The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The intend of this paper is to introduce a new method for protein complex identification. Proteins share an important role by signaling cells. Proteins are three dimensional objects and any types of deformed proteins can cause severe disease, because their function is related to their shape and also the amino-acid sequence they have coded with. Technically speaking similar types of proteins tend to...
Host-based intrusion detection systems (HIDSs), especially anomaly-based, have received much attention over the past few decades. Over time, however, the existing data sets used for evaluation of a HIDS have lost most of their relevance due to the substantial development of computer systems. To fill this gap, ADFA Linux data set (ADFA-LD) is recently released, which is composed of thousands of system...
In viewpoint of noncausal and non-integeral dimensional signal processing, a novel and computationally efficient, fractional zero-phase FIR filter is proposed by a definition of Liouville-Weyl fractional integrator. Based on two commonly used Liouville and Weyl fractional integral definitions, we present Liouville fractional linear phase delay filter and Weyl fractional linear phase lead filter. Thanks...
Multi-instance learning concerns about building learning models from a number of labeled instance bags, where each bag consists of instances with unknown labels. A bag is labeled positive if one or more multiple instances inside the bag is positive, and negative otherwise. For all existing multi-instance learning algorithms, they are only applicable to the setting where instances in each bag are represented...
System-call is the interaction interface between operation system and uses program. Program runs without system calls. in this paper, Analysis of linux system-calls on the ARM processor implementation principle, Describes the structure of the system-call, Involving the four main contents of Kernel files made some references, Combined with a simple example to illustrate the linux system-calls based...
Complex disorders exhibit great heterogeneity in both clinical manifestation and genetic etiology. This heterogeneity substantially limits the identification of geneotype-phenotype associations. Differentiating homogeneous subtypes of a complex phenotype will enable the detection of genetic variants contributing to the effect of subtypes that cannot be detected by the non-differentiated phenotype...
Learning algorithms of the support vector machine is to map the input vector to a high dimensional space through certain kernel function and separate the image of the original linear input vector with the maximum of interval under consideration. This paper is about the limb motion recognition problem of stroke patients, mapping the input vector to the reproducing kernel RKHS (reproducing Kernel Hilbert...
In recent years, information leakage cases happen frequently and are one of big problems. 70% of such a cases are caused by human factors such as mismanagements and/or careless operations. Such a factors can be removed by the control of information flow and/or the check of computer operations. Therefore, some studies to control information flows have been proposed. However, almost studies focus on...
Navigation-assistance systems using feature-based geographic Electronic Navigation Chart (ENC) data are widely employed to help ensure the safety of vessels and their crews. ENC data consist of descriptions of the characteristics of features along with geographic information on them. Because they are created and delivered according to the IHO standards, they are encoded in data transfer formats such...
Crowd density estimation is the fundamental content and central issue in most public video monitoring systems, and it is also a hot spot in computer vision area. Recent state-of-the-art method is based on image processing. Traditional methods can be divided into two main directions, one is based on pixel statistics, and the other is based on texture analysis. In our paper, we combine these two methods...
The blurring in image comes either from the acquisition noise, or from image editing operation. The produced adverse noise during acquisition need to be eliminated, and the blurring generated by editing should be known in digital forensics, so the blur kernel recovery is significant in community of image processing and computer graphics. In the log-fourier domain, the images before and after blurring...
Multi-task concurrent execution and resource sharing based on preemptive scheduling strategy may cause priority inversion phenomenon in real-time systems. Priority inversion phenomenon is the significant reason of unpredictable errors in real-time system, serious continuous priority inversion phenomenon will lead to real-time system collapse. The paper analyzes the phenomenon and the cause of the...
Detecting the banknote serial number is an important task in business transaction. In this paper, we propose a new banknote number recognition method. The preprocessing of each banknote image is used to locate position of the banknote number image. Each number image is divided into non-overlapping partitions and the average gray value of each partition is used as feature vector for recognition. The...
In this paper an improved algorithm of computational verb PID controller is proposed. In the original design of verb PID controller, the modification of integral gain is coupled with that of the derivative gain. In this paper, the integral gain is modified independently by using a separated set of computational verb rules. The comparisons of tracking performance and robustness among conventional PID...
In order to detect resource related faults in operating system, an approach based on path-insensitive analysis is proposed. The approach, which can detect a wider variety of resources issues, is context-sensitive. Test cases to identify errors are automatically generated. The models for the C code and resource related faults are set up. Furthermore a platform for resource faults detection is developed...
A little over a decade ago, Goto and van de Geijn wrote about the importance of the treatment of the translation lookaside buffer (TLB) on the performance of matrix multiplication. Crucially, they did not say how important, nor did they provide results that would allow the reader to make his own judgement. In this paper, we revisit their work and look at the effect on the performance of their algorithm...
In this paper, we demonstrate a new approach for power-consumption optimization using a dedicated Auto-tuning (AT) language. Our approach is based on recently developed technologies: (1) a power measurement application programming interface, (2) an AT mathematical core library. Preliminary performance evaluation enables us to select the best kernel for a real-world scientific program using either...
Image matching based on contour is an important issue in computer vision, navigation and pattern recognition. The image matching methods like curvature-based methods and corner-based methods have poor robustness to the contour's noise and distortion, and some matching methods are applied only to closed contours. A novel contour representation and matching algorithm, based on local curvature scale,...
In this work, we discuss a recently proposed approach for supervised dimensionality reduction, the Supervised Distance Preserving Projection (SDPP) and, we investigate its applicability to monitoring material's properties from spectroscopic observations using Local Linear Regression (LLR). An experimental evaluation is conducted to show the performance of the SDPP and LLR and compare it with a number...
In semiconductor fabrication processes, effective management of maintenance operations is fundamental to decrease costs associated with failures and downtime. Predictive Maintenance (PdM) approaches, based on statistical methods and historical data, are becoming popular for their predictive capabilities and low (potentially zero) added costs. We present here a PdM module based on Support Vector Machines...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.