To implement the interoperation of different ontologies in medical informatics domain and achieve the goal of the sharing and multiplexing of domain knowledge, the heterogeneous problem between ontologies must be solv...
详细信息
ISBN:
(纸本)9781424458721;9781424458745
To implement the interoperation of different ontologies in medical informatics domain and achieve the goal of the sharing and multiplexing of domain knowledge, the heterogeneous problem between ontologies must be solved. Now the best method of resolving ontology heterogeneous is establishing ontology mapping, that is founding the semantic relations between ontologies and making corresponding mapping rules firstly, and then integrating all independent ontologies into a whole to be operated. In order to produce mapping-pairs and implement ontology mapping and realizing knowledge sharing, a concept similarity algorithm combining semantic similarity with semantic relativity is adopted to estimate the similarity between concepts. It has been proved that the evaluation of concept similarity between ontologies is more accurate by considering both semantic similarity and semantic relativity, and it has laid a good foundation for establishing mapping-pairs and knowledge sharing model based on ontology mapping.
As we know, service-aware computing is an important part of pervasive computing for Web-based mobile application with uncertainty. We modified the fusion method of evidence information after considering context's ...
详细信息
In the paper, a method is proposed for efficient identification of Image-spam using the simplified Scale Invariant Feature Transform (SIFT) algorithm. It firstly strengthens the feature of image-spam email picture by ...
详细信息
Central pattern generator (CPG) plays an important role in rhythmic activities of animals and this mechanism is an important inspiration source for the motion control of legged robots. In this paper, by using CPGs and...
详细信息
ISBN:
(纸本)9780889868595
Central pattern generator (CPG) plays an important role in rhythmic activities of animals and this mechanism is an important inspiration source for the motion control of legged robots. In this paper, by using CPGs and function mapping mechanism, a high-efficiency distributed CPG control network is constructed to realize the locomotion control of biped NAO robot. To realize stable and coordinated locomotion, the parameters of the CPG network are evolved by multi-object genetic algorithm (MOGA). Simulations with Webots validate the feasibility and efficiency of the presented CPG-based control method.
This paper proposes a new nonlinear approach for 3D motion estimation of a planar object. Based on the premise that the object is a plane or a kind of similar plane, we use LSM (Least Squares Method) to estimate the 3...
详细信息
As technology advances both in increasing bandwidth and in reducing latency for I/O buses and devices, moving I/O data in/out memory has become critical. In this paper, we have observed the different characteristics o...
详细信息
ISBN:
(纸本)9781424456581
As technology advances both in increasing bandwidth and in reducing latency for I/O buses and devices, moving I/O data in/out memory has become critical. In this paper, we have observed the different characteristics of I/O and CPU memory reference behavior, and found the potential benefits of separating I/O data from CPU data. We propose a DMA cache technique to store I/O data in dedicated on-chip storage and present two DMA cache designs. The first design, Decoupled DMA Cache (DDC), adopts additional on-chip storage as the DMA cache to buffer I/O data. The second design, Partition-Based DMA Cache (PBDC), does not require additional on-chip storage, but can dynamically use some ways of the processor's last level cache (LLC) as the DMA cache. We have implemented and evaluated the two DMA cache designs by using an FPGA-based emulation platform and the memory reference traces of real-world applications. Experimental results show that, compared with the existing snooping-cache scheme, DDC can reduce memory access latency (in bus cycles) by 34.8% on average (up to 58.4%), while PBDC can achieve about 80% of DDC's performance improvements despite no additional on-chip storage.
In this paper a novel orthogonal 6-DOF (Degree Of Freedom) parallel robot with redundant actuation is studied as an earthquake motion simulator. Taking the practical simulation of earthquake waves into consideration, ...
详细信息
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP...
详细信息
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.
This paper proposes a novel digital watermarking technique based on BP neural networks in wavelet domain. Firstly, the original image is decomposed by DTCWT, and then the watermark bits are added to the selected coeff...
详细信息
This paper proposes a novel digital watermarking technique based on BP neural networks in wavelet domain. Firstly, the original image is decomposed by DTCWT, and then the watermark bits are added to the selected coefficients blocks. Because of the learning and adaptive capabilities of neural networks, the trained neural networks can recover the watermark from the watermarked images. Experimental results show that the proposed scheme has good performance against several attacks.
We study the asymptotic throughput for random extended networks , where n ad hoc nodes are randomly deployed in a square region R ( n ) = 0 , n 2 . We directly consider the multicast throughput to unify the unicast an...
We study the asymptotic throughput for random extended networks , where n ad hoc nodes are randomly deployed in a square region R ( n ) = 0 , n 2 . We directly consider the multicast throughput to unify the unicast and broadcast throughput, and design a new multicast scheme under the generalized physical model based on the so-called secondary highways system . Taking account of all possible cases of n s = ω (1) and 1 ⩽ n d ⩽ n − 1, we derive the achievable multicast throughput, where n s and n d denote the number of sessions and the number of destinations of each session. We prove that for some cases in terms of n s and n d , our scheme achieves better throughput than the existing schemes.
暂无评论