This work covers sequence-based protein homology detection, a fundamental and challenging bioinformatics problem with a variety of real-world applications. The text first surveys a few popular homology detection methods, such as Position-Specific Scoring Matrix (PSSM) and Hidden Markov Model (HMM) based methods, and then describes a novel Markov Random Fields (MRF) based method developed by the authors. MRF-based methods are much more sensitive than HMM- and PSSM-based methods for remote homolog detection and fold recognition, as MRFs can model long-range residue-residue interaction. The text...
This work covers sequence-based protein homology detection, a fundamental and challenging bioinformatics problem with a variety of real-world applicat...
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book...
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the con...
The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Networks. The developed tool provides parameterization of the configuration for the neural network training to enable us to select the best neural architecture to address the problem. The tool makes use of confusion matrices to determine the degree of success of the network. A spectrum-temporal analysis of the study area was done on 57 images from May 20 to July 15, 2003 using the trained neural...
The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images fro...
This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures...
This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel t...
This book is concentrated on the synergy between computer science and numerical analysis. It is written to provide a firm understanding of the described approaches to computer scientists, engineers or other experts who have to solve real problems.
This book is concentrated on the synergy between computer science and numerical analysis. It is written to provide a firm understanding of the describ...
This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering applications. The text focuses strictly on HPC-related aspects, covering implementation on HPC architectures, taking Intel Xeon and Intel Xeon Phi clusters as representatives of current platforms.
This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering application...
This SpringerBrief discusses multiple forms of open-source-inspired outsourcing: opensourcing, innersourcing and crowdsourcing. It uses a framework-based comparison to explain the strengths and weaknesses of each approach. By pointing out characteristics along with benefits and pitfalls of each approach, the authors provide nuanced and research-based advice to managers and developers facing software sourcing decisions. The differences and commonalities of these three emerging approaches are carefully analyzed. Chapters explore the primary challenges of reliability, efficiency and robustness...
This SpringerBrief discusses multiple forms of open-source-inspired outsourcing: opensourcing, innersourcing and crowdsourcing. It uses a framework-ba...
This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games. Since the computer game industry is already rich with game engines, this book investigates: (i) if a game engine can be repurposed to stage pervasive games; (ii) if features describing a would-be pervasive game engine can be identified; (iii) using those features, if an...
This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they mak...
This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effective relay systems that provide high spectral efficiency and fully exploit the diversity of the relay channel. The brief covers advances in achievable rates, power allocation schemes, and error performance for half-duplex (HD) and full-duplex (FD) amplify-and-forward (AF) single-relay systems. The authors discuss the capacity and respective optimal power allocation for a wide range of HD protocols...
This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over th...
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the...
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditiona...