0

matlab® approach for implementing control algorithms in real time rtwt

a decentralized approach for implementing identity management in cloud computing

a decentralized approach for implementing identity management in cloud computing

An ninh - Bảo mật

... edge in a UWAG has a WEIGHT It’s the number of times that services adjoining the edge communicate in the set time interval Symbol used: G: a graph vx: the vertex x in graph ex: the edge x in graph ... for //do the same operation for each new graph just like what’ve been done to the origin graph for Gt in list[G’, G”] goto a); end for } Though the grouping algorithm has been used one time in ... services in groups According to our analysis, it’s not a good solution for implementing IdM in a centralized way with the scale of cloud and the number of users surging With the computing paradigm...
  • 7
  • 589
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A Simple Method for Guaranteeing ECG Quality in Real-Time Wavelet Lossy Coding" potx

Báo cáo khoa học

... making it a good choice for real- time ECG transmission Another interesting property is its scalability, not only for controlling the bit rate but also for controlling the distortion introduced in ... with the mathematical indices, for example, PRD index Since a highly distorted signal can be useless from a clinical point of view, a precise control in the distortion introduced (the quality ... are a single significant point In this stage of coding, called the sorting pass, the indices of the coefficients are put onto three lists, the list of insignificant points (LIP), the list of insignificant...
  • 9
  • 252
  • 0
Báo cáo hóa học:

Báo cáo hóa học: "Research Article A Rules-Based Approach for Configuring Chains of Classifiers in Real-Time Stream Mining Systems Brian Foo and Mihaela van der Schaar" pot

Hóa học - Dầu khí

... running time for determining the rule to reinforce during each iteration in SPERO was approximately 14.0 milliseconds, while the running time to determine the algorithm to reinforce in EFER was ... reinforcing the pure rule with the highest steady state performance Such a rule may perform well in certain states, but poorly in other states, since transients are ignored in this approach for ... Existing Rules (EFER), which reinforces the probability of playing each preferred algorithm in each state based on its expected performance (utility) in the next time interval Since EFER determines...
  • 17
  • 416
  • 0
Control and scheduling codesign flexible resource management in real time control systems   feng xia  you xian sun

Control and scheduling codesign flexible resource management in real time control systems feng xia you xian sun

Điện - Điện tử

... resources within a certain time interval in order that the execution of individual tasks can be completed in time In a typical modem Real- Time Control System (RTCS) there are mainly two categories ... disciplines in terms of both theory and technology In the context of real- time control, there are intuitively two kinds of convergences: integrated control and computing, and integrated control ... there has been increasing interest in codesiga of control and scheduling Some of the efforts will be briefly outlined with respect to integrated control and computing and integrated control and...
  • 256
  • 404
  • 1
Báo cáo khoa học:

Báo cáo khoa học: "Automatic Part-of-Speech Tagging for Bengali: An Approach for Morphologically Rich Languages in a Poor Resource Scenario" pdf

Báo cáo khoa học

... best performance for the ME model It is interesting to note that the inclusion of prefix and suffix for all words gives better result instead of using only for rare words as is described in Ratnaparkhi ... Tagging accuracies (in %) of different models with 10K, 20K and 40K training data 3.4 Training Data The training data includes manually annotated 3625 sentences (approximately 40,000 words) for ... number of instances in the training corpora, including errors due to long distance phenomena http://maxent.sourceforge.net 224 Conclusion In this paper we have described an approach for automatic...
  • 4
  • 455
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article An MCMC Algorithm for Target Estimation in Real-Time DNA Microarrays Haris Vikalo and Mahsuni Gokdemir" ppt

Hóa học - Dầu khí

... [10] In [11], analyte targets in real- time DNA microarrays are estimated using the temporally sampled kinetics of the binding process However, the kinetics process there is described using a ... Advances in Signal Processing of a binding process [7–9] However, analyte estimation therein is typically performed using only the data collected in the equilibrium, and rarely relies on the kinetics ... a time interval [0, T], and assume that we uniformly sample nc (t) every Δt = T/N Therefore, we assume that the value nc (ti−1 ) at the beginning of the time interval (ti−1 , ti ) is known For...
  • 8
  • 358
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "Recommendations for implementing stereotactic radiotherapy in peripheral stage IA non-small cell lung cancer: report from the Quality Assurance Working Party of the randomised phase III ROSEL study" pps

