|
Showing 1 - 10 of
10 matches in All Departments
The connected dominating set has been a classic subject studied in
graph theory since 1975. Since the 1990s, it has been found to have
important applications in communication networks, especially in
wireless networks, as a virtual backbone. Motivated from those
applications, many papers have been published in the literature
during last 15 years. Now, the connected dominating set has become
a hot research topic in computer science. In this book, we are
going to collect recent developments on the connected dominating
set, which presents the state of the art in the study of connected
dominating sets. The book consists of 16 chapters. Except the 1st
one, each chapter is devoted to one problem, and consists of three
parts, motivation and overview, problem complexity analysis, and
approximation algorithm designs, which will lead the reader to see
clearly about the background, formulation, existing important
research results, and open problems. Therefore, this would be a
very valuable reference book for researchers in computer science
and operations research, especially in areas of theoretical
computer science, computer communication networks, combinatorial
optimization, and discrete mathematics.
The huge bandwidth of optical fiber was recognized back in the
1970s during the early development of fiber optic technology. For
the last two decades, the capacity of experimental and deployed
systems has been increasing at a rate of 100-fold each decade-a
rate exceeding the increase of integrated circuit speeds. Today,
optical communication in the public communication networks has
developed from the status of a curiosity into being the dominant
technology. Various great challenges arising from the deployment of
the wavelength division multiplexing (WDM) have attracted a lot of
efforts from many researchers. Indeed, the optical networking has
been a fertile ground for both theoretical researches and
experimental studies. This monograph presents the contribution from
my past and ongoing research in the optical networking area. The
works presented in this book focus more on graph-theoretical and
algorithmic aspects of optical networks. Although this book is
limited to the works by myself and my coauthors, there are many
outstanding achievements made by other individuals, which will be
cited in many places in this book. Without the inspiration from
their efforts, this book would have never been possible. This
monograph is divided into four parts: * Multichannel Optical
Networking Architectures, * Broadcast-and-Select Passive Optical
Networks, * Wavelength-Switched Optical Networks, * SONET/WDM
Optical Networks. The first part consists of the first three
chapters. Chapter 1 pro vides a brief survey on the networking
architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL
NETWORKS port networks, optical access networks and optical premise
networks.
The connected dominating set has been a classic subject studied in
graph theory since 1975. Since the 1990s, it has been found to have
important applications in communication networks, especially in
wireless networks, as a virtual backbone. Motivated from those
applications, many papers have been published in the literature
during last 15 years. Now, the connected dominating set has become
a hot research topic in computer science. In this book, we are
going to collect recent developments on the connected dominating
set, which presents the state of the art in the study of connected
dominating sets. The book consists of 16 chapters. Except the 1st
one, each chapter is devoted to one problem, and consists of three
parts, motivation and overview, problem complexity analysis, and
approximation algorithm designs, which will lead the reader to see
clearly about the background, formulation, existing important
research results, and open problems. Therefore, this would be a
very valuable reference book for researchers in computer science
and operations research, especially in areas of theoretical
computer science, computer communication networks, combinatorial
optimization, and discrete mathematics.
The huge bandwidth of optical fiber was recognized back in the
1970s during the early development of fiber optic technology. For
the last two decades, the capacity of experimental and deployed
systems has been increasing at a rate of 100-fold each decade-a
rate exceeding the increase of integrated circuit speeds. Today,
optical communication in the public communication networks has
developed from the status of a curiosity into being the dominant
technology. Various great challenges arising from the deployment of
the wavelength division multiplexing (WDM) have attracted a lot of
efforts from many researchers. Indeed, the optical networking has
been a fertile ground for both theoretical researches and
experimental studies. This monograph presents the contribution from
my past and ongoing research in the optical networking area. The
works presented in this book focus more on graph-theoretical and
algorithmic aspects of optical networks. Although this book is
limited to the works by myself and my coauthors, there are many
outstanding achievements made by other individuals, which will be
cited in many places in this book. Without the inspiration from
their efforts, this book would have never been possible. This
monograph is divided into four parts: * Multichannel Optical
Networking Architectures, * Broadcast-and-Select Passive Optical
Networks, * Wavelength-Switched Optical Networks, * SONET/WDM
Optical Networks. The first part consists of the first three
chapters. Chapter 1 pro vides a brief survey on the networking
architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL
NETWORKS port networks, optical access networks and optical premise
networks.
