Predicting Protein Functional Class with the Weighted Segmented Pseudo-Amino Acid Composition Moment Vector
|
|
- Dana Atkins
- 7 years ago
- Views:
Transcription
1 MATCH Counications in Matheatical and in Coputer Cheistry MATCH Coun. Math. Coput. Che. 66 (2011) ISSN Predicting Protein Functional Class with the Weighted Segented Pseudo-Aino Acid Coposition Moent Vector Xinyuan Zhou 1,Xi Li 2, Man Li 3, Xinguo Lu 2 1 Departent of Coputer Science and Technology, Changsha University Changsha Hunan, , China 2 School of inforation science and technology, Hunan University, Changsha Hunan, , China 3 Departent of Coputer Science, Hunan University of Chinese Medicine, Changsha Hunan, , China (Received Septeber 27, 2010) Abstract Predicting protein function at the proteoic-scale is one of the fundaental goals in cell biology and proteoics. In this paper, we proposed a new ethod for characterizing protein sequences the Weighted Segented Pseudo-aino acid coposition Moent Vector (W-SPsAA-MV). Fro protein sequences, the encoding ethod of W-SPsAA-MV is applied to protein functional class prediction associated with the nearest neighbor algorith (NNA) and covariant discriinant (CD) classifier. The experient results show that our new ethod is efficient to predict functional class of query proteins when protein-protein interaction inforation is liited. Corresponding author. E-ail address: xyzhou@yeah.net (X.Y. Zhou)
2 Introduction The nuber of sequenced nucleotide sequences encoding proteins is growing at an extraordinarily fast rate, but the rate of sequence acquisition far surpasses one of protein function deterination. Protein function prediction becoes an iportant issue in the post-genoe era as the gap between the aount of sequence inforation and functional identification widens. With the accuulation of sequence inforation, attention has been paid to the developent of autoatic and reliable ethods for the prediction of protein function fro sequence. Generally speaking, protein function depends on its structure, which depends on protein sequence. At present, this fact has been widely recognized and has becoe the theoretical basis of protein functional prediction based on protein sequence[1]. Various coputational approaches for the prediction of protein functional classes fro protein sequences and analysis of protein sequences have been developed. Aong the, the sequence siilarity-based approach is the ost faous. It is generally believed that proteins of the high sequences siilarity are hoologous proteins which have the sae or siilar structures and function[2].this ethod is ainly achieved through sequence alignent, such as FASTA [3]and BLAST[4]. However, not all hoologous proteins share analogous function[5]. Therefore, the sequence siilarity-based ethod is not suitable for the prediction of protein functional classification in the case of poor siilarity, especially for orphan sequences. Instead of using the sequence siilarity-based approach, ethods that rely on an alternative representation of proteins were proposed in soe papers[6-12]. These ethods are ainly extract soe characteristics contained in protein sequence and use data ining or achine learning ethods to predict protein function class. Ross[6] used data ining prediction(dmp) ethod to predict protein functional classification fro sequences. DMP also can work when protein function is unknown. Cai was used of soe properties of aino acids[7], including aino acid coposition,
3 -447- hydrophobicity, plarity, charge and other properties to represent the protein sequence as specific feature vector, which contains three parts, the coposition (C), transition(t) and distribution(d).the SVM is used to predict protein functional classes in this ethod. In 2007, Wang proposed EBGW approach and cobined with nearest neighbor algorith to predict protein function[8]. And this ethod has been successfully applied to the study of protein structure prediction[9]. The concept of pseudo aino acid coposition was proposed by Chou to predict protein subcellular location and structural classes and so on[10,11]. In this paper, we adopt the Weighted Segented Pseudo-aino acid coposition Moent Vector (W-SPsAA-MV) to represent the saple of a protein via a discrete odel. We obtain good results using W-SPsAA-MV associate with nearest neighbor algorith (NNA) and covariant discriinant (CD) classifier respectively in our study. 2. Dataset We load down the 1818 proteins fro ftp://ftpips.gsf.de/yeast/ which was used in GOM[13], EBGW[8] and GE[12] ethod. There are 1377 proteins as known proteins aong the. The eighteen functional categories of all proteins were shown in Table 1, including the unclassified proteins. The W-SPsAA-MV coding vector diension ust be less than the nuber of saples of each functional categories subset when we adopt CD classifier. Because the W-SPsAA-MV is 58-diensional vector, we can t assign to the functional category whose saple size saller than 58 for adopting CD classifier. Therefore, for CD classifier, the Nu. 3 and Nu. 17 functional categories in Table 1 will not be considered, because they are only 26 and 5 saples respectively. In this way, there are 1373 proteins with known function for CD classifier.
