Sheu T.F.,Providence University
BMC bioinformatics | Year: 2014
Signatures are short sequences that are unique and not similar to any other sequence in a database that can be used as the basis to identify different species. Even though several signature discovery algorithms have been proposed in the past, these algorithms require the entirety of databases to be loaded in the memory, thus restricting the amount of data that they can process. It makes those algorithms unable to process databases with large amounts of data. Also, those algorithms use sequential models and have slower discovery speeds, meaning that the efficiency can be improved. In this research, we are debuting the utilization of a divide-and-conquer strategy in signature discovery and have proposed a parallel signature discovery algorithm on a computer cluster. The algorithm applies the divide-and-conquer strategy to solve the problem posed to the existing algorithms where they are unable to process large databases and uses a parallel computing mechanism to effectively improve the efficiency of signature discovery. Even when run with just the memory of regular personal computers, the algorithm can still process large databases such as the human whole-genome EST database which were previously unable to be processed by the existing algorithms. The algorithm proposed in this research is not limited by the amount of usable memory and can rapidly find signatures in large databases, making it useful in applications such as Next Generation Sequencing and other large database analysis and processing. The implementation of the proposed algorithm is available at http://www.cs.pu.edu.tw/~fang/DDCSDPrograms/DDCSD.htm.
Luh L.-T.,Providence University
Engineering Analysis with Boundary Elements | Year: 2012
This is a continuation of our study about shape parameter, based on an approach very different from that of Luh [1,2]. Here we adopt an error bound of convergence order O(dω1 /d) as d→0, where 0<ω<1 is a constant and d denotes essentially the fill-distance. The constant ω is much smaller than the one appears in Luh [1,2] where the error bound is O(ω1 /d) only. Moreover, the constant ω here only mildly depends on the dimension n. It means that for high-dimensional problems the criteria of choosing the shape parameter presented in this paper are much better than those of Luh [1,2]. The drawback is that the distribution of data points must be slightly controlled. © 2012 Elsevier Ltd. All rights reserved.
Luh L.-T.,Providence University
Engineering Analysis with Boundary Elements | Year: 2013
This is a continuation of our former study, Luh , of the shape parameter β contained in Gaussian e-β[x]2, x∈Rn. Instead of using the error bound presented by Madych and Nelson , here we adopt an improved error bound constructed by Luh to evaluate the influence of β on error estimates. This results in a new set of criteria for the optimal choice of β and much sharper error estimates for Gaussian interpolation. What is important is that the notorious ill-conditioning of Gaussian interpolation can be greatly relieved because in this approach the fill distance need not be very small. © 2013 Elsevier Ltd. All rights reserved.
Liu J.-S.,Providence University
International Journal of Innovative Computing, Information and Control | Year: 2012
In this paper, we study the problem of joint routing, scheduling and stream control to maximize the network life, and at the same time, to satisfy end-to-end (ETE) traffic demands in wireless sensor networks (WSNs) with virtual multiple input multiple output (VMIMO) transmission. For this problem, we introduce a cross-layer formulation that can incorporate power and rate adaptation, and seamlessly integrate a SINR constraint at the physical layer to generate feasible sets of links for scheduling at the MAC layer and routing at the network layer. Specifically, we propose a column generation (CG) approach to exactly accommodate the most realistic scenario where power and rate are both discrete. In addition, we develop a fully distributed algorithm using the Lagrangian duality and a subgradient method to allow each node to independently obtain its own lifetime and scheduling parameters for the cross-layer optimization. Finally, we present computational results on different network topologies and discuss the insight to be gained when adopting different parameters on the control method. © 2012 ICIC International.
Luh L.-T.,Providence University
Computers and Mathematics with Applications | Year: 2012
This is the fifth of our series of works about the shape parameter. We now explore the parameter β contained in the famous Gaussian function e- β|x|2,x∈ Rn. In the theory of radial basis functions (RBFs), the Gaussian is frequently used in virtue of its good error bound and numerical tractability. However, the optimal choice of β has been unknown. People conversant with RBFs know that β is very influential, but do not have a reliable criterion of its choice. The purpose of this paper is to uncover its mystery. In particular, we have greatly improved the result of Madych (1992) in , and we present a concrete function of β which shows the influence of β in the error estimate of Gaussian interpolation and with which the optimal β can always be found. © 2011 Elsevier Ltd. All rights reserved.
Providence University | Date: 2012-09-14
An E. coli expression system for producing mature human tyrosinase is provided and includes an E. coli host, which has a trait for expressing endogenous methionyl aminopeptidase in cytoplasm, and an expression vector transformed into the E. coli host. The expression vector has a replication origin sequence of an E. coli, and the expression vector includes an inducible promoter and a DNA fragment of human tyrosinase having a sequence referenced as SEQ ID NO:3, wherein a 5 end of the DNA fragment is constructed at a restriction enzyme NdeI recognition site located at the downstream of the inducible promoter.
