... period-1)
from the input signal. This step helps in removing the repeats
that due to single base repeat pattern, for instance, repeat like
AAAAA in DNA sequence ACGACAAAAACAACG because
the repeat pattern ... sequence.
In this paper, we have presented a novel SP-based ap-
proach for identifying exact and inexact tandem repeats in
DNA sequences. In past, sever...
... pages
doi:10.1155/2007/43596
Research Article
A Novel Signal Processing Measure to Identify Exact and
Inexact Tandem Repeat Patterns in DNA Sequences
Ravi Gupta, Divya Sarthi, Ankush Mittal, and Kuldip Singh
Department ... ructures in a DNA sequence.
In this paper, we have presented a novel SP-based ap-
proach for identifying exact and inex...
... 2009.
9 D. Kinderlehrer and G. Stampacchia, An Introduction to Variational Inequalities and Their Applications,
vol. 88 of Pure and Applied Mathematics, Academic Press, New York, NY, USA, 1980.
10 ... KRF-2008-313-C00050.
References
1 S. Takahashi and W. Takahashi, “Viscosity approximation methods for equilibrium problems and
fixed point problems in Hilbert spaces,” Journ...
... 1. Initialize a population of particles with random
positions and velocities, where each particle contains K
variable.
Step 2. Evaluate the fitness values of all particles, let pbest
of each particle ... et al. 3
Start
define solution space
Generate initial population random position
and velocity vectors
Evaluate finess of each particle and
store the global and person best positions
Ch...
... evaluation. The data consisted of three
weeks of training data and two weeks of test data. Among
these datasets, we used attack-free training data for nor-
mal behavior modeling, and attack data ... Φ(w)
=
(1/2)w
2
is convex in w and the constraints are linear
in w and b. This has the advantage that parameters in a
quadratic programming (QP) a ect only the training time
an...
... Partitioning of an image into the image blocks and reshaping as vector form.
EURASIP Journal on Advances in Signal Processing 11
Figure 10: Image files in the test data set (TDS).
Table 1: Training ... enlarged
the training set to 55 files (TDA) excluding all the image
files used in the test data set. All these cases are summarized
in Table 1. The images in the tr aining and...
... Marfil, A. Bandera, A. Bandera, and F. Sandoval, “Com-
parison of perceptual grouping criteria within an integrated
hierarchical framework,” in Proceedings of the Graph-Based
Representations in ... architecture
can be found in Bandera et al. [29]. The inputs of the
architecture are the face and the hands of the human
demonstrator and her silhouette. The face and the hands
are o...
... pages
doi:10.1155/2010/395763
Research Article
A Novel Method for Improving Fairness over
Multiaccess Channels
Seyed Alireza Razavi and Ciprian Doru Giurc
˘
aneanu
Department of Signal Processing, Tampere University ... criteria that have been used frequently in the past. For
instance, it is customary to evaluate the fairness with the
following max-min c riterion: a rate ve...
... safe state to current attacked state;
(3) from previous attacked state to current safe state; and
(4) from previous attacked state to current attacked state.
Although the historical data obtained ... H(t
s
).
An example of the distance-consistent spooking attack is
shown in Figure 1 (a) . As two colluding attackers A
1
and A
2
can communicate with each other via an attack link...