4 -448- Table 1 The nubers of each functional class in dataset Nu Functional class total 1 Metabolis Energy 95 3 Developent (Systeic) 26 4 Cell Type Differentiation Protein Systhesis 98 6 Interaction with the Environent Cell Fate Biogenesis of Cellular Coponents Transcription Protein Fate(folding, odification, destination) Cell Cyle and DNA Processing Protein with Binding function of Cofactor requireent Cellular Transport,Transport Facilities and Transport routes Regulation of Metabolis and Protein function Cellular Counication/Signal Transduction Mechanis Cell Rescue, Defense and Virulence Transposable eleents, Viral and Plasid proteins 5 18 Unclassified protein Methods 3.1. The Weighted Segented Pseudo-aino acid coposition Moent Vector (W-SPsAA-MV) The feature extraction of protein sequences is that every protein sequence was represented as a specific feature vector. In this paper, the Weighted Segented Pseudo-aino acid coposition Moent Vector (W-SpsAA-MV) is proposed as the characterization of protein sequences. W-SpsAA-MV includes not only the aino acid coposition inforation, but also take into account the physiocheical properties of aino acids, position and local inforation. This encoding vector
5 -449- ainly contains three parts, first part is the conventional aino acid coposition, second part is the segented aino acid coding, these two parts are called Segented Pseudo-aino acid coposition (SpsAA), and the third part is the oent vector of aino acid (MV). Given a protein P, its W-SpsAA-MV can be generally forulated as: P [ p, p, p, p, p, p, p ] T (1) where the first 20 eleents p 1, p 2, p 20 are associated with 20 coponents in the conventional aino acid coposition. The iddle eleents p 20 1, p 20, p 20 1 are the segented aino acid coding. The last 20 eleents are the oent vector of aino acid. Given a protein P with L aino acid residues, R1RRRRRR R L (2) where R 1 represents the first residue in the sequence, R 2 represents second, and so forth. The conventional aino acid coposition of protein P can be forulated as: P AA f1 f 2 f20 (3) where f is the occurrence frequency of aino acid A in the protein P, 1 f2 that of aino acid C, and so forth. Here, without loss of generality, the single codes of 20 native aino acids are used according to their alphabetical order. The second part of W-SpsAA-MV is the segented aino acid coding. At first, based on physiocheical characteristics such as residue s hydrophobic property and charged property and so on, we can classify residues into four different classes according to Dandekra[14]. Neutral or non-polar aino acid: A 1 ={G,A,V,L,I,M,P,F,W}; Neutral or polar aino acid: A 2 ={Q,N,S,T,Y,C}; Acidic aino acid: A 3 ={D,E}; Alkalescent aino acid: A 4 ={H,K,R}. And then we grouped these physiocheical properties with every two classes.
