The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of internet and information technology, educational informatization is increasingly focusing on the use of modern technology to provide powerful teaching assistance. Learning resources intelligent recommendation is essential in Smart Education. The paper proposes two aspects of recommendation strategy. First is the basic recommendation strategy, which includes teaching process,...
Differential privacy (DP) is a promising tool for preserving privacy during data publication, as it provides strong theoretical privacy guarantees in face of adversaries with arbitrary background knowledge. Histogram, as the result of a set of count queries, serves as a core statistical tool to report data distributions and is in fact viewed as the fundamental method for many other statistical analysis...
Execution time is an important indicator of Service Level Agreement. Software as a Service providers expect to finish all queries before their respective deadlines and avoid penalties in violation of agreements. Hence, caching frequently occupied multi-tenant data is an efficient way of reducing execution time and penalty cost. However, it is difficult to minimize penalty cost through choosing cached...
This article provides an overview of the challenges of big data, in the aspects of data scale, data heterogeneity, data timeliness, and demand for deep analyzing, in correspondence with four features of big data. It also presents an overview of trends of big data analytics both in theory and technique, with the development of testing benchmark, visualization technology, advanced and mixed architecture,...
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme...
Radio Frequency Identification (RFID) is one of the key technologies for Internet of Things (IoT). Due to the limitations of processing capability, storage space and power supply of RFID tag, the traditional security mechanisms cannot be used directly. In addition, the existing security threats become more severe towards RFID authentication scheme. In this paper, we propose an Efficient Secure Lightweight...
In this paper, we introduce a rapid method to classify protein structures. Instead of using the 3D structures of proteins directly, we used 2D inner-distance matrices converted from the 3D protein structures and extracted feature vectors from the 2D inner-distance matrices. We divided the matrices into a training dataset and a testing dataset. We then employed a 2D Hidden Markov Model (2DHMM) to classify...
As the go as the vigorous development of Chinese nuclear power industry, nuclear power technology is increasingly mature. During Nuclear power plant construction preparation period, a large number of production materials need to be standardized and need professional management, which are still needing to be solved. This paper uses ECP system (take equipment management as the center of production materials...
Post-translation modification (PTM) plays a significant role in the understanding of protein functions. However, PTM identification is a very challenging problem in proteomics research field. In this paper, a dynamic time warping (DTW) model is introduced to find the optimal match between an experimental tandem mass spectrum (MS/MS) and a theoretical spectrum generated from a peptide sequence in a...
The accumulation of huge amount of biology data and their heterogeneity has become a bottleneck in the analysis of protein-protein interaction (PPI) networks, especially in the visualization of PPI networks. Because the format of the data generated from different experimental groups is diverse, and the databases for the storage and management of the data are different, network visualization of the...
Recently, we have proposed a handwriting Chinese character database HIT-OR3C. Though it has been introduced in detail, to date, it has not been evaluated by any handwriting recognition method. To help the researchers use this database for algorithm evaluation, we propose the structure of HIT-OR3C database. Moreover, we evaluate the OR3C database with a series of experiments using state-of-the-art...
For the current “Model islands” problems which occur in the process of the geography modeling and model sharing, we propose an idea of geography model sharing and reusing method which based on the metadata standard in distributed environment. This article mainly solves how to describe and manage the geography model to achieve the model sharing and reuse. We work on the design of the metadata standard,...
Finding the longest cycle is a novel concept in biochemical feedback loop analysis in systems biology. Biochemical networks are often represented as directed graphs in which vertices represent chemical compounds and edges represent chemical reactions between compounds. Therefore, a biochemical longest feedback loop can be formulated as the longest cycle in a directed graph. Because finding the longest...
Result caching is an efficient technique for reducing the query processing load, hence it is commonly used in search engines. In this paper, we study query result caching and proposes a cache management policy for achieving higher hit ratios compared to traditional heuristics methods. Our cache management policy comprises an eviction policy and an admission policy, and it divides the memory allocated...
Due to the limitation of the firewall and intrusion detection system in the information security domain, intrusion prevention system (IPS) appeared. It is a new generation information security technology following the firewall and intrusion detection technique. It is also a secure product that protects the network and system in real time from attacking, and now becomes a hotspot of research in network...
Aspect-Oriented Programming (AOP) is good at solving the difficulty in Object-Oriented Programming (OOP) of crosscutting concerns, and loosens the system from higher standpoints. Based on the characteristics of web application system, this paper introduces the AOP idea into it, and designs a kind of multi-player architecture based on MVC, emphasizes on the analysis of crosscutting concerns in web...
Video has become popular in our daily life for both professional and consumer applications. Both low level video processing and high level semantic video analysis are critically computational tasks in application domains. Most of current video computing tools are developed for specific analytic tasks, they are lack higher level interoperability with database and treat database merely as a relational...
Recommender systems improve access to relevant products and information by making suggestions based on page ranking technology. Existing approaches to learning to rank, however, did not consider the pages in the deep Web which have valuable information. In this paper, we present a novel product recommendation algorithm based on the content of Web pages including the product information and customer...
How to estimate artifacts on an iris image in polar domain is an important question for any iris recognition system which pursues high recognition rate as its goal. In literature, there are many different existing algorithm that estimate iris occlusion in either Cartesian or polar coordinate. In this paper, our goal is not to propose another new method to compete with existing method. Rather, our...
Contemporary multi-dimensional database technology is severely limited at managing indexed data types of keys for many advanced application. Here, we present an elaborate retrieval method to extend the traditional R-tree, and we call it Generalized R-Tree(GRT). It can serve as an indexing structure in some multi-dimensional database systems. This method mainly addresses the problem of that traditional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.