We illustrate a Lyapunov function approach to analyze the stability of 2-D systems described by systems of higher-order linear partial difference equations.
We illustrate a Lyapunov function approach to analyze the stability of 2-D systems described by systems of higher-order linear partial difference equations.
Findings from the current UK national research programme, MEDUSA (Multi Environment Deployable Universal Software Application), are presented. MEDUSA brings together two approaches to facilitate the design of an autom...
详细信息
The prediction of the location of disulfide bridges helps solving the protein folding problem. Most of previous works on disulfide connectivity pattern prediction use the prior knowledge of the bonding state of cystei...
详细信息
The prediction of the location of disulfide bridges helps solving the protein folding problem. Most of previous works on disulfide connectivity pattern prediction use the prior knowledge of the bonding state of cysteines. In this study an effective method is proposed to predict disulfide connectivity pattern without the prior knowledge of cysteins' bonding state. To the best of our knowledge, without the prior knowledge of the bonding state of cysteines, the best accuracy rate reported in the literature for the prediction of the overall disulfide connectivity pattern (Qp) and that of disulfide bridge prediction (Qc) are 48% and 51% respectively for the dataset SPX. In this study, the cystein position difference, the cystein index difference, the predicted secondary structure of protein and the PSSM score are used as features. The support vector machine (SVM) is trained to compute the connectivity probabilities of cysteine pairs. An evolutionary algorithm called the multiple trajectory search (MTS) is integrated with the SVM training to tune the parameters for the SVM and the window sizes for the predicted secondary structure and the PSSM. The maximum weight perfect matching algorithm is then used to find the disulfide connectivity pattern. Testing our method on the same dataset SPX, the accuracy rates are 54.5% and 60% for disulfide connectivity pattern prediction and disulfide bridge prediction when the bonding state of cysteines is not known in advance.
Major challenges of dynamic analysis approaches to specification mining include scalability over long traces as well as comprehensibility and expressivity of results. We present a novel use of object hierarchies over ...
详细信息
Major challenges of dynamic analysis approaches to specification mining include scalability over long traces as well as comprehensibility and expressivity of results. We present a novel use of object hierarchies over inter-object traces as an abstraction/refinement mechanism enabling scalable, incremental, top-down mining of scenario-based specifications.
Many dynamic analysis approaches to specification mining, which extract behavioral models from execution traces, do not consider object identities. This limits their power when used to analyze traces of general object...
详细信息
ISBN:
(纸本)9781605583822
Many dynamic analysis approaches to specification mining, which extract behavioral models from execution traces, do not consider object identities. This limits their power when used to analyze traces of general object oriented programs. In this work we present a novel specification mining approach that considers object identities, and, moreover, generalizes from specifications involving concrete objects to their symbolic class-level abstractions. Our approach uses data mining methods to extract significant scenario-based specifications in the form of Damm and Harel's live sequence charts (LSC), a formal and expressive extension of classic sequence diagrams. We guarantee that all mined symbolic LSCs are significant (statistically sound) and all significant symbolic LSCs are mined (statistically complete). The technique can potentially be applied to general object oriented programs to reveal expressive and useful reverse-engineered candidate specifications. Copyright 2008 ACM.
In the above-named work [ibid., vol. 15, no. 4, pp. 1189-1198, Jul.-Aug. 2009], the biographical information for Dr. Michael S. Shur was incorrect. The corrected biographical information is printed here.
In the above-named work [ibid., vol. 15, no. 4, pp. 1189-1198, Jul.-Aug. 2009], the biographical information for Dr. Michael S. Shur was incorrect. The corrected biographical information is printed here.
作者:
Katos, VasiliosPatel, AhmedSchool of Computing
University of Portsmouth Portsmouth United Kingdom School of Computing
Information Systems and Mathematics Centre for Applied Research in Information Systems Kingston University Kingston upon Thames United Kingdom Department of Computer Science
Faculty of Information Science and Technology University Kebangsaan Malaysia Bangi Malaysia
Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported...
详细信息
Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.
This paper proposes perceptual segmentation of natural color images using a fuzzy-based hierarchical algorithm and its application to the segmentation of dermoscopy images. A fuzzy-based homogeneity measure makes a fu...
详细信息
ISBN:
(纸本)9781424437825
This paper proposes perceptual segmentation of natural color images using a fuzzy-based hierarchical algorithm and its application to the segmentation of dermoscopy images. A fuzzy-based homogeneity measure makes a fusion of the color features and the texture features. The proposed hierarchical segmentation method is performed in four stages: simple splitting, local merging, global merging and boundary refinement. The effectiveness of the proposed method is confirmed through computer simulations that demonstrate the applicability of the proposed method to the segmentation of natural color images and dermoscopy images.
This paper presents an approximate mathematical model that can help Underwater Acoustic Sensor Networks (UW-ASN) to predict mean propagation delay and mean response time over a geographical area. Therefore, a decision...
详细信息
ISBN:
(纸本)1601320817
This paper presents an approximate mathematical model that can help Underwater Acoustic Sensor Networks (UW-ASN) to predict mean propagation delay and mean response time over a geographical area. Therefore, a decision can be made based on the evaluation of all factors regarding the performance measures. In this paper, we consider the case of a single sink, which is responsible for all information requests, in a specific territory on a first come first served basis, and data is transmitted in peer-to-peer mode.
暂无评论