6 -450- Thus, three groups can be obtained as follows: { A 1, A 2 } vs {A 3, A 4 }, {A 1, A 3 } vs {A 2, A 4 } and {A 1, A 4 } vs{a 2, A 3 }.We set three rules as described below: Rule 1: Suppose protein P shown in forula (2), and we transfor protein sequence P into nuerical sequence in this way(zhang, et al,2005,wang,et al.,2007): 1 Ri { A1, A2} H1( Ri ) 0 Ri { A3, A4} 1 Ri { A1, A3} H2( Ri ) 0 Ri { A2, A4} 1 Ri { A1, A4} H3( Ri ) 0 Ri { A2, A3} (4) (5) (6) Hence, protein sequence P can be represented as three binary sequences S i =H i (P)=H i (R 1 ) H i (R 2 ) H i (R L ), (i=1,2,3). We call S 1, S 2, S 3 the 1-eigen sequence, 2-eigen sequence and 3-eigen sequences, respectively. Rule 2: For eigen sequence S with length L, let M a positive integer, we can divided S into M subsequence fragents, and was written as S 1, S 2,, S M (1ML), where M is the nuber of fragents. An exaple of the segentation process can be seen in Figure 1. Figure 1. The segentation of characteristic sequence In the Figure 1, the eigen sequence S with length 40 was segented into 6 eigen subsequence fragents. The length of k-th eigen subsequence was defined as: k L ( k 1) L n k M M (7) where L is the length of eigen sequence S, and M is the nuber of segent. Rule 3: For every eigen sequence S, we defined the segented subsequence coding as the frequency of 1 in every eigen subsequence fragents. In this way, we
7 -451- can obtain a M-diensional vector fro a eigen sequence. We can obtain three eigen sequence fro a protein sequence according to Rule 1, therefore, a 3M-dientional vector can be gained, which was called the segented aino acid coposition. This vector was defined as: P [,,,,,,,, ] T (1) (1) (2) (2) (3) (3) ss 1 M 1 M 1 M (8) where the first M eleents is the frequency of 1 in M segents of 1-eigen sequence, the iddle M eleents that of 2-eigen sequence, and the last M eleents that of 3-eigen sequence. The third part of W-SpsAA-MV is the oent vector of aino acid (MV)[15-17], which was defined as: P MV a a a (1) 1 (1) 2 (1) 20 where 20 eleents in P MV was forulated as: (9) a (1) i l w pij L ( L i (1,2, 20) (10) 1) j1 where pij eans the i-th type aino acid in the protein sequence P located in j-th. And ai is forulated according with the alphabetical order. L is the length of protein sequence P, and w is the weight factor. Supposing w =1, for protein P 1 : AAACCC and protein P 2 : ACACAC, the MV of the according to forula (10) can be represented as: PP1 (0.5,0.5,0,,0,0.5,1.25,0,,0) T (11) PP2 (0.5,0.5,0,,0,0.75,1.0,0,,0) T (12) In suary, the W-SpsAA-MV in Eq (1) can be uniquely derived by noralizing the 40+ eleents in Eqs (3), (8) and (9) according to the following equations:
8 -452- wf 1 u, (1 u 20) pu w2 k, (1k 3 M) 1 wa 3 t, (1 t20) LL ( 1) (13) where w 1, w2 and w 3 are the weight factors which were used to regulate the degree of influence of each feature on the classification syste. For different datasets and conditions, we choose different w 1, w2 and w 3 value to achieve the best result. M is the nuber of segent of eigen sequence, we chose M=6 to achieve the best result for our experiental dataset. Therefore, we can get 58-dientional vector for W-SPsAA-MV Nearest neighbor algorith (NNA) The NNA[18] is well known in pattern recognition counity due ainly to its good result and its siple-to-use feature. The NNA assign to an unclassified saple point the classification of the nearest of a set of classified points. In this section we introduced how the NNA was used to predict protein functional class in ters of W-SPsAA-MV. The classification process of the NNA is as follows. Suppose a set of proteins {P 1,P 2,, P n } that have been classified into categories {C 1, C 2,, C }, fro which an unknown protein P can be classified into those categories using the NNA. First, the nearest neighbor of protein P is given by the following equation: nn( P) Pk (14) where P is the W-SPsAA-MV of protein, And P i is deterined by the following equation: n DPP (, ) in DPP (, ) (15) k i1 i Where n is the nuber of known proteins. And D(P, P i ) is defined as DPP (, ) 1 ( P P)/( P P) (16) where i i i P Pi is the dot product of P and P i.the P and P i ean the odule of P and P i respectively. Obviously, when P P, then DPP (, ) =0. i i
