The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In eukaryotes, protein ubiquitylation is an important type of post-translation modification, in which the ubiquitin conjugates to a substrate protein. To have a better insight of the mechanisms underlying ubiquitylation, a key step is to identify protein ubiquitylation sites. Many existing computational methods are based on feature engineering, which may lead to biased and incomplete features. Deep...
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the...
In functional genomics, small interfering RNA (siRNA) can be used to knockdown gene expression. Usually, a target gene has numerous potential siRNAs, but their efficiencies of gene silencing often varies. Thus, for a successful RNA interference (RNAi), selecting the most effective siRNA is a critical step. Despite various computational algorithms have been developed, the efficacy prediction accuracy...
Accurate and timely measurement of key performance variables is crucial for safe and economic operation of industrial processes. In the cold steel rolling process, strip thickness is the key performance indicator. However, due to time delay, it can be difficult to measure accurate and timely values. Therefore, a soft sensor can be used to provide timely and accurate values. This paper proposes a new...
The Moon-based Extreme Ultraviolet Camera (EUVC) installed on the lunar lander of Chinese Chang'e 3 mission can obtain global and instantaneous EUV images of the Earth's plasmasphere in meridian view (side view). The movies of the continuously observed time-series images by EUVC reveal the dynamic variations of the plasmasphere during substorms. The EUVC instrument, observations of plasmasphere, data...
Formal program verification is a powerful technique to ensure the correctness of programs. To perform this technique, one oftentimes needs to manually specify assertions, which is a time-consuming and error-prone task. Generating assertions automatically can significantly improve the usability of formal program verification. To decide where an assertion is needed heavily and which value range of the...
Large-scale infrastructures are critical to economic and social development, and hence their continued performance and security are of high national importance. Such an infrastructure often is a system of systems, and its functionality critically depends on the inherent robustness of its constituent systems and its defense strategy for countering attacks. Additionally, interdependencies between the...
We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function...
Organizations often share business data with third-parties to perform data analytics. However, the business data may contain a lot of customers' private information. One major concern of these organizations is thus to ensure such private information is properly used. In this paper, we present PSpec, a formal language for specifying data usage restrictions in distributed data analytics. Compared with...
Pipeline failures due to natural disasters, corrosion and manufacturing defects have generated tremendous economic loss. To recover efficiently from disruption with minimum loss, we propose a multi-objective optimization model that minimizes both the loss from disruption and recovery time. Recovery on disrupted pipelines may incur additional recovery cost but it can alleviate the cost of unmet demand...
We consider a System of Systems (SoS) wherein each system Si, i = 1, 2,…, N, is composed of discrete cyber and physical components which can be attacked and reinforced. We characterize the disruptions using aggregate failure correlation functions given by the conditional failure probability of SoS given the failure of an individual system. We formulate the problem of ensuring the survival of SoS as...
Two-way decode-and-forward (DF) relay technique is an efficient method to improve system performance in 5G networks. However, traditional orthogonal frequency division multiplexing (OFDM) based two-way relay systems only consider a per-subcarrier relay strategy, which treats each subcarrier as a separate channel, which results in significant sum rate loss, especially in fading environments. In this...
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and correctness of cryptographic implementations, and protocol consistency should be well proven before being applied in practice. Software verification has...
The curse of dimensionality in machine learning we are introducing in this paper is caused by increasing data, and the research focus of feature selection is described. The formalized definitions of redundancy and relevance of feature are presented. Based on entropy and mutual information of information theory, the issue of how to measure the relevance between features is discussed. The main contributions...
The automation of disease diagnosis is confronted with three important problems which are class imbalance, sampling bias and cost sensitivity. In order to make a reasonable representation of the imbalance state, class distribution histogram and likelihood are devoted to measuring degree of its imbalance. A cost optimization model for disease diagnosis is proposed, which be successfully used in disease...
Japanese word segmentation in the specialized field is the difficulty of building the Scientific Japanese Corpus. This paper deeply studied the basic problem of the word segmentation. They are ambiguity and words without login. In this paper we tried to use the ART network and immune principle to solve the problem of Japanese word segmentation, more than 90% of the words are correctly separated by...
Many critical infrastructures are composed of multiple systems of components which are correlated so that disruptions to one may propagate to others. We consider such infrastructures with correlations characterized in two ways: (i) an aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) a pairwise...
Bias field which existed in MR image had an unfavorable influence on analyzing medical image, especially for medical image segmentation. To solve it, this paper proposed an approach which is based on energy minimization to estimate bias field where exists in the MR image, finish brain tissue segmentation, meanwhile. This method fully utilize the properties of factual information and bias information...
In several critical infrastructures correlations between the constituent systems represent certain vulnerabilities: disruptions to one may propagate to others and possibly to the entire infrastructure. The correlations between the systems are characterized in two ways in this paper: (i) the aggregate failure correlation function specifies the conditional failure probability of the infrastructure given...
In a Gaussian two-way Decode-and-Forward (DF) Orthogonal Frequency Division Multiplexing (OFDM) relay network, the achievable rate region can be effectively improved by proper power allocation. However, when joint coding among all subcarriers is considered during the multiple-access (MAC) phase, the complicated multi-user detection (MUD) operation at the relay node has to be performed to approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.