The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sequence data plays an important role in data analysis applications, such as sequence classification. One important aspect of sequence data analysis is to obtain the labeled sequence data and use a machine learning model to predict the sequence structures. Conditional Random Fields (CRF) is such a machine learning method which is popular used in sequential data analysis. This is because that CRF can...
To measure the performance or validity of clustering algorithms, several evaluation values, such as successful rate, successful number and full successful rate are defined. In order to ensure each cluster to at least contain one vector data, and to maximize several proposed evaluation values, two class assignment algorithms are designed. To testify their performance, we employ them to the k-means...
Sequence alignment is widely used in bioinformatics for revealing the genetic diversity of organisms and annotating gene functions by finding regions of similarity across biosequences. Such alignment requires sequences to be represented in the DNA or protein alphabet for tools such as Clustal to work. Previous work has demonstrated the feasibility of applying biosequence multiple alignment techniques...
A priori knowledge neural network is presented to model on the relationship between the port logistics capacity and coastal marine economic growth in Zhejiang province in China. Compared to other methods (such as general GM (1, 1) based time series model), the PKNN with multivariate and time series method has better performance. And, it is validated by predicting the level of coastal ocean economic...
The Harmony Search (HS) method is an emerging meta-heuristic optimization algorithm. However, it is generally not so efficient in dealing with multi-modal optimization problems, in which instead of only a single optimum, multiple optima need to be found. In our paper, a novel HS method based on the niching technique (deterministic crowding), n-HS, is proposed and studied to overcome this shortcoming...
As information security chips are more widely used in the field of information security, the security of chips becomes increasingly important, which has also been a hot research field of information security. With the advances in technology, a chip-invasive method of attack which uses laser or focused ion beam (FIB) to change the chip's internal signal line, and then probe the chip's secret information...
When user wants to access a network service, he/she must authenticate his/herself to the server. With the increasing of the different network services, it is extremely hard for user to remember the different ID and password, so the multi-server authentication protocols have been proposed to solve this problem. There are some authentication protocols for multi-server architecture using smart cards,...
Quality of Service supported multicast has attracted more attentions in the last few years and is regarded as an important communication mechanism for implementing real-time multimedia applications in Next Generation Internet. Considering the difficulty on exact measurement and complete expression of network parameters, an intelligent QoS multicast routing algorithm based on Mind Evolutionary Computation...
Computed tomography (CT) is widely used in industrial nondestructive testing (NDT). The projection data of CT usually contain serious noises. In this situation, compared with conventional filtered back projection (FBP), total variation ordered subsets simultaneous algebraic reconstruction technique (TV-OS-SART) is a better reconstruction method. However, image noise will increase after some iterations...
A novel image fusion algorithm based on non-sub sampled contour let transform(NSCT) and Bandelet transform is proposed in this paper. As two different MGA tools, NSCT can give an asymptotic optimal representation of edges and contours in image by virtue of its characteristics of good multi-resolution, shift invariance, and high directionality, and Bandelet transform can take advantage of the geometrical...
In this paper, a new auxiliary function with one parameter for box constraint is proposed. It can escape from the current local minimizer to arrive at a lower local minimizer and can finally go to a global optimal solution. First, a new definition of the filled function for box constrained minimization problem is given, and under mild assumptions, this new auxiliary function can be proved to be a...
With the swift development of computer network and digitalization technology, researches on the digital copyright protection becomes specially important. Images, texts, and common signatures are used as invisible watermarks in traditional digital copyright protection systems, which will lead to a complicated embedding process. In this paper, JUNA(Joint Unit for Numbering Algorithm) Lightweight Digital...
Online retailers are facing increasing competitions, thus, it is very important for them to attract and retain online customers. However, many factors can affect customer trust in online retailing (E-satisfaction) environment. This paper investigates the factors and their impacts on customer E-trust in online retail (B to C, C to C) in China. Based on the literature review and an exploratory study...
Virtualization technology is the basis of cloud computing. Multiple virtual machines on a single physical host are isolated from each other. However, covert channel breaks the isolation and leaks sensitive information covertly. In this paper, we construct one type of classic covert timing channel, the on/off channel, on the Xen hyper visor using shared memory. And then we evaluate its bit rate and...
A scheme is proposed to hide data in images based on a prioritised ordering of the content of the host image. The embedding process uses the watermark strength to determine the ordering of the 16 regions resulting from the second level wavelet transform DWT decomposed content of the host image. The DWT decomposed sub-bands of the cover image were analysed, transformed using the Pixel Value Difference...
Radio Frequency Identification (RFID) poses multiple advantages over traditional barcodes, such as hands-off detection, longer read range and more data storage. In addition, the declining cost of RFID systems along with improved sensitivity and durability nowadays has increased its usage potential in a variety of domains such as logistical, planning and supply chain process. However, the deployment...
Aims at the complexity of print-scan process, this paper presents a scheme to construct print-scan model using BP (Back Propagation) Neural Network principles. In this scheme, print-scan process is treated as a black-box. Firstly, divide RGB color space into several color blocks, get the color mapping table between the original colors and that after PS operation. Then obtain the trained net model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.