9 -453- According to the rule of NNA, if and only if in[ DPP (, ) ( PC)] in[ DPP (, ) ( PC)] in[ DPP (, ) ( P C )] (17) i i 1 i i 2 i i Here, we use because soe proteins belong to ore than one category Covariant Discriinant (CD) classifier The CD classifier has been applied to protein structural class and subcellular location prediction[19-21], and achieved satisfactory results. In this paper, the CD classifier is used to predict protein functional classification based on W-SPsAA-MV discrete odel. Suppose there are N proteins (P 1,P 2,,P N ) which have been classified into functional categories subset, such as: S S1S2 S3 S (18) where each subset S (=1,2,, ) is coposed of proteins with the sae functional class. There are N proteins in the functional subset S. Since every protein has ore than one function, different functional subsets aybe contain the sae proteins. Obviously, N N1N2 N3 N (19) where N is the total nuber of proteins. N 1 eans the nuber of proteins in functional subset S 1 and N 2 eans the nuber of proteins in functional subset S 2, and so forth. According to Eq (1), we can suppose that the u-th protein in the subset S is forulated by P [ p, p,, p, p,, p, p,, p ] u u u u u u u u T,1,2,20,21,20,21,40 (20) u where p, j(j=1,2,,40+ ) eans the j-th coponent of the u-th protein in subset S. The standard vector for the subset S is represented by P [ p, p,, p, p,, p, p,, p ] T (21) where,1,2,20,21,20,21,40
10 -454- p i, N 1 u pi, (i=1,2,,40+ ) (22) N u 1 where N is the nuber of proteins in the -th functional subset S. P can be considered as the standard protein of the subset S. According to the definition of W-SPsAA-MV, the saple of a query protein P should be given by P [ p, p, p, p, p, p, p ] T (23) The eleent for the query protein P can be derived by Eq (13). In this way, the siilarity between a unknown protein P and CD function. 2 (, ) Mah (, ) P is forulated by Eq (24), which is SPP D PP C =1,2,,M (24) In Eq (24), 2 Mah D ( PP, ) is the squared Mahalanobis distance between the query protein P and P, D ( P, P ) ( PP ) C ( P P ) (25) 2 T 1 Mah where T is the transpose operator, and (40+ )(40+ )-diensional atrix. 1 C is the inverse atrix of C, which is a C c c c 1,1 1,40 c 40,1 40,40 (26) where C is the covariance atrix for the subset S and the i, j c is given by 1 c ( p p )( p p ), (i,j=1,2,,40+ ) (27) N u u i, j, i i,, j, j N 1 u1 In Eq (24), C is the deterinant of atrix C. The saller the value D(P, P ), the greater the siilarity between P and P. A query protein P ay have one or ore functional classes, but we generally can only predict a functional category by calculating the iniu of Eq (24). Therefore, the query protein will be assigned to ( 1) functional categories through the following function:
