The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In search of good prediction algorithm of thermostable proteins is an important issue. In this paper, a novel prediction algorithm of thermostable proteins by using Hurst exponent and Choquet integral regression model based on lambda-measure and gamma-support is proposed. This method not used before is the first one integrating the physicochemical properties, fractal property and Choquet integral...
With rapid advance of the network and data mining techniques, the protection of the confidentiality of sensitive information in a database becomes a critical issue when releasing data to outside parties. Association analysis is a powerful and popular tool for discovering relationships hidden in large data sets. The relationships can be represented in a form of frequent itemsets or association rules...
Shuffled frog-leaping algorithm (SFLA) is a new memetic meta-heuristic algorithm with efficient mathematical function and global search capability. Traveling salesman problem (TSP) is a complex combinatorial optimization problem, which is typically used as benchmark for testing the effectiveness as well as the efficiency of a newly proposed optimization algorithm. When applying the shuffled frog-leaping...
A firewall is a system that provides security to a network, and it exists at the interface between a private network and the Internet. All incoming and outgoing packets have to pass through the firewall via several different layers. Gamage, Leiwo, and Zheng have studied the verification of message authentication in the firewall application layer on the basis of digital signcryption. Encrypted message...
In this paper, a weight method with using a reduced lookup table is developed to decode the three possible errors in (15, 5, 7) and (31, 16, 7) BCH code. The data in the reduced lookup table consists of syndrome patterns and corresponding error patterns which only have one and two errors occurred in the message block of the received codeword. The proposed algorithm makes use of the properties of cyclic...
Based on analysis on video retrieval issues among different time scales, a dynamic time warping (DTW) optimal matching algorithm is proposed in this paper. Firstly the sub-segments detection algorithm was used to separate the video into several consecutive sub-segments; furthermore, the video similarity matching algorithm on the basis of sub-segments was used to implement the retrieval process. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.