The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Gene hierarchy of the National Cancer Institute (NCI) Thesaurus (NCIt) is of high priority for NCI. It is important to have quality assurance (QA) techniques to improve its content quality. We present a two-step methodology concentrating on auditing the modeling of complex concepts, which are shown to have a higher error rate compared to control concepts. In the first step, we test whether concepts...
Big Knowledge repositories, in the form of large ontologies, typically consist of many thousands of knowledge assertions. They have complex network structures consisting of nodes and links. Without some form of comprehension, humans cannot make correct, innovative and creative use of Big Knowledge. Visualization is an important tool for knowledge comprehension, however, the node-link diagrams become...
The rapid development of the Internet of Things (IoT) has brought great changes for non-contact and non-destructive sensing and diagnosis. For every inanimate object can tell us something by the sound it makes, acoustic sensor demonstrates great advantages comparing to conventional electronic and mechanic sensors in such cases: overcoming environmental obstacles, mapping to existing use cases of detecting...
Emerging Internet of Things(IoT) applications are moving from silo and small scale sensor data sharing to composite and large scale ones. With the rapid growth of application scale, IoT applications is going to leverage cloud infrastructure for scalable solutions and real-time services. Thus large volumes of heterogeneous and high frequency sensor data are fed into IoT cloud services for real-time...
The semantic collocations play important roles in parsing Chinese phrases. They are useful for both semantic disambiguation and structural disambiguation. In this paper, a representation of phrase semantic rules for Chinese is presented to formulate such knowledge, and a corpus-based method was proposed to acquire phrase semantic rules from a Chinese phrase corpus annotated with syntactic and semantic...
For the purpose of dealing with closely-spaced and spectrally-overlapped sources, a direction-of-arrival (DOA) estimation algorithm based on time-frequency (TF) sparse representation is proposed. Firstly a short-time Fourier transform (STFT) based single-source TF points selection method is briefly introduced. On this basis, we extract the STFT values corresponding to the single-source TF points of...
The rapid development of nanotechnology, such as microelectromechanical systems (MEMS), microelectronics and nanophotonics, has led to the emerging attentions in achieving functional optoelectronic structures and/or metamaterials at micro and nanoscale resolution. Multiphoton absorption nanofabrication has demonstrated its great potential for applications in preparation of complex three-dimensional...
We present an improved RRT* to blend lane information and avoid obstacles in this paper. Unlike most of other improved RRT*, this paper attach great importance to the convergent goal of RRT*. We consider the condition that there exists a reference path, maybe not the shortest path, but the environment requires the vehicle to follow, such as a lane center. Compared with standard RRT* applied to differential...
Nowadays, a growing number of researchers devote themselves to re-excavation of existing biomedical knowledge discovery, focusing on how to establish associations between clinical and genomic data. However, quantitative analysis is still inadequate for a particular disease. Colorectal cancer is the one of malignant tumors whose molecular mechanism is relatively clear, making it a more appropriate...
Many strategies have been exploited for the task of feature selection, in an effort to identify more compact and better quality subsets. The use of an evaluation metric have been developed recently that can judge the quality of a given subset as a whole, rather than a combination of individual features. Powerful nature-inspired stochastic search techniques have also emerged, allowing multiple good...
SSH protocol is commonly used to connect to a server in the enterprise network for operation and maintenance (O&M). However, it also brings some security problems in the monitoring and auditing because the protocol itself encrypts and compresses the transmission data. This article will introduce an SSH protocol audit system based on the proxy technology. Our system can completely monitor all...
With the in-depth development of the electric power information technology, the operation and maintenance of equipment and software become more complex; the technique requirement becomes more and more difficult, and the security risks expose. The safe operation of the power enterprise information systems, not only directly relates to business efficiency, but also affects the power production and national...
As with the constantly development of globalization, different countries and regions have been closely linked. The flow of international capital, technology, product and labor creates new chance for the conflicts and blends of diverse cultures. In such a background, individuals' creativity plays a critical role in the development of itself and enterprises. An increasing number of researches have focused...
It is one of the most important that the cable ampacity correctly under transient conditions is defined to guarantee the safe operation of cable. In this paper, the calculation of cable ampacity is based on the method provided by IEC60287 and IEC60853 standard. An ampacity calculation program for screened 10kV XLPE cables, based on the thermal circuit technique, is developed in MATLAB language. By...
CWMP (CPE WAN Management Protocol) as the protocol for remote management of home network devices and terminals, provides a safe remote auto configuration of end-user devices within WAN. In this paper, we introduce the CWMP in detail and describe the design and realization of a distributed network management system based on it, which provides network managers with a centralized remote management platform...
According to the business characteristics and functional requirements of the smart grid information and communications technology platform, in this paper, we proposed layered architecture of Internet of Things for smart grid and four links of things of transmission of electricity, substation of electricity, distribution of electricity and usage of electricity, and compared it with the traditional...
With the automation level of the computer networks and grid rising, the dependence of the electric power enterprise on information systems is growing, while the security problems faced by become stronger, so using traditional security technologies only to maintain the system security can no longer meet the enterprise requirements. In this paper, against the information network characteristics of the...
When power cables cross regions with unfavorable thermal conditions, the conductor temperatures higher than the design value can occur; the ampacity of the rated cable is significantly affected for high thermal resistivity in thermally unfavorable regions. This paper presents a three-dimensional heat network model with consideration the heat flow in two directions-radial and longitudinal. The algorithm...
A new ECG baseline removal method is presented in this paper. This method is based on the Savitzky-Golay polynomial smoothing filter. Since this filter is defined in the time domain, it has the advantage of following the trend of the baseline wander. The results from this method are compared to the cubic spline method and a heart rate adaptive high-pass filter. The comparison shows that the SG baseline...
This research categorized U-turn at Signalized Intersections into mainly four modes, designating them as Mode A,B,C,D: Mode A, at the Downstream Section of the Stop Line; Mode B, at Upstream Section of the Stop Line; Mode C, at the Right Side of the Ingress; Mode D, at the Upstream Section of the Transition Zone. We first evaluate their respective efficiency level, and then set up an efficiency evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.