11 -455- u Min F P P F P P F P P (28) { (, 1), (, 2),, (, )} where u is the functional set which was assigned to the query protein P. Min eans the nearest point between the query protein P and P (=1,2,, ). For our data set, we take =5 and also lists the predict results when =1,2,3,4,5 respectively Evaluation ethod In this paper, to prove the effectiveness of W-SPsAA-MV associated with NNA ethod, we copare the predict results of our approach and GOM, EBGW and GE ethod. We exained the prediction quality by the test which was used in the other four ethods. Here, the yeast proteoe is divided into eight groups according to the nuber of partner protein, and about 40% proteins of each group are separated fro the original dataset as testing test, the reaining proteins as training set. The goal of the ethod is to predict functional classes of the proteins in the test set using that of the reaining proteins. After rando sapling for any ties for every group, we consider the average success rate as the last success rate. For W-SPsAA-MV associated with CD classifier, we adopt self-consistency exaination, Jackknife exaination and 5-fold cross validation exaination to verify its effectiveness. 4. Results and discussion 4.1. The result and discussion for W-SPsAA-MV and NNA All datasets are calculated using our W-SPsAA-MV ethod and the nearest neighbor algrith (NNA), and the results were tested by the evaluation ethod as entioned above. In W-SPsAA-MV, different values w 1, w 2, w 3 and M have a significant ipact on the final results. After repeated test, we find that M=6 is the best choice for the dataset. And the value of w 1, w 2 and w 3 were shown in Table 2 for the different conditions. The coparison result between our ethod and GOM, EBGW and GE ethod is shown in Table 2. The overall accuracy of protein classification is
12 -456- iproved fro GOM, EBGW and GE ethod in soe cases. The K in Table 2 denotes the nuber of interacting partners, and N k is the nuber of proteins, which has k interacting partners function is known Table 2 The coparison results between our ethod and different algoriths K K=1 K=2 K=3 K=4 K=5 K=6 K=7 K>7 n K GOM a (%) EBGW b (%) GE c (%) w w w our ethod(%) a Coes fro[13]. b Coes fro[8]. c Coes fro[12]. Fro Table 2, we can find that the accuracy of our ethod is better than that of GOM ethod when K=2 and 4 with 7% and 1% iproveent, respectively. Especially when K=1, the accuracy of our ethod achieve to about 62.5%, while the GOM approach can t ake prediction. Therefore, the results show that W-SpsAA-MV and NNA can be used to predict protein functional class as a copleent ethod, when the protein-protein interaction inforation is liited. Besides, fro Table 2, we find that the success rate of our ethod is 62.5%, 68%, 78.5%, 80% and 85% when K=1, 2, 5, 6 and 7, respectively, which is better than EBGW ethod. We can see fro Table 2, our ethod s prediction overall accuracy is better than the GE ethod in ost cases. Therefore, the results deonstrate that the perforance of W-SpsAA-MV is superior to EBGW and GE as a whole. During our study, we find that the choice of M, w 1, w 2 and w 3 is very iportant,
13 -457- different value of M, w 1, w 2 and w 3 will have a ajor ipact on the last result. So we need test any ties to selet optial values The result and discussion for W-SPsAA-MV and CD classifier The Table 3, 4 and 5 give the prediction results for W-SpsAA-MV and CD classifier. We take w 1 =5, w 2 =0.1 and w 3 =1 respectively for CD classifier with self-consistency exaination, Jackknife exaination and 5-fold cross validation exaination. Table 3 The self-consistency results using W-SpsAA-MV and CD classifier N N 1 N 2 N 3 N 4 N 5 nuber k=1(%) 70.8 k=2(%) k=3(%) k=4(%) k=5(%) Table 4 The jackknife test results using W-SpsAA-MV and CD classifier N N 1 N 2 N 3 N 4 N 5 nuber k=1(%) 40.1 k=2(%) k=3(%) k=4(%) k=5(%)
