting. Together with an opacity assignment based on a novel two-dimensional barycentric space of anisotropy, these methods are shown to produce informative renderings of measured diffusion tensor data from the human brain.
In this paper, a Steganography algorithm is proposed to communicate data securely using basic concepts and properties of the Deoxyribonucleic Acid (DNA). The proposed method is implemented in two main levels: In level...
详细信息
暂无评论