Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1488732guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
FGCN '08: Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 03
2008 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
December 13 - 15, 2008
ISBN:
978-0-7695-3431-2
Published:
13 December 2008

Reflects downloads up to 16 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Article
Article
A Study on the Development of Customer-Oriented u-City Service Model for u-City Business

The concept of the u-City is the future city model based on urban innovations which include urban management, life quality improvement, new industrial development, etc. And it consists of three elements – technology, space, life style. This paper ...

Article
The Study of Location Strategy for Bank's Branch Network through the Analysis of Inter-regional Financial Transaction Network

This study attempts to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network analysis. Whereas the previous studies analyzed the locations of bank branches on the ...

Article
The Development of Software Pricing Schemata and Its Application to Software Industry in Korea

This paper aims to suggest a comprehensive pricing schemata that software developers, sellers, and distributers can use regardless of the state of software uses. To do so, first, it reviews the criteria of pricing that are frequently discussed in the ...

Article
A Dynamic, Architectural Model of Sabina Vulgaris Growth

Thanks to its significant value in Anti-drought, Sabina vulgaris is becoming more and more important. But much of past research work was primarily focused on its eco-physiological characteristics while ignoring its basic topological architecture and ...

Article
Support Vector Machine Integrated CCA for Classification of Complex Chemical Patterns

SVM for classification is sensitive to noise and multicollinearity between attributes. Correlative component analysis (CCA) was used to eliminated multicollinearity and noise of original sample data before classified by SVM. To improve the SVM ...

Article
Random Forests for Prediction of DNA-Binding Residues in Protein Sequences Using Evolutionary Information

A new machine learning approach has been developed in this study for sequence-based prediction of DNA-binding residues in proteins. The approach used both the labeled data instances collected from the available structures of protein-DNA complexes and ...

Article
EEG Analysis of Frontal Lobe Activities by Decision Stimuli

The brain is processing various acts and thoughts of humans. Among the functions of the brain, decision making, reasoning and complex calculation are governed by the frontal lobe. If the FLA (Frontal Lobe Activity) is kept low for a long period of time, ...

Article
Score Based Biometric Template Selection and Update

A biometric system usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait at registration. As a result, it is essential to select several samples as templates. This paper ...

Article
Voice as a Robust Biometrics

Robust voice based features for biometric authentication in noisy environments are proposed. The proposed processing includes Gamma tone auditory bandpass filtering of speech signal, rectification, and compression to model the effects of the auditory ...

Article
Neuronal Spike Sorting Based on 2-Stage RBF Networks

In this paper, 2-stage Radial Basis Function (RBF) Network method is used for neural spike sorting. Firstly, raw signals are obtained from Neural Signal Simulator, and added white noise ranged from -10dBto -40dB. Secondly, spikes are detected out with ...

Article
Identification and Mapping of QTLs for Resistance to Ascochyta Blight (Pathotype III) in Chickpea

Microsatellites have become markers of choice for molecular mapping and marker assisted selection of key traits such as disease resistance in many crop species. The aim of this study was to construct a genetic linkage map and analysis of quantitative ...

Article
A Novel SVC Method Based on K-means

In this paper, a novel support vector clustering algorithm based on k-means (SVC-KM) is presented not only improve the SVC running speed, but also overcome the weaknesses of k-means algorithm. Firstly, SVC algorithm was employed to identify some samples ...

Article
The Application of Support Vector Machine to Operon Prediction

In this paper, we apply the least-square support vector machine (LS-SVM) to operon prediction of Escherichia coli (E.coli), with different combinations of intergenic distance, gene expression data, and phylogenetic profile. Experimental results ...

Article
Identifying Biologically Significant Pathways by Gene Set Enrichment Analysis Using Fisher's Criterion

Gene set enrichment analysis (GSEA) is a computational method to identify statistically significant gene-sets showing differential expression between two groups. In particular, unlike other previous approaches, this enables us to uncover their ...

Article
An Evaluated iSCSI Protocol for an Embedded Multi-agent Based Health Care Service

In this paper we have proposed a parameter-evaluated iSCSI protocol that automates the multi-agent coordination on the resource-constrained devices for the healthcare service. The coordination between the resource control devices and automated agents ...

Article
RFID System for Medical Charts Management and Its Enhancement of Recognition Property

Many hospitals adopt hand-in-out system for patient management and patient’s disease history report. It causes medical report sheets in-out to complicate in a hospital’s related department and it is a heavy burden to worker. Sometimes, it can give rise ...

Article
The Vulnerabilities Analysis of Fuzzy Vault Using Password

Fingerprint is immutable and unchangeable. Thus, if it is disclosed, owner of fingerprint cannot use his fingerprint any longer. Fuzzy vault is a cryptographic framework that makes secure template storage to bind the template with a uniformly random ...

Article
Modeling the Marginal Distribution of Gene Expression with Mixture Models

We report the results of fitting mixture models to the distribution of expression values for individual genes over a broad range of normal tissues, which we call the marginal distribution of the gene. The base distributions used were normal, lognormal ...

Article
HaDextract: Extracting HLA-Disease Interaction Information from Biomedical Literature

The HLA control a variety of function involved in immune response and influence susceptibility to over 40 diseases. It is important to find out how HLA cause the disease or modify susceptibility or course of it. In this paper, we developed an automatic ...

Article
Diabetes Data Analysis and Prediction Model Discovery Using RapidMiner

Data mining techniques have been extensively applied in bioinformatics to analyze biomedical data. In this paper, we choose the Rapid-I’s RapidMiner as our tool to analyze a Pima Indians Diabetes Data Set, which collects the information of patients with ...

Article
Sensor based Environment Adaptive Learning System for Person Authorization

This paper presents a robust distributed architecture for adaptive and intelligent systems, called EAS (Environment Adaptive Learning Scheme), with self-learning capability to use under dynamic and uneven environments. Our proposed system adopts the ...

Article
Index terms have been assigned to the content through auto-classification.

Recommendations