The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The alterations of brain structures and functions have been considered closely correlated to the change of cognitive performance due to neurodegenerative diseases such as Alzheimer’s disease. In this paper, we introduce a variational framework to compute the optimal transformation (OT) in 3D space and propose a univariate neuroimaging index based on OT to measure such alterations. We compute the OT...
The project of Analysis on the Wire (AoW) at Brookhaven National Laboratory has the goal of executing generic computations in the network fabric, "on the wire," to sup-port early decision making. We are research-ing, developing, and evaluating hardware and software mechanisms and middleware to be used for data analysis on the wire. We further pursue to address several complex challenges...
The twin support vector regression (TSVR) is gaining more and more attention nowadays in the field of regression due to the remarkable generalization performance and satisfactory accuracy. Generally the kernel function with constant parameters in the TSVR is not suitable for obtaining desirable mapping performance when the modeling data are needed to be updated frequently, especially in the condition...
We experimentally demonstrate a DMT transmission system with 1.55-μm EML using nonlinearity-aware time domain super-Nyquist image induced aliasing. Compared with linear equalization, the capacity is improved by ∼16.8%(33.1%) with proposed method for 4(40) km transmission.
Detecting single nucleotide polymorphism (SNP) epistasis contributes to understand disease susceptibility and discover disease pathogenesis underlying complex disease. In this paper, we propose an approach called permutation-based Gradient Boosting Machine (pGBM) to detect pure epistasis by estimating the power of a GBM classifier which is influenced by permuting SNP pairs. pGBM is based on two permutation...
With the rapid development of cloud computing and big data, there are more and more small files. How to manage those massive small files efficiently and provide low-latency service is becoming a hot topic in Parallel Network File System (pNFS). When reading massive small files in pNFS, because metadata access frequency is fairly high, and disk efficiency is rather low, massive small file access performance...
We propose and experimentally demonstrate a LED based multi-user asynchronous full-duplex visible light communication system using OFDM/OQAM and subcarrier multiplexing. With the spectrally well-localized OFDM/OQAM signal, cyclic prefix free operation and quasi-gapless SCM are achieved.
Matchmaking is an everlasting topic in human society. In this paper, we focus on human attractiveness in matchmaking for the new generation of individuals in China based on If You Are The One, a famous dating game show in China. We collect a comprehensive contestant dataset, including numeric, text and image attributes. We investigate the influence of various factors on human attractiveness using...
As a cross-disciplinary, speech recognition is based on the voice as the research object. Speech recognition allows the machine to turn the speech signal into text or commands through the process of identification and understanding, and also makes the function of natural voice communication. Speech recognition involves many fields of physiology, psychology, linguistics, computer science and signal...
Currently, with the large number of data and the increasing importance of it, how to find useful pattern in the large data, has become an important application of data mining. The rough set attribute reduction algorithm, used to study how to contain the same information when we use fewer properties to describe the objects, has been more widely used, so that the concept of soft computing is becoming...
In this paper, demand response management is studied in the presence of volatile renewable energy resources. The renewable energy production is modeled as a stochastic process. In this setting, consumer utility, cost of energy production, cost of energy shortfall due to the randomness in renewable energy generation are taken into account, and the maximization of the total social welfare over all possible...
This paper introduces the transplantation process of the camera driver, and then builds the Boa Web Server to complete the monitoring function. The server sends the image to the network, and then we can do video monitoring or image collecting function through the window or webpage in the Linux system. So this system realizes the remote monitoring. This system uses the S3C2440 microprocessor and 301...
A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie-Hellman key exchange...
Production system consists of several sub-systems, and there exists complex interactions between sub-systems. Also, the production system itself has to adapt to the environment. Based on the definition of enterprise production system and complex adaptive system (CAS) theory, this paper built a basic structure for enterprise production system, analyzed the components, sources and features of enterprise...
In this paper, achievable rates and resource allocation strategies for imperfectly known two-way relay fading channels are studied. Decode-and-forward (DF) relaying is considered. It is assumed that communication starts with the network training phase in which the users and the relay estimate the fading coefficients, albeit imperfectly. Subsequently, data transmission is performed in multiple-access...
To achieve privacy protection better in data publishing, data must be sanitized before release. Research on protecting individual privacy and data confidentiality has received contributions from many fields. In order to grasp the development of privacy preserving data publishing, we discussed the evolution of this theme, focused on privacy mechanism, data utility and its metrics. The privacy mechanism,...
In this paper, a cognitive relay channel is considered, and amplify-and-forward (AF) relay beamforming designs in the presence of an eavesdropper and a primary user are studied. Our objective is to optimize the performance of the cognitive relay beamforming system while limiting the interference in the direction of the primary receiver and keeping the transmitted signal secret from the eavesdropper...
I/O consolidation is a growing trend in production environments due to increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to serve multiple applications simultaneously. It is imperative to ensure that these applications are insulated from each other by virtualization in order to meet any service-level objective (SLO) which represent application requirements...
The security flaws of a direct anonymous attestation scheme proposed by He et al. was analyzed, and the result shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerading attacks when being used for remote attestation. An improved direct anonymous attestation authentication scheme with the involvement of key agreement was proposed to provide the property...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.