Informatics

Exploring Societal Risk Classification of the Posts of Tianya Club
To identify the societal risk category of the posts of Tianya Club, several studies are carried out toward the posts of Tianya Club. With 2-month manually risk labeled new posts published during December of 2011 to January of 2012, statistical analysis of posts is conducted at first. Later, similarity analysis of posts from one risk category, different risk categories and published on different...


Study on Management of the Life Cycle of Emergency Plan System Based on Effectiveness
The whole life cycle of the emergency plan includes compilation, examination and approval, use and exercise, revision. With changes of all kinds of factors, the effectiveness of the emergency plan will gradually reduce. It's necessary to study the full life cycle of emergency plan in order to dynamically and pertinently manage the plan. Based on other areas' study on the life cycle, this paper ...
Modified Collaborative Filtering Algorithm Based on ItemRank
The most crucial component of collaborative filtering recommendation algorithm (CF) is the mechanism of calculating similarities among items or users. In this paper, a new CF algorithm based on ItemRank Similarity (IRS) is proposed, which extracts items' quality characteristics from the similar matrix. The corresponding algorithmic accuracy is measured by the ranking score, precision, recall an...


The Cybernetics of Innovation and Knowledge
This paper begins to introduce the General Systems Theory and ‘Cybernetics' concept. Then, it sets out to integrate these two theories to gain insight into the processes driving the distinct processes of open, user driven innovation and closed producer driven innovation. By using the simplest model of control the modulation of the relationship between a fast expansive dynamic and a slow const...
Critical Infrastructure Management for Telecommunication Networks
Telecommunication network infrastructures both stationary and ad hoc, play an important role in maintaining the stability of society worldwide. The protection of these critical infrastructures and their supporting structures become highly challenged due to its complexity. The understanding of interdependency of these infrastructures is the essential step to protect these infrastructures from de...


Pharmacokinetics of insulin lispro in type 2 diabetes during closed-loop insulin delivery
Insulin pharmacokinetics is not well understood during continuous subcutaneous insulin infusion in type 2 diabetes (T2D). We analysed data collected in 11 subjects with T2D [6 male, 9 white European and two of Indian ethnicity; age 59.7(12.1) years, BMI 30.1(3.9) kg/m2, fasting C-peptide 1002.2(365.8) pmol/l, fasting plasma glucose 9.6(2.2) mmol/l, diabetes duration 8.0(6.2) years and HbA1c 8.3...
A new approach to measure the scientific strengths of territories
The current work applies a method for mapping the supply of new knowledge from public research organizations, in this case from Italian institutions at the level of regions and provinces (NUTS2 and NUTS3). Through the analysis of scientific production indexed in the Web of Science for the years 2006–2010, the new knowledge is classified in subject categories and mapped according to an algorit...

Optimal Treatment Strategy for a Tumor Model under Immune Suppression
We propose a mathematical model describing tumor-immune interactions under immune suppression. These days evidences indicate that the immune suppression related to cancer contributes to its progression. The mathematical model for tumor-immune interactions would provide a new methodology for more sophisticated treatment options of cancer. To do this we have developed a system of 11 ordinary diff...
Analysis of Epileptic Seizures with Complex Network
Epilepsy is a disease of abnormal neural activities involving large area of brain networks. Until now the nature of functional brain network associated with epilepsy is still unclear. Recent researches indicate that the small world or scale-free attributes and the occurrence of highly clustered connection patterns could represent a general organizational principle in the human brain functional ...

Neurophysiological Tools to Investigate Consumer’s Gender Differences during the Observation of TV Commercials
Neuromarketing is a multidisciplinary field of research whose aim is to investigate the consumers’ reaction to advertisements from a neuroscientific perspective. In particular, the neuroscience field is thought to be able to reveal information about consumer preferences which are unobtainable through conventional methods, including submitting questionnaires to large samples of consumers or pe...
PLI Cancellation in ECG Signal Based on Adaptive Filter by Using Wiener-Hopf Equation for Providing Initial Condition
This paper presents a technique for finding the optimal initial weight for adaptive filter by using difference equation. The obtained analytical response of the system identifies the appropriate weights for the system and shows that the MSE depends on the initial weight. The proposed technique is applied to eliminate the known frequency power line interference (PLI) signal in the electrocardiog...

Limited memory BFGS method based on a high-order tensor model
This paper is aimed to employ a modified quasi-Newton equation in the framework of the limited memory BFGS method to solve large-scale unconstrained optimization problems. The modified secant equation is derived by means of a forth order tensor model to improve the curvature information of the objective function. The global and local convergence properties of the modified LBFGS method, on unifo...
Dynamic behaviors and soliton solutions of the modified Zakharov–Kuznetsov equation in the electrical transmission line
The modified Zakharov–Kuznetsov (mZK) equation in the electrical transmission line is investigated in this paper. Different expressions on the parameters in the mZK equation are given. By means of the Hirota method, bilinear forms and soliton solutions of the mZK equation are obtained. Linear-stability analysis yields the instability condition for such soliton solutions. We find that the soli...
Web Spider Defense Technique in Wireless Sensor Networks
Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioin...
A Graph Embedding Method Based on Sparse Representation for Wireless Sensor Network Localization
In accordance with the problem that the traditional trilateral or multilateral estimation localization method is highly dependent on the proportion of beacon nodes and the measurement accuracy, an algorithm based on kernel sparse preserve projection (KSPP) is proposed in this dissertation. The Gaussian kernel function is used to evaluate the similarity between nodes, and the location of the unk...