Báo cáo khoa học

... motion into account However, similar to the reasoning given for the ITV to PTV margin, a minimum margin of mm should be used for the incorporation of the other uncertainties Organs at risk definition ... manuscript, coordinated and participated in the Quality Assurance Working Party designing the guidelines, and participated in performing the calculations comparing dose calculation algorithms JC, ... available in the literature about the influence of different planning algorithms on the planning of stereotactic radiotherapy Therefore, an additional planning study was performed in 22 stage...
  • 14
  • 308
  • 0
Báo cáo y học:

Báo cáo y học: "A statistical approach for detecting genomic aberrations in heterogeneous tumor samples from single nucleotide polymorphism genotyping data" pot

Báo cáo khoa học

... Specialist Training Fellowship in Biomedical Informatics (Reference No G0701810) and previously by a UK Engineering and Physical Sciences Research Council Life Sciences Interface Doctoral Training Studentship ... genotyping data [25] Model comparison In order to demonstrate the utility of integrating both normal DNA contamination and LRR baseline correction within a single analysis model; we examined SNP ... a continuous to a discrete distribution (for example Poisson or Negative-Binomial) Alternatively, the existing data model can be maintained and the read counts transformed into near-continuous...
  • 15
  • 583
  • 0
Báo cáo y học:

Báo cáo y học: " Mitral valve replacement via right thoracotomy approach for prevention of mediastinitis in a female patient with long-term uncontrolled diabetes mellitus: a case report" potx

Báo cáo khoa học

... the operative approach plays an important role in preventing mediastinitis In contrast to mid-line full sternotomy, mediastinitis has not been recognized with minimally invasive approaches [7] ... perioheral perfusion systems, use of these approaches is expanding all over the world In some institutions, these approaches are standard surgical approaches for valve surgery The 30-day mortality ... methicillin-resistant Staphylococcus aureus [6] The mainstays for prevention of mediastinitis are recognition of risk factors in patients, preoperative or intraoperative prophylatic antibiotics, and control...
  • 3
  • 232
  • 0
Báo cáo y học:

Báo cáo y học: "A Protein Similarity Approach For Detecting Prophage Regions In Bacterial Genomes" potx

Báo cáo khoa học

... functions including the lit gene involved in T4 exclusion [23,24], the rglA (mcrA) gene involved in restriction of hydroxymethylated nonglucosylated T4 phages [25,26] and the pin gene involved in inversion ... as a single marker for prophages, and in any given case, any particular gene could have been deleted from a defective prophage [15,16] Therefore, using a single gene like integrase or terminase ... difficulty relies in defining prophage sequences in bacterial genomes as mostly they are cryptic or in the state of mutational decay Prophages account for a substantial amount of interstrain genetic...
  • 20
  • 287
  • 0
optimization of protein and rna detection methodologies and a new approach for manipulating protein activity in living cells

optimization of protein and rna detection methodologies and a new approach for manipulating protein activity in living cells

Tiến sĩ

... to a serine showed no effect on dithiol resistance, proving the last cysteine was a fortuitous non-participant in arsenical binding Instead of optimizing a single tetracysteine sequence for improved ... overlooked approach for increasing the biarsenical-tetracysteine contrast is to attach multiple tetracysteines to a single protein By fusing several tetracysteines locally to a single protein, it ... libraries for high affinity binders in vitro, disregarding maintenance of desirable fluorescence properties By performing these selections in the reducing environment of mammalian cytosol, we intended...
  • 144
  • 306
  • 0
Model based approach for extracting femur contours in x ray images

Model based approach for extracting femur contours in x ray images

Tổng hợp

... method deforms the initial contour by minimizing the total energy of the contour Three kinds of energy terms can be defined in active contour: Internal energy, which constrains the stretching and ... from a set of training samples A series of corresponding points, called landmark points, are identified on the boundary of the target object in each training image Then the training samples are ... geometric information as attribute vector into the snake The attribute vector contains the areas of triangles formed by each point on the snake and their two neighboring points During the snake’s...
  • 83
  • 283
  • 0
A NOVEL APPROACH FOR MINING EMERGING PATTERNS IN DATA

A NOVEL APPROACH FOR MINING EMERGING PATTERNS IN DATA

Khoa học tự nhiên

... streams by applying a selective approach to conduct the mining process.Our experiments prove that MEPs is capable of gaining important information from streaming data This information increases the ... CONCLUSIONS In this paper, we study the mining of emerging patterns in data streams by introducing a special type of emerging patterns, matching emerging pattern (MEPs) This type of EPs can be easily mined ... divided into ten folds For each round of the 10-fold-cross validation, one fold is used for testing and the other nine folds are used for training The training folds act as the blocks of data explained...
  • 4
  • 323
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "Understanding Unsegmented User Utterances in Real-Time Spoken Dialogue Systems" doc

