The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
K-Anonymity technique is a useful way to protect privacy in information sharing. This paper presents a practical framework for implementing one type of k-anonymization, based on which a greedy algorithm named Nibble for producing approximately minimal generalizations is introduced. Experiments show that Nibble often reflects the multivariate distribution of the microdata more faithfully than the multidimensional...
Hemiparesis is the most common impairment after stroke, the leading cause of adult disability in the United States. The initial severity of hemiparesis had been the strongest predictor of neuromotor functional recovery level. However, the intervention response of stroke survivors does not always correlate with their initial level of impairment. This implies the existence of other factors that may...
Hemiparesis is the most common impairment after stroke, and the initial severity of hemiparesis had been the strongest predictor of neuromotor functional recovery level. However, the intervention response of stroke survivors does not always correlate with their initial level of impairment, which implies the existence of other factors that may significantly affect stroke survivors' recovery process...
Worldwide health scientists are producing, accessing, analyzing, integrating, and storing massive amounts of digital medical data daily, through observation, experimentation, and simulation. If we were able to effectively transfer and integrate data from all possible resources, then a deeper understanding of all these data sets and better exposed knowledge, along with appropriate insights and actions,...
This paper presents a linear discriminant analysis based measurement (LDAM) on the output from classifiers as a criterion to reject the patterns which cannot be classified with high reliability. This is important in applications (such as in processing of financial documents) where errors can be very costly and therefore less tolerable than rejections. To implement the rejection, which can be considered...
The pyrolysis of straw was one of the important ways for biomass utilization. Chemical structure of straw lignin had great impact on the decomposition process of straw. In this paper, lignin molecule was modeled with an average structure method and optimized with Density Functional Theory (DFT). The most stable conformations of structural units and structural model of straw lignin were obtained by...
Differential signaling is widely used in high speed data communications. Inter-symbol interference (ISI) and crosstalk between differential pair, however, heavily affect the integrity of differential signaling as measured by timing jitter and amplitude noise in the eye diagram. To reduce the impact of ISI, a pre-emphasis filter is commonly used, but it increases the crosstalk noise. In this paper,...
It is unknown how to include stochastic process variation into fast multipole method (FMM) for a full chip capacitance extraction. This paper presents a parallel FMM extraction using stochastic polynomial expanded geometrical moments. It utilizes multiprocessors to evaluate in parallel for the stochastic potential interaction and its matrix vector product (MVP) with charge. Moreover, a generalized...
Power distribution networks (PDNs) are designed and analyzed iteratively. Random walk is among the most efficient methods for PDN analysis. We develop in this paper an incremental and on-demand random walk to reduce iterative analysis time. During each iteration, we map the design changes as positive or negative random walks for observed nodes. To update PDN analysis result, we only need to apply...
Dominance-based Rough Set Approach (DRSA) is an extension of classical Rough Set Theory (RST) to deal with inconsistent problems. Approximation of class unions is the key method of DRSA and it is a very complex computing job. However, the formal work within DRSA only proposed relative definitions of the concept including approximation of class unions, but no efficient algorithm has been given. So...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.