14 -458- Table 5 The 5-fold cross-validation results using W-SpsAA-MV and CD classifier N N 1 N 2 N 3 N 4 N 5 k=1(%) 38.3 k=2(%) k=3(%) k=4(%) k=5(%) In Table 3, the nuber denotes the nuber of proteins which have ore than N functional categories. According to different N value, we can find the nuber of protein functional categories is uncertain, soe only have a functional class, and soe have ore than five functional categories. The k denotes the probability of accurately predict k functional classes for query proteins. When k=1 and N 1, we assign a nearest functional category to proteins of test set and reach 70.8% prediction accuracy. When k=2 and N 1, two functional categories was assigned to proteins of test set, the probability of accurately predict one of which is 84.6%. When k=2 and N 2, the probability which this two functional categories were accurately predict is 50.8% for CD classifier. Fro Figure 2, we find every curve gradually rise with the increase of k value, which eans that when N value is unchanged, as the k value increase, the prediction accuracy increase significantly. Especially, when N 1, the overall accuracy has increased fro 70.8% to 97.1%. This is because when the predicted functional categories increase, the probability will undoubtedly increase as long as one of these functional categories is accurate. Fro the vertical axis of Fig.1, we can find when k
15 -459- is constant, the prediction accuracy will less and less with the N value increase, which deonstrate that the ore the nuber of functional categories which was predict correctly with CD classifier, the less the success rate. For exaple, when k=5, the success rate has reduced fro 97.1% to 28.4% with the N value increase. Therefore, it is very difficult to predict accurately all functional categories for a query protein. Figure 2. Curve for self-consistency using CD classifier. Jackknife test also called leave-one-out test, which is considered the ost objective and ost rigorous evaluation ethod. The jackknife test result using CD classifier with W-SPsAA-MV is shown in Table 4. In addition, we adopt 5-fold cross-validation to evaluate our ethod. The Table 5 shows the accuracy using 5-fold cross-validation. Fro Table 4 and Table 5, we can find that the predicted result is siilar by coparing the jackknife test and 5-fold cross-validation. In order to directly copare the predicted result of three evaluation ethods, Figure 3 shows the predicted result curves when N 1. Fro Figure 3, we can find the accuracy of self-consistency is best and that of jackknife test and 5-fold cross-validation are fairly. Self-consistency contains the test saples theselves so that extracted features are ore consistent with the test saples, so the accuracy is better than that of other two assessent ethods. We also find fro Figure 3 the accuracy of jackknife test and 5-fold cross-validation grow faster than that of self-consistency exaination.
16 -460- Figure 3. Accuracy of self-consistency using CD classifier. 5. Conclusion In this paper, a new ethod of characterizing protein sequence naed W-SPsAA-MV is proposed. We adopt the nearest neighbor algorith (NNA) and covariant discriinant (CD) classifier respectively based on W-SPsAA-MV to predict protein functional classes.the experiental result show that the accuracy of W-SPsAA-MV with NNA is better than GOM, SWN-BA, EBGW and GE ethods in soe cases. In addition, by analyzing the experiental results with CD classifier, we can find the effect of predict is not very satisfactory when we assign a sall nuber of functional classes to query proteins. While the predicted effect is significantly iproved obviously with the increase of the nuber of predicted functional categories increase. So, the results deonstrate that W-SPsAA-MV is convenient to calculate and effective on the proble of protein functional class prediction. Furtherore, our approach is applicable in the case of litte and no inforation of protein-protein interaction. Acknowledgeent This work is supported by the National Nature Science Foundation of China (Grant , ) the National Nature Science Foundation of Hunan province (Grant 07JJ5080) and the Planned Science and Technology Project of Hunan Province (Grant 2009FJ3195).