Hsieh S.H.,Providence University
Telemedicine journal and e-health : the official journal of the American Telemedicine Association | Year: 2012
To present the successful experiences of an integrated, collaborative, distributed, large-scale enterprise healthcare information system over a wired and wireless infrastructure in National Taiwan University Hospital (NTUH). In order to smoothly and sequentially transfer from the complex relations among the old (legacy) systems to the new-generation enterprise healthcare information system, we adopted the multitier framework based on service-oriented architecture to integrate the heterogeneous systems as well as to interoperate among many other components and multiple databases. We also present mechanisms of a logical layer reusability approach and data (message) exchange flow via Health Level 7 (HL7) middleware, DICOM standard, and the Integrating the Healthcare Enterprise workflow. The architecture and protocols of the NTUH enterprise healthcare information system, especially in the Inpatient Information System (IIS), are discussed in detail. The NTUH Inpatient Healthcare Information System is designed and deployed on service-oriented architecture middleware frameworks. The mechanisms of integration as well as interoperability among the components and the multiple databases apply the HL7 standards for data exchanges, which are embedded in XML formats, and Microsoft .NET Web services to integrate heterogeneous platforms. The preliminary performance of the current operation IIS is evaluated and analyzed to verify the efficiency and effectiveness of the designed architecture; it shows reliability and robustness in the highly demanding traffic environment of NTUH. The newly developed NTUH IIS provides an open and flexible environment not only to share medical information easily among other branch hospitals, but also to reduce the cost of maintenance. The HL7 message standard is widely adopted to cover all data exchanges in the system. All services are independent modules that enable the system to be deployed and configured to the highest degree of flexibility. Furthermore, we can conclude that the multitier Inpatient Healthcare Information System has been designed successfully and in a collaborative manner, based on the index of performance evaluations, central processing unit, and memory utilizations.
Liu J.-S.,Providence University
Wireless Personal Communications | Year: 2012
Cooperative Multiple-Input Multiple Output (MIMO) schemes are recently shown to be able to reduce the transmission energy in distributed wireless sensor networks (WSNs). With the merit of the MIMO schemes, we study the joint routing, scheduling and stream control problem with the aim of minimizing energy consumption while satisfying a given end-to-end traffic demand in scheduling-based multihop WSNs. We present a cross-layer formulation of the problem by incorporating various power and rate adaptation schemes, and taking into account an antenna beam pattern model and the signal-to-interference-and- noise constraint at the receiver. In this context, we also propose a column generation solution to get rid of the complexity of having to enumerate all possible sets of scheduling links. The formulation is verified by simulation experiments, and the results show its effectiveness in both energy saving and QoS provisioning. © 2011 Springer Science+Business Media, LLC.
Liao G.-L.,National Taitung University |
Sheu S.-H.,Providence University
International Journal of Production Economics | Year: 2011
This study applies periodic preventive maintenance (PM) to economic production quantity (EPQ) model for a randomly failing production process having a deteriorating production system with increasing hazard rate: minimal repaired and reworked upon failure (out of control state). The minimal repair performs restorations and returns the system to an operating state (in-control state). It is assumed that, after each PM, two types of PM are performed, namely imperfect PM and perfect PM. The probability that PM is perfect depends on the number of imperfect maintenance operations performed since the last renewal cycle. Mathematical formulas for the expected total cost are obtained. For the EPQ model, the optimum run time, required to minimize the total cost, is discussed. Various special cases are considered, including the maintenance learning effect. Finally, a numerical example is presented to illustrate the effect of PM and setup, breakdown and holding cost. © 2010 Elsevier B.V. All rights reserved.
Yen Y.-S.,Providence University
International Journal of Mobile Communications | Year: 2012
The purpose of this study is to identify perceived values in mobile phone services, and further explore the relationships among perceived value, customer satisfaction, and customer loyalty. A mediated regression analysis was used and 218 savvy mobile phones users in Taiwan were investigated. The findings reveal that perceived values, including utilitarian value, social value, and hedonic value, positively influence customer loyalty, and the mediation of customer satisfaction is also significant. The contributions of this study are two-fold. The first is to recognise the importance of utilitarian value, social value, and hedonic value for customer loyalty in mobile phone services. The second is to offer insights for mobile marketers to improve perceived value for customers and enhance their satisfaction levels, helping with customer retention. © 2012 Inderscience Enterprises Ltd.