Genetic Generalized Discriminant Analysis and Its Applications
AbstractIn this paper, a novel Genetic Generalized Discriminant Analysis (GGDA) is proposed. GGDA is a generalized version of Exponential Discriminant Analysis (EDA). EDA algorithm is equivalent to map...
View ArticleA Novel Watermarked Multiple Description Scalar Quantization Coding Framework
AbstractWatermarked Multiple Description Coding techniques belong to one branch of covert communication techniques. A novel wavelet tree vector based watermarked Multiple Description Scalar...
View ArticleMeta-analyses between 18 candidate genetic markers and overweight/obesity
AbstractAimsThe goal of our study is to investigate the associations between 18 candidate genetic markers and overweight/obesity.MethodsA total of 72 eligible articles were retrieved from literature...
View ArticleSignificant association between TAP2 polymorphisms and rheumatoid arthritis:...
AbstractBackgroundRheumatoid arthritis (RA) is a severe chronic immune mediated inflammatory disease that has been shown to be associated with human leukocyte antigen (HLA) loci. The transporter...
View ArticleOne Decomposition Method of Concept Lattice
AbstractA method of decomposition into sub-concept lattices with the same attributes set is proposed. Based on the decomposition function, it is proved that when all the nodes of the concept lattice...
View ArticleInteraction Artificial Bee Colony Based Load Balance Method in Cloud Computing
AbstractRapidly development of the cloud computing and Internet makes load balance technique become more and more significant to us than ever. A perfect scheduling algorithm is the key to solve the...
View ArticleResearch on Heuristic Based Load Balancing Algorithms in Cloud Computing
AbstractSince the proposition of the concept of cloud computing in the year 2006, cloud computing has drawn lots of attention from both industry and academic area. Several technologies such as...
View ArticleApplications of Cloud Model in Digital Watermarking
AbstractCloud model is a model linking data’s certainty and uncertainty. It describes uncertainty well about concepts written in natural languages. In this paper we summarized fundamental theory of...
View ArticleA Novel Load Balance Algorithm for Cloud Computing
AbstractA good scheduling algorithm is a key for load balance system, in which system’s load meets users’ requirement. Here, a new load balance algorithm based on swarm intelligence is proposed which...
View ArticleDesign and Seismic Analysis of the Large Biological Shielding Door in...
AbstractThe large biological shielding door is the important protective equipment of nuclear/fusion reactor. Considering the seismic load and the gravity, it is designed. Based on the modal theory, the...
View ArticleTemplate Protection Based on Chaotic Map for Face Recognition
AbstractWith the widespread deployment of biometric recognition, personal data security and privacy are attracted more and more attentions. A crucial privacy issue is how to ensure the security of user...
View ArticleUnveiling the Effects of Linker Substitution in Suzuki Coupling with...
AbstractThe establishment of structure–property relationships in heterogeneous catalysis is of prime importance but remains a formidable challenge. Metal–organic frameworks (MOFs) featuring excellent...
View ArticleHigh-performance organic–inorganic hybrid perovskite thin-film field-effect...
AbstractCH3NH3PbI3 perovskite films with full coverage and negligible roughness have been obtained by the two-step sequential thermal evaporation (TSSTE) process, which are further applied to fabricate...
View ArticleMining High Utility Itemsets from Multiple Databases
AbstractIn the past, many algorithms have been developed to efficiently mine the high-utility itemsets from a single data source, which is not a realistic scenario since the data may be distributed...
View ArticleParametric Method for Improving Stability of Electric Power Systems
AbstractIn this paper, the parametric method is used to bring the robust controller into the excitation system and adjust the required motor damping according to the actual situation. Poles assignment...
View ArticleKernel nearest-farthest subspace classifier for face recognition
AbstractIn this paper, a novel classifier named Kernel Nearest-Farthest Subspace (KNFS) classifier is proposed for face recognition. Inspired by the kernel-based classifier and the Nearest-Farthest...
View ArticleA distance weighted linear regression classifier based on optimized distance...
AbstractLinear regression technique is an efficient method to solve face recognition problem. It’s based on the theory that images in the same class will also belong to same linear subspace and they...
View ArticleA Triode-like Enzyme-free Catalytic Circuit with Junction Fuel
AbstractTarget detection circuits have been previously designed, which are propelled by conventional PCR, isothermal amplification and strand-displacement reaction. These detection circuits obtain the...
View ArticleApplication Research of Ripley’s K-function in Point Cloud Data Shape Analysis
AbstractClassification and recognition of objects for images is an important issue in many scientific fields such as computer vision, biometrics and medical image analysis. An important feature of many...
View ArticleA Novel Topic Number Selecting Algorithm for Topic Model
AbstractA novel algorithm named the MTN (Multiple-Topic-Number) algorithm is introduced to deal with the problem of topic number selecting in topic model issue. The purpose of our algorithm is to build...
View Article
More Pages to Explore .....