17 -461- References [1] H. Shen, K. Chou, Predicting protein subnuclear location with optiized evidence-theoretic K-nearest classifer and pseudo aino acid coposition, Bioche. Biophys. Res. Coun. 337 (2005) [2] J. Whisstock, A. M. Lesk, Prediction of protein function fro protein sequence and structure, Rev. Biophys. 36 (2003) [3] W. Pearson, D. Lipan, Iproved tools for biological sequence coparison, PANS 85 (1998) [4] S. Altachul, T. Madden, A. Schäffer, J. Zhang, Z. Zhang, W. Miller, D. Lipan, Gapped BLAST and PSI-BLAST: A new generation of protein database search progras, Nucleic Acids Res. 25 (1997) [5] S. Benner, S. Chaberlin, D. Liberles, S. Covindarajan, L. Kencht, Functional inferences fro reconstructed evolutionary biology involving recitified databases-an evolutionarily grounded approach to functional genoics, Res. Microbiol. 151 (2000) [6] D. Ross, K. Andreas, C. Ananda, L. Dehaspe, Genoe scale prediction of protein functional class fro sequence using data ining, ACM 233 (2000) [7] Z. Cai, L. Han, Z. Ji, X. Chen, Y. Chen, SVM-Prot: Web-based support vector achine software for functional classification of a protein fro its priary sequence, Nucleic Acids Res. 31 (2003) [8] X. Wang, Z. Wang, W. Wang, Z. Zhang, A ethod of encoding based on grouped weight for protein function prediction, China J. Bioinforatics 5 (2007) [9] Z. Zhang, Z. Wang, Y. Wang, A new encoding schee to iprove the perforance of protein structural class prediction, Lecture Notes Coput. Sci. 36 (2005) [10] T. Zhang, Y. Ding, K. Chou, Prediction protein structural classes with pseudo-aino acid coposition: Approxiate entropy and hydrophobicity pattern, J. Theor. Biol. 250 (2008) [11] K. Chou, H. Shen, Recent progress in protein subcellular location prediction. Anal. Bioche. 370 (2007) [12] X. Li, B. Liao, Y. Shu, Q. Zeng, Protein functional class prediction using global encoding of aino acid sequence, J. Theor. Biol. 261 ( 2009) [13] A. Vazquez, A. Flaii, A. Maritan, A. Vespignani, Global function prediction fro protein-protein interaction networks, Nature Biotech. 21 (2003) [14] T. Dandekra, B. Snel, M. Huynen, P. Bork, Conservation of gene order: A fingerprint of proteins that physically interact, J. Trends Bioche. 23 (1998)
18 -462- [15] L. Kurgan, L. Hoaeian, Prediction of structural classes for protein sequences and doains-ipact of prediction algoriths, sequence representation and hoology, and test procedures on accuracy, Pattern Recogn. 39 (2006) [16] K. Kedarisetti, L. Kurgan, S. Dick, Classifier ensebles for protein structural class prediction with varying hoology, Bioche. Biophys. Res. Coun. 348 ( 2006) [17] L. Kurgan, K. Chen, Prediction of protein structural class for the twilight zone sequences, Bioche. Biophys. Res. Coun. 357 (2007) [18] R. Duda, P. Hart, Pattern Classification and Scene Analysis, Wiley, New York, [19] Y. Cai, A. Diog, Prediction of Saccharoyces cerevisiae protein functional class fro functional doain coposition, Bioinforatics 20 (2004) [20] K. Chou, Y. Cai, Predicting protein-protein interactions fro sequences in a hybridization space, J. Proteoe Res. 5 (2006) [21] K. Chou, H. Shen, Predicting protein subcellular location by fusing ultiple classifiers, J. Cell. Bioche. 99 (2006)
Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationAn improved TF-IDF approach for text classification *
Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationINTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationarxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationThe Velocities of Gas Molecules
he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationPure Bending Determination of Stress-Strain Curves for an Aluminum Alloy
Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationLecture L26-3D Rigid Body Dynamics: The Inertia Tensor
J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall
More informationAn Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationAn Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationMarkovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
More informationON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationEvaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process
IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy
More informationREQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationAN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
More informationMethod of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
More informationResearch Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
More informationData Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationA quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationThe Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationHigh Performance Chinese/English Mixed OCR with Character Level Language Identification
2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,
More informationModeling Cooperative Gene Regulation Using Fast Orthogonal Search
8 The Open Bioinforatics Journal, 28, 2, 8-89 Open Access odeling Cooperative Gene Regulation Using Fast Orthogonal Search Ian inz* and ichael J. Korenberg* Departent of Electrical and Coputer Engineering,
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationAUC Optimization vs. Error Rate Minimization
AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationReliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
More informationPerformance Evaluation of Machine Learning Techniques using Software Cost Drivers
Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationSAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
More informationBotnets Detection Based on IRC-Community
Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationCLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationPresentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationAudio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationThis paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
More information6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
More informationFactored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
More informationPartitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationCross-Domain Metric Learning Based on Information Theory
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Cross-Doain Metric Learning Based on Inforation Theory Hao Wang,2, Wei Wang 2,3, Chen Zhang 2, Fanjiang Xu 2. State Key Laboratory
More informationProblem Set 2: Solutions ECON 301: Intermediate Microeconomics Prof. Marek Weretka. Problem 1 (Marginal Rate of Substitution)
Proble Set 2: Solutions ECON 30: Interediate Microeconoics Prof. Marek Weretka Proble (Marginal Rate of Substitution) (a) For the third colun, recall that by definition MRS(x, x 2 ) = ( ) U x ( U ). x
More informationEntity Search Engine: Towards Agile Best-Effort Information Integration over the Web
Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION
More informationPREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More informationPhysics 211: Lab Oscillations. Simple Harmonic Motion.
Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationConstruction Economics & Finance. Module 3 Lecture-1
Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset
More informationCapacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
More informationOn Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
More informationHalloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationFuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)
324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei
More informationAutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation
//j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation
More informationQuality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
More informationModified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationStandards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates
National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE
More informationRECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
More informationMulti-Class Deep Boosting
Multi-Class Deep Boosting Vitaly Kuznetsov Courant Institute 25 Mercer Street New York, NY 002 vitaly@cis.nyu.edu Mehryar Mohri Courant Institute & Google Research 25 Mercer Street New York, NY 002 ohri@cis.nyu.edu
More informationA magnetic Rotor to convert vacuum-energy into mechanical energy
A agnetic Rotor to convert vacuu-energy into echanical energy Claus W. Turtur, University of Applied Sciences Braunschweig-Wolfenbüttel Abstract Wolfenbüttel, Mai 21 2008 In previous work it was deonstrated,
More informationTo identify entities and their relationships. To describe entities using attributes, multivalued attributes, derived attributes, and key attributes.
CHAPTER 3 Database Design Objectives To use ER odeling to odel data. To identify entities and their relationships. To describe entities using attributes, ultivalued attributes, derived attributes, and
More informationENZYME KINETICS: THEORY. A. Introduction
ENZYME INETICS: THEORY A. Introduction Enzyes are protein olecules coposed of aino acids and are anufactured by the living cell. These olecules provide energy for the organis by catalyzing various biocheical
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationAn online sulfur monitoring system can improve process balance sheets
Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental
More informationWork Travel and Decision Probling in the Network Marketing World
TRB Paper No. 03-4348 WORK TRAVEL MODE CHOICE MODELING USING DATA MINING: DECISION TREES AND NEURAL NETWORKS Chi Xie Research Assistant Departent of Civil and Environental Engineering University of Massachusetts,
More informationCooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn
More informationDriving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms
, March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving
More informationThe individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of
CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationComment on On Discriminative vs. Generative Classifiers: A Comparison of Logistic Regression and Naive Bayes
Coent on On Discriinative vs. Generative Classifiers: A Coparison of Logistic Regression and Naive Bayes Jing-Hao Xue (jinghao@stats.gla.ac.uk) and D. Michael Titterington (ike@stats.gla.ac.uk) Departent
More informationIntroduction to Unit Conversion: the SI
The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions
More informationA Score Test for Determining Sample Size in Matched Case-Control Studies with Categorical Exposure
Bioetrical Journal 48 (2006), 35 53 DOI: 0.002/bij.20050200 A Score Test for Deterining Saple Size in Matched Case-Control Studies with Categorical Exposure Sairan Sinha and Bhraar Mukherjee *; 2 Departent
More informationAirline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN
Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM
More informationCOMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES
COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,
More informationStable Learning in Coding Space for Multi-Class Decoding and Its Extension for Multi-Class Hypothesis Transfer Learning
Stable Learning in Coding Space for Multi-Class Decoding and Its Extension for Multi-Class Hypothesis Transfer Learning Bang Zhang, Yi Wang 2, Yang Wang, Fang Chen 2 National ICT Australia 2 School of
More information