... are mainly static, and there are multiple sinks moving randomly in the sensor field Sinks are equal from the information point of view; it does not matter to which sink a data packet is sent In the ... following sections explain the operations of HexDD 4.2.1 Event data forwarding Event data forwarding in HexDD is done through border nodes towards center region according to Algorithm 1-I Line ... sink mobility, tracking the location of a sink becomes more critical for data delivery If the sink moves inside its current cell, there is no need for another process since the data will be forwarded...
Ngày tải lên: 20/06/2014, 20:20
... words are used in both training domain and testing domain while the second part obliges that the probability of a word occurring in training domain equals that of in testing domain If these two ... reviews as test data for each domain and the remaining 1600 labeled reviews in each domain are used as training data All unlabeled data are used for latent representation learning For computational ... supervised learning methods, which require labeled data for training, have been proven quite effective However, supervised methods assume that the training data domain and the testing data domain share...
Ngày tải lên: 09/09/2015, 11:28
Adaptive p2p platform for data sharing
... Registering/Joining (b) Querying (c) Data retrieving Figure 2.2: Centralized P2P Architecture maintains a master list of all the meta -data of peers in the network This meta -data is used for describing ... centralized model of resources sharing [75] However, there are problems with using a centralized server including having a single point of failure In addition, maintaining a unified view is computationally ... exchange information in a flexible manner Notable application domains are instant messaging, groupware and file sharing Instant messaging applications provide services such as test messaging, email,...
Ngày tải lên: 15/09/2015, 21:13
an entity-centric approach for privacy and identity management in cloud computing
... They include three agents: SSA, TEA, and ASA The first agent, SSA, maintains a database of information about ABs This information is used for encrypting and decrypting sensitive data and metadata ... used for signing/verifying the signature of sensitive data included in the AB The reason for having two key pairs is to prevent attackers from modifying AB’s sensitive data and signing it again ... satisfied by cloud providers The nature of cloud computing has significant implications for the privacy of personal, business and governmental information Cloud SPs can store information at multiple...
Ngày tải lên: 31/07/2013, 09:43
Java Structures Data Structures in Java for the Principled Programmer docx
... points within the window Suppose, also, that we have methods for drawing line segments, say, using the Line object How might we implement a rectangle—called a Rect—to be drawn in the drawing window? ... “change insurance” message The string message simply accesses information, while the medical record method may involve changing several pieces of information in this and other objects in a consistent ... coordination of objects In this way languages like Java are object-oriented In all but the smallest programming projects, abstraction is a useful tool for writing working programs In programming...
Ngày tải lên: 24/03/2014, 05:21
NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE: Enhancing Online Choice, Efficiency, Security, and Privacy pptx
... Unclassified Information, establishes an open and uniform program for managing information that requires safeguarding Once implemented, this Executive Order will enable increased information sharing with ... participant in the information exchange uses an interoperable credential issued by his employer to log into the information -sharing portal The portal automatically directs responders to information ... online One morning, she inserts the smart card into her computer, and uses the credential on it to “run” some errands, including: • Logging in to her bank and obtaining digital cash; • Buying a sweater...
Ngày tải lên: 29/03/2014, 20:20
Towards Instance Optimal Join Algorithms for Data in Indexes pdf
... to pay for the merge operation If an interval is contained in another interval, only the larger interval is retained in the data structure By maintaining the intervals in sorted order, in O(1)-time ... 1972 In fact, the idea of skipping elements using a binary-search jumping (or leap-frogging) strategy was already present in [12] Demaine et al [7] used the leap-frogging strategy for computing ... real domain values For example, suppose the domain values are strings and there are only strings this, is, interesting in the domain Then, we can assume that those strings are stored in a 3-element...