Báo cáo khoa học

... make an interpretation and thus cannot respond appropriately Waiting for a long pause enables an interpretation, but prevents response in real time We therefore need a way to reconcile real- time ... recognition errors In addition, since the algorithms of the probabilistic methods are not designed to work in an incremental way, they cannot be used in real- time analysis in a straightforward way Some ... the other hand, since parsing results cannot be obtained unless the end of the utterance is identified, making real- time responses is impossible without boundary information For example, consider...
  • 8
  • 448
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Review Article Recent Advances in Real-Time Musical Effects, Synthesis, and Virtual Analog Models" pot

Hóa học - Dầu khí

... computational savings while maintaining a low latency Finally, it should be pointed out that an efficient method for performing a low-latency convolution, dividing the impulse response into equal-length ... Smith, in their pioneering approach to the linear modeling of the VCF [90], showed that the accurate real- time computation of (4) in discrete time is problematic In fact, k and ωc merge into a ... bidimensional nonlinear map while moving to the digital domain On the other hand, approximations of H(s) aiming at maintaining such parameters decoupled in the discrete -time domain lead to inaccurate...
  • 15
  • 415
  • 0
The Human Algorithm: How Google Ranks Tweets in Real-Time SearchBy Brian Solis ppt

The Human Algorithm: How Google Ranks Tweets in Real-Time SearchBy Brian Solis ppt

Quản trị kinh doanh

... companies are also introducing new services to measure general authority for individuals online Klout, for example, developed a sophisticated platform for measuring the influence of users in Twitter ... web is interesting and necessary, it is far from perfected Running searches in either engine today will only reinforce this sentiment However, with that said, it is helping us by reducing the ... continues to evolve, it transforms the definition of and logic for relationships We’re adapting how we connect to one another and also constructing new roads for sharing, filtering, and ranking...
  • 8
  • 131
  • 0
Báo cáo y học:

Báo cáo y học: " Visualizing fusion of pseudotyped HIV-1 particles in real time by live cell microscopy" doc

Báo cáo khoa học

... bottom (defined as time point 0, Figure 4) Time resolved epifluorescence microscopy revealed a continuous reduction in the number of YFP signals originating from single virions, indicating viral ... 4,5-bisphosphate binding site in MA [25,26] Membrane binding affinity is much lower for the cleaved MA domain than for full-length Gag [27,28] This is due to a myristoyl switch regulating exposure ... approaches have been described individually for functional labeling of viral particles [10,16], but had not been combined previously Our initial aim was, therefore, to determine double labeling...
  • 14
  • 267
  • 0
Báo cáo y học:

Báo cáo y học: " Koala retrovirus: a genome invasion in real time" ppsx

Báo cáo khoa học

... colonization is required for successful invasion of the germline One approach to examining these questions would be to compare the biological properties of the virus that initiates invasion in a species ... so, should we be interfering, perhaps by vaccination, in an attempt to protect it from extinction? If the virus is spreading by exogenous infection followed by new germline insertions, it could ... colonization A starting point for the search for the origin of KoRV is its sequence relationship to GALV [6] Older, pre-genomic http://genomebiology.com/2006/7/11/241 studies indicated that GALV in turn...
  • 3
  • 182
  • 0
Exploring news environment, interface usage, and gratifications in real time internet news browsing

Exploring news environment, interface usage, and gratifications in real time internet news browsing

Tổng hợp

... browsing is thus a process of selecting or encountering with information hosted by interlinked information systems Projected as a computermediated information activity, Internet news browsing ... divided into four groups: information system, information materials, information organization, and information seekers Information systems host, structure, and format information materials that ... information system Information system, information materials, and information organization constitute three basic dimensions of information environment Information seekers interact with information environment...
  • 160
  • 471
  • 0
Scheduling in real time systems

Scheduling in real time systems

Điện - Điện tử

... significant real- time scheduling policies which are in use today in the industry for coping with hard real- time constraints The bases of real- time scheduling and its major evolutions are described using ... 1.1.1 Real- Time Applications Real- time applications issues In real- time applications, the timing requirements are the main constraints and their mastering is the predominant factor for assessing ... Scheduling: definitions, algorithms and properties Scheduling in classical operating systems Illustrating real- time scheduling SCHEDULING OF INDEPENDENT TASKS 2.1 Basic on-line algorithms for periodic tasks...
  • 284
  • 750
  • 0

Xem thêm