![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessStructural entropy minimization combining graph representation for money laundering identification
Money laundering identification (MLI) is a challenging task for financial AI research and application due to its massive transaction volume, label sparseness, and label bias. Most of the existing MLI methods f...
-
Article
Open AccessField investigation combined with modeling uncovers the ecological heterogeneity of Aedes albopictus habitats for strategically improving systematic management during urbanization
Aedes albopictus is an invasive vector of serious Aedes-borne diseases of global concern. Habitat management remains a critical factor for establishing a cost-effective systematic strategy for sustainable vector ...
-
Article
Overexpression of LncRNA PSMG3-AS1 Distinguishes Glioblastomas from Sarcoidosis
In clinical practices, glioblastomas (GBM) in some cases can be misdiagnosed as sarcoidosis. This study aimed to develop a biomarker to distinguish GBM from sarcoidosis. In this study, we found that PSMG3-AS1 ...
-
Article
Open AccessA field-based modeling study on ecological characterization of hourly host-seeking behavior and its associated climatic variables in Aedes albopictus
The global spread of mosquito-borne diseases (MBD) has presented increasing challenges to public health. The transmission of MBD is mainly attributable to the biting behaviors of female mosquitoes. However, th...
-
Article
Rectangle Transformation Problem
In this paper, we propose the rectangle transformation problem (RTP) and its variants. RTP asks for rectangle partitions on two rectangles of the same area which produce two identical sets of pieces. We are in...
-
Chapter and Conference Paper
Navigating a Shortest Path with High Probability in Massive Complex Networks
In this paper, we study the problem of point-to-point shortest path query in massive complex networks. Nowadays a breadth first search in a network containing millions of vertices may cost a few seconds and it...
-
Article
Open AccessResistance and Security Index of Networks: Structural Information Perspective of Network Security
Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure
-
Article
Open AccessThree-Dimensional Gene Map of Cancer Cell Types: Structural Entropy Minimisation Principle for Defining Tumour Subtypes
In this study, we propose a method for constructing cell sample networks from gene expression profiles and a structural entropy minimisation principle for detecting natural structure of networks and for identi...
-
Article
Open AccessHomophyly/Kinship Model: Naturally Evolving Networks
It has been a challenge to understand the formation and roles of social groups or natural communities in the evolution of species, societies and real world networks. Here, we propose the hypothesis that homoph...
-
Article
Strategies for network security
Security of networks has become an increasingly important issue in the highly connected world. Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information ...
-
Article
Global core, and galaxy structure of networks
We propose a novel approach, namely local reduction of networks, to extract the global core (GC, for short) from a complex network. The algorithm is built based on the small community phenomenon of networks. The ...
-
Chapter and Conference Paper
Principles of Network Computing
In the new century, the study of networks is being developed rapidly. Traditional algorithms based on the classical graph theory have not been able to cope with large scaled networks due to their inefficiency....
-
Chapter and Conference Paper
Characterizations of Locally Testable Linear- and Affine-Invariant Families
The linear- or affine-invariance is the property of a function family that is closed under linear- or affine- transformations on the domain, and closed under linear combinations of functions, respectively. Bot...
-
Chapter and Conference Paper
Development of a Control System for Automating of Spiral Concentrators in Coal Preparation Plants
Spiral concentrators have been widely used in coal preparation plants in Illinois and elsewhere to clean 1 mm ×150 μm particle size coal fraction. The major factors which have made spiral concentrator so popul...
-
Chapter and Conference Paper
Input Design for Systems Under Identification as Applied to Ultrasonic Transducers
An input design system identification (IDSI) method is outlined in this chapter based on input/output data gathered from random excitation of a system so as to excite all modes. The data set is then used to co...
-
Chapter and Conference Paper
Definable Filters in the Structure of Bounded Turing Reductions
In this article, we show that there exist c.e. bounded Turing degrees \(\textbf{a}\) ,