Ngày tải lên: 30/03/2014, 22:20
báo cáo hóa học:" Quality of data collection in a large HIV observational clinic database in sub-Saharan Africa: implications for clinical research and audit of care" docx
... Research cohort database (n = 559) Type of OI Routine clinic database (n = 559) Routine clinic database (n = 1233) % underreporting of OI % events in 559 patients in underreporting routine clinic vs ... observational databases in different clinical settings The Infectious Diseases Institute (IDI) in Kampala, Uganda, is a centre of excellence for HIV clinical care in the country, and maintains a large ... patients in the routine clinic database with the 559 patients in the research cohort database in order to assess the level of underreporting in a larger number of patients in the clinic database...
Ngày tải lên: 20/06/2014, 08:20
DATA MINING IN BANKING AND FINANCE: A NOTE FOR BANKERS pdf
... flexibility In financial institutions considerable developments in information technology have led to huge demand for continuous analysis of resulting data Data mining can contribute to solving business ... these data, and hence modern data mining methodologies and tools are increasingly being used for decision making process not only in banking and financial institutions, but across the industries ... • Banking Software: Data Mining & Banking Intelligence, retrieved 3rd January, 2006 from , http://www.stratinfotech.com/banking_software/banking_software_business_intelligence _data _mining.htm...
Ngày tải lên: 20/06/2014, 14:20
Báo cáo hóa học: " Comparison of four different methods for reliability evaluation of ecotoxicity data: a case study of non-standard test data used in environmental risk assessments of pharmaceutical substances" pdf
... Schneider et al Data types Toxicity (in vivo and in vitro) and ecotoxicity (acute and chronic) data Ecotoxicity data Ecotoxicity (both acute and chronic) data Toxicity data (both in vivo and in vitro) ... system for pharmaceutical substances Drug Information Journal 2007, 41(2):187-91 Breitholtz M, Lundström E, Dahl U, Forbes V: Improving the Value of Standard Toxicity Test Data in REACH In Regulating ... report In some studies, information was given on the conditions for the cultivation/breeding stock but not for the experimental setup Dosing system Usefulness of proposed criteria Administrated...
Ngày tải lên: 21/06/2014, 03:20
Báo cáo hóa học: " Research Article Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data " potx
... next given for a resource-efficient key management system, including key generation and distribution, in Section Then, we present the INTRAS framework for data scrambling in Section And, in order ... for the morphing index mindex The cardinality of M should be small enough that mindex (e.g., a short sequence of to bits) can be sent as side information in COM The input to the morphing function ... variations in Hamming distances, Gray coding can be utilized in the binary encoder This allows for incremental changes in the input signals to be reflected as the smallest possible Hamming distances...
Ngày tải lên: 22/06/2014, 00:20
Báo cáo hóa học: " Research Article HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks" pptx
... residual energy in the network and avoid passing by the sensors with low residual energy In each datagathering period, the sensors pack their residual energy information into data packets, so ... utilizing mobility to improve network performance In Section 3, we describe our data- gathering scheme In Section 4, we present our moving strategy in detail and provide simulation results in Section ... of MAC effects In addition, linear programming methods were adopted to determine the optimal positions of the sinks in [14, 15]; deployment problems for static sinks were considered in [30, 31]...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article An ML-Based Estimate and the Cramer-Rao Bound for Data-Aided Channel Estimation in KSP-OFDM" pdf
... explained below, contains information-bearing data symbols and pilot symbols The symbols are then modulated on the OFDM carriers using an N-point inverse FFT The guard interval, consisting of ... guard interval length for a fixed total number of pilots It is observed that the NCRB slightly increases for increasing guard interval length This can be explained by noting that when ν increases, ... independent of the data symbols This indicates that at high SNR, the information contained in the observations r1 , that are affected by the data symbols can be neglected as compared to the information...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Adaptive Downlink Resource Allocation Strategies for Real-Time Data Services in OFDM Cellular Systems" ppt
... interference is the dominant factor indicating the system performance in severe shadowing The advantage of the analytic model presented in this paper is that it can give insight into the performance ... low link outage Instead, reducing the probability of interference by using minimum bandwidth yields a higher protection against outage On the other hand, in a low shadowing scenario, as the minimum ... (i.e., margin) in mild shadowing scenarios is smaller than that in the case with severe shadowing (i.e., large shadowing variance) Hence, minimizing power alone in the severe shadowing case is...