This book covers the research fields in biodiversity conservation,
the Belt and Road eco-environmental cooperation, China's five-year
plan for eco-environmental protection, sustainable development
goals assessment, and human health loss assessment. In the past,
these achievements have played an important scientific role in
supporting China's ecological and environmental protection, and
produced extensive social impacts and significant environmental
benefits. At the same time, the relevant research ideas and methods
also show the latest progress and trend in the field of
environmental strategy and planning in China in recent years, which
can be used for reference by experts and scholars of other
countries in the field of ecological environment.
This book covers the research fields in biodiversity conservation,
the Belt and Road eco-environmental cooperation, China's five-year
plan for eco-environmental protection, sustainable development
goals assessment, and human health loss assessment. In the past,
these achievements have played an important scientific role in
supporting China's ecological and environmental protection, and
produced extensive social impacts and significant environmental
benefits. At the same time, the relevant research ideas and methods
also show the latest progress and trend in the field of
environmental strategy and planning in China in recent years, which
can be used for reference by experts and scholars of other
countries in the field of ecological environment.
For the last ten years, face biometric research has been
intensively studied by the computer vision community. Face
recognition systems have been used in mobile, banking, and
surveillance systems. For face recognition systems, face spoofing
attack detection is a crucial stage that could cause severe
security issues in government sectors. Although effective methods
for face presentation attack detection have been proposed so far,
the problem is still unsolved due to the difficulty in the design
of features and methods that can work for new spoofing attacks. In
addition, existing datasets for studying the problem are relatively
small which hinders the progress in this relevant domain. In order
to attract researchers to this important field and push the
boundaries of the state of the art on face anti-spoofing detection,
we organized the Face Spoofing Attack Workshop and Competition at
CVPR 2019, an event part of the ChaLearn Looking at People Series.
As part of this event, we released the largest multi-modal face
anti-spoofing dataset so far, the CASIA-SURF benchmark. The
workshop reunited many researchers from around the world and the
challenge attracted more than 300 teams. Some of the novel
methodologies proposed in the context of the challenge achieved
state-of-the-art performance. In this manuscript, we provide a
comprehensive review on face anti-spoofing techniques presented in
this joint event and point out directions for future research on
the face anti-spoofing field.
The problem of dealing with missing or incomplete data in machine
learning and computer vision arises in many applications. Recent
strategies make use of generative models to impute missing or
corrupted data. Advances in computer vision using deep generative
models have found applications in image/video processing, such as
denoising, restoration, super-resolution, or inpainting. Inpainting
and Denoising Challenges comprises recent efforts dealing with
image and video inpainting tasks. This includes winning solutions
to the ChaLearn Looking at People inpainting and denoising
challenges: human pose recovery, video de-captioning and
fingerprint restoration. This volume starts with a wide review on
image denoising, retracing and comparing various methods from the
pioneer signal processing methods, to machine learning approaches
with sparse and low-rank models, and recent deep learning
architectures with autoencoders and variants. The following
chapters present results from the Challenge, including three
competition tasks at WCCI and ECML 2018. The top best approaches
submitted by participants are described, showing interesting
contributions and innovating methods. The last two chapters propose
novel contributions and highlight new applications that benefit
from image/video inpainting.
