The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network pharmacology which is based on bioinformatics and system biology knowledge has been employed into the field of Traditional Chinese Medicine (TCM) researches in recent years. In order to summarize current available bioinformatics databases, especially those can be used for TCM formulae study; a systematic search of Chinese literature by May 2017 was conducted. Results showed that research methods...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
In recent years, privacy preserving trajectory data publishing has gained widespread attention. Aiming at the trajectory anonymity issues in publishing trajectory data of moving target, using the inherent uncertainty of the trajectory acquisition system, and based on the case that the uncertain threshold of trajectory is variable in practical applications, the traditional (k, δ)-anonymous model was...
Entropy measures like Approximate entropy (ApEn) and Sample entropy (SampEn) are well established tools to analyze Heart Rate Variability (HRV) data. Critical parameters involved in these computations namely embedding dimension m and tolerance r are in most cases assumed to be 2 and 0.2∗signal SD (standard devaition) respectively. Such assumptions do not work fairly across data sets and thus create...
Distribution entropy (DistEn) is a recent measure of complexity that is used to analyze Heart Rate Variability (HRV) data. DistEn which is a function of data length N, number of bins M and embedding dimension m is known to be stable and consistent with respect to parameters N and M respectively. Also, (N, M) are known to have a combined effect in deciding performance of DistEn as a classification...
In this paper, we propose a novel feature descriptor for person re-identification without personal information. It is called Water-Drop Render Box (WDRB). The WDRB method is calculated by three steps with target color and its histogram: registration of target color, transformation of distance map, and enhancement of color using target histogram. In order to calculate WDRB, person's top-view images...
With a brief on the shortcomings and malpractice underlying in traditional high-frequency laboratories, the paper comes up with the idea of application of virtual instrument into high-frequency laboratory, followed by an introduction of the characteristics of virtual lab platform-LabVIEW. Meanwhile, the feasibility of making use of virtual instrument to function as FM and frequency discriminator is...
The ability of fast similarity search in a large-scale dataset is of great importance to many multimedia applications. Semantic hashing is a promising way to accelerate similarity search, which designs compact binary codes for a large number of images so that semantically similar images are mapped to close codes. Retrieving similar neighbors is then simply accomplished by retrieving images that have...
This paper constructed a whole frame of parallel computing and simulation system in complex electromagnetic environment based on file division idea to improve the compute speed of electromagnetic simulation in complex electromagnetic environment. The system was divided into four modules, client, sever, compute node and database. Compared with other simulation software, this system not only provided...
The national Separate Enrollment in physical education is an independent examination set by the state general sport administration including tests of Extracurricular courses and tests of specialty. Test of Basketball, one of the special tests, consists of 60-metre running, approach run and touch basket board, and shooting in limited time, dribble and shoot from diverse directions, and actual competition...
Using static analysis tools can detect software vulnerabilities, which is important for improving the security of software. Static analysis technology has developed rapidly, but the comparison and evaluation of static analysis techniques and tools are not much. This paper focuses on software vulnerability static analysis techniques and tools. First we discuss the commonly-used static analysis techniques...
A non-intrusive power load decomposition and monitoring system based on multi-agent and visual instrument is given in this paper. Instead of only monitoring of total power load, this system can measure power consumption of each type load consisted in total power load. Since the non-intrusive power load decomposition system has a multilevel and distributed structure, the multi-agent technology is used...
Accurate estimation of fingerprint orientation field is an essential module in fingerprint recognition. This paper proposes a novel technique for improving fingerprint orientation field estimation by fingerprint orientation model based on weighted 2D fourier expansion(W-FOMFE). The motivation for the proposed method can be found by: 1)the original FOMFE is sensitive to abrupt changes in orientation...
In this study we propose a deformable pattern recognition method with CUDA implementation. In order to achieve the proper correspondence between foreground pixels of input and prototype images, a pair of distance maps are generated from input and prototype images, whose pixel values are given based on the distance to the nearest foreground pixel. Then a regularization technique computes the horizontal...
Considering the multi-source information lack of automation management, analysis and evaluation in network security field, a new network security situational evaluation model based on D-S evidence theory is proposed. This method fuses multi-source alarm information through D-S evidence theory, associates with nodes vulnerability information, integrates with the severity of threats, computes the value...
Middleware for wireless sensor and actor network is hard to design because the leverage between the hardware limitation and system complexity. Complex event processing middleware for wireless sensor network is proposed to solve this dilemma. The system utilized the computing power of the network nodes to reduce the network communication data, so that it can save the nodes' energy. The events processing...
A literature review of electronic commerce research in China is presented in this paper. The articles are searched with the keyword “electronic commerce” separately from the core journals and the Engineering Index (EI) journals of the China Academic Journals Full-text Database at www.cnki.net. The distributions of articles published by the core and the EI journals by year and topics are analyzed....
Based on two scenarios, bullish and bearish market, this paper examines the announcement effect of block transfers, using equity transfers information disclosed by 175 firms listed on China's stock markets from October 2006 to October 2008. We find that Cumulative Abnormal Returns (CARs) positively correlate with the block purchases percentage of tradable shares, but negatively correlate with the...
Middleware design for wireless sensor network is a novel approach to solve the complexity of the development and deployment of the wireless sensor network applications. Complex event processing system for wireless sensor network is proposed and evaluated. The system utilized the computing power of the network nodes to reduce the network communication data, so that it can save the nodes' energy. The...
Advances in object detection have made it possible to collect large databases of certain objects. In this paper we exploit these datasets for within-object classification. For example, we classify gender in face images, pose in pedestrian images and phenotype in cell images. Previous work has mainly targeted the above tasks individually using object specific representations. Here, we propose a general...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.