Ngày tải lên: 22/06/2014, 22:20
Báo cáo hóa học: " Generalized Alamouti Codes for Trading Quality of Service against Data Rate in MIMO UMTS" doc
... applied, however, it remains unclear how to combine the received signals in an optimal fashion In the following, an interesting approach is presented allowing an increase in diversity when the number ... |2 The decoding can be performed either in MMSE mode or with an ML decoder [24] allowing only for diversity of two but with a data rate of four Gaining such insight, the following conjecture ... freedom for the resulting fading factor α when compared to (1) and (4) The paper is composed as follows In Section 2, the wellknown Alamouti scheme is introduced setting the notation for the remaining...
Ngày tải lên: 23/06/2014, 01:20
báo cáo khoa học: " Towards a data sharing Code of Conduct for international genomic research" ppt
... et al Genome Medicine 2011, 3:46 http://genomemedicine.com /content/ 3/7/46 Page of Box International Data Sharing Code of Conduct Preamble This proposed international data sharing Code of Conduct ... foundation for data sharing (Box 1, point 3) We see data sharing, which is often a condition of funding, as part of the efficient and proper stewardship of public funds It also binds eventual users in ... their functioning Mechanisms for identifying and tracking data generators and users should be international Transparency Key policies on publications, intellectual property, and industry involvement...
Ngày tải lên: 11/08/2014, 12:21
Báo cáo sinh học: "Data transformation for rank reduction in multi-trait MACE model for international bull comparison" doc
... Ignoring pedigree information, ˆi the mixed-model equation for estimating the transformed breeding value u∗ for bull i is: ˆi T Zi R−1 Zi T + aii G∗−1 u∗ = T Zi R−1 yi i i The transformed breeding ... discarded Data transformation using eigenvalues of the genetic correlation matrix allowed reducing the German dataset from nine traits to five eigenfunctions without losing accuracy in any of ... applications of data transformation are in total merit index construction within country using a multiple trait animal model [1] In Germany, production traits (milk, fat and protein) and somatic...
Ngày tải lên: 14/08/2014, 13:22
Báo cáo y học: "Network security and data integrity in academia: an assessment and a proposal for large-scale archiving" potx
... than physically printed information ever was – a fact that is causing headaches for the US government’s National Archives and Records Administration (NARA), responsible for maintaining archives of ... that users could install in their web server’s executable content area; these scripts would authenticate incoming connections, only executing if the request comes from the working group’s crawlers, ... [http://www.google.com], which maintains a cache of the most recent crawling of most pages it indexes, and the Internet Archive [http://www.archive.org], which goes further and maintains an archive of the...
Ngày tải lên: 14/08/2014, 14:22
a system for managing experiments in data mining
... help in performing data mining tasks and making predictive analysis, but this analysis is made in a single data mining task In reality, many data mining tasks are performed on a single data set, ... Microsoft Business Intelligence platform and extends its features into business applications Oracle Data Mining [14] provides a wide set of data mining algorithms which help in solving business problems ... problems Access to Oracle Database also has access to Oracle Data Mining Oracle Data Mining also helps in making predictions and using reporting tools which include Oracle Business Intelligence EE Plus...
Ngày tải lên: 30/10/2014, 20:01
data augmentation for latent variables in marketing
... model for the membership data in the first essay, and is explored using two direct marketing datasets The first dataset is from an office supply company engaged in business-to-business selling in ... marketing data are used to illustrate the model, where the model is used to investigate potential gains from increasing the inter-arrival time of offers in a membership club Marketing data is ... by for me with strong faith while I pursued my dreams and for being patient with, believing in, and walking with me I also appreciate my brothers and sister, Yu-Sui, Kuo-Ting, and HsinChih, for...
Ngày tải lên: 02/11/2014, 00:27