首页 > 最新文献

2008 International Conference on Information Technology最新文献

英文 中文
Web–Enabled Classification of SNPs for Genome–Wide Association Studies 全基因组关联研究中SNPs的网络分类
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.65
Abhijit R. Tendulkar, N. Stojanovic, Robert Barber
Whole genome association studies of the genetic underpinnings of complex phenotypes, and human diseases in particular, have been steadily gaining momentum over the past several years. Yet, the number of polymorphic sites in the human genome, including, but not limited to, single nucleotide polymorphisms (SNPs) is so large that identifying the combination of these few that have a significant effect on the condition of interest remains an overwhelming task. In this manuscript we present a new networked solution, and a program GeneNAB implementing it, to the computational identification and ranking of SNPs likely to be relevant for the phenotype of interest, genome-wide. We expect that the output of this program will be useful to guide further laboratory and clinical studies of these SNPs.
在过去几年中,复杂表型遗传基础的全基因组关联研究,特别是人类疾病的全基因组关联研究一直在稳步发展。然而,人类基因组中多态性位点的数量,包括但不限于单核苷酸多态性(SNPs),是如此之大,以至于识别这些少数对感兴趣的条件有重大影响的组合仍然是一项艰巨的任务。在这篇论文中,我们提出了一个新的网络解决方案,以及一个实现它的程序GeneNAB,以计算识别和排序可能与感兴趣的表型相关的snp,全基因组。我们期望该程序的输出将有助于指导这些snp的进一步实验室和临床研究。
{"title":"Web–Enabled Classification of SNPs for Genome–Wide Association Studies","authors":"Abhijit R. Tendulkar, N. Stojanovic, Robert Barber","doi":"10.1109/ICIT.2008.65","DOIUrl":"https://doi.org/10.1109/ICIT.2008.65","url":null,"abstract":"Whole genome association studies of the genetic underpinnings of complex phenotypes, and human diseases in particular, have been steadily gaining momentum over the past several years. Yet, the number of polymorphic sites in the human genome, including, but not limited to, single nucleotide polymorphisms (SNPs) is so large that identifying the combination of these few that have a significant effect on the condition of interest remains an overwhelming task. In this manuscript we present a new networked solution, and a program GeneNAB implementing it, to the computational identification and ranking of SNPs likely to be relevant for the phenotype of interest, genome-wide. We expect that the output of this program will be useful to guide further laboratory and clinical studies of these SNPs.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Scenario Generation Based on UML Activity Diagrams 基于UML活动图的自动场景生成
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.52
G. SapnaP., H. Mohanty
Specification-based testing, also called black-box testing, involves producing a test suite based on the specification. Using a formal language or a model for specification helps in automation of the test generation process. For large and complex systems, testing based on covering the control flow or data flow paths becomes infeasible. In this regard, an efficient set of test scenarios need to be generated. One of the main objectives of testing is to check whether customer requirements are met. Scenarios help in generating sequence of events that represent the purpose of a system. Requirements are well defined using activity diagrams and this has led to an increased interest on generating test scenarios using activity diagrams. Each path from the initial node to the final node in an activity diagram constitutes a test scenario. The problem encountered following the strategy is exponential increase in test scenarios when considering concurrent activities, represented in an activity diagram using fork-join nodes. In this paper, we investigate this problem and have observed that the growth in test scenarios can be limited by considering domain dependency existing among concurrent activities. The paper proposes a method to automate the test scenario generation process.
基于规范的测试,也称为黑盒测试,涉及到根据规范生成测试套件。使用正式语言或模型进行规范有助于测试生成过程的自动化。对于大型和复杂的系统,基于覆盖控制流或数据流路径的测试变得不可行的。在这方面,需要生成一组有效的测试场景。测试的主要目的之一是检查是否满足了客户的要求。场景有助于生成代表系统目的的事件序列。使用活动图很好地定义了需求,这导致了使用活动图生成测试场景的兴趣增加。活动图中从初始节点到最终节点的每条路径都构成了一个测试场景。在考虑并发活动(在使用fork-join节点的活动图中表示)的测试场景中,遵循该策略遇到的问题呈指数增长。在本文中,我们研究了这个问题,并观察到通过考虑并发活动之间存在的域依赖性,可以限制测试场景的增长。本文提出了一种自动化测试场景生成过程的方法。
{"title":"Automated Scenario Generation Based on UML Activity Diagrams","authors":"G. SapnaP., H. Mohanty","doi":"10.1109/ICIT.2008.52","DOIUrl":"https://doi.org/10.1109/ICIT.2008.52","url":null,"abstract":"Specification-based testing, also called black-box testing, involves producing a test suite based on the specification. Using a formal language or a model for specification helps in automation of the test generation process. For large and complex systems, testing based on covering the control flow or data flow paths becomes infeasible. In this regard, an efficient set of test scenarios need to be generated. One of the main objectives of testing is to check whether customer requirements are met. Scenarios help in generating sequence of events that represent the purpose of a system. Requirements are well defined using activity diagrams and this has led to an increased interest on generating test scenarios using activity diagrams. Each path from the initial node to the final node in an activity diagram constitutes a test scenario. The problem encountered following the strategy is exponential increase in test scenarios when considering concurrent activities, represented in an activity diagram using fork-join nodes. In this paper, we investigate this problem and have observed that the growth in test scenarios can be limited by considering domain dependency existing among concurrent activities. The paper proposes a method to automate the test scenario generation process.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131172768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Product Recommendation System Using