The problem of dealing with missing or incomplete data in machine
learning and computer vision arises in many applications. Recent
strategies make use of generative models to impute missing or
corrupted data. Advances in computer vision using deep generative
models have found applications in image/video processing, such as
denoising, restoration, super-resolution, or inpainting. Inpainting
and Denoising Challenges comprises recent efforts dealing with
image and video inpainting tasks. This includes winning solutions
to the ChaLearn Looking at People inpainting and denoising
challenges: human pose recovery, video de-captioning and
fingerprint restoration. This volume starts with a wide review on
image denoising, retracing and comparing various methods from the
pioneer signal processing methods, to machine learning approaches
with sparse and low-rank models, and recent deep learning
architectures with autoencoders and variants. The following
chapters present results from the Challenge, including three
competition tasks at WCCI and ECML 2018. The top best approaches
submitted by participants are described, showing interesting
contributions and innovating methods. The last two chapters propose
novel contributions and highlight new applications that benefit
from image/video inpainting.
DNA methylation is the modification of DNA molecule, transferring
methy group to the 5th position of the cytosine pyrimidine ring.
This biochemical process plays a crucial role in many cellular
processes of higher organisms. For example, people have found
distinct patterns of DNA methylation during cellular
differentiation and tissue development. The differential DNA
methylation profiles are often associated with gene expression. In
addition, DNA methylation reveals genomic imprinting and affects on
chromatin remodeling and cellular homeostasis. Such epigenetic
modification has also been proven to be involved in nearly all
cancer-related signaling pathways. However, the mechanism and
process against how DNA methylation regulates gene expression are
still not clear. The study of DNA methylation and its regulation on
gene expression provides fundamental and new insights into the
genetic heritability. In Chapter 1, Gene duplication event of NAC
transcription factor genes in rice and Arabidopsis was analyzed,
then it was found that chromosomal segment duplications mainly
contributed to the expansion of both species, whereas tandem
duplication occurred less frequently in Arabidopsis than rice.
Chapter 2 reviews the current literature related to the epigenetics
of alcoholism and summarizes our advanced study of global DNA
methylation in human post-mortem frontal cortex tissues obtained
from adult alcoholics and controls utilizing new microarray
technology and bioinformatics approaches. Chapter 3 gives a
comprehensive synopsis over the epigenetic modifications involved
in the regulation of bacterial gene expression as well as the
patho-epigenetic modifications in eukaryotic host tissues triggered
in the pathogenesis of particular Gram-negative bacterial
infections. Both, basic molecular mechanisms and complex
pathogenetic relations are described. Chapter 4 provides an
epigenetic repressing mechanism for breast cancer metastasis by
recruiting NuRD complex to ESR1 gene through TWIST1. Chapter 5
summarises most of mouse models that have helped us better
understand the pathogenesis mechanism during the development of
colitis. In Chapter 6, the authors review the various forms of
presentation of celiac disease including the lymphocytic enteritis,
along with their systemic manifestations. Chapter 7 provides an
insight to inflammatory response in light of DNA regulation and
methylation of key players. Because chronic inflammatory diseases
do share common features, recent progress in our understanding of
renal fibrosis and inflammation in chronic kidney disease will be
discussed as an example of epigenetic regulation in inflammatory
diseases. Chapter 8 summarizes the regulation of gene expression in
pterygium. Pterygium is an ocular surface disease and its
pathogenesis is currently unknown. Here, the genetic and epigenetic
changes in the disease are explored. Chapter 9 summaries the basics
and applications of recently proposed MiRaGE method that infer
miRNA-mediated regulation of target genes and
miRNA-targeting-specific promoter methylation. The applications to
differentiation, cell senescence, and miRNA transfection to lung
cancer celll lines are discussed. Chapter 10 proposes the role of
AP-1 chromatin modulator Jun dimerization protein 2 (JDP2) on
antioxidant response and inhibition of ROS production via Nrf2-ARE
signaling, as well as the induction of replicative senescence.
Chapter 11 compares expression profiles of mRNAs, microRNAs and
proteins of human embryonic stem cells hES-T3 grown on different
feeders and conditioned media. Chapter 12 reviews the most recent
molecular markers of Amyotrophic Lateral Sclerosis (ALS) and shows
some innovative perspectives on this topic from the point of view
of gene therapy. In addition, non-viral gene therapy based on the
non-toxic C-terminal fragment of the tetanus toxin (TTC) will also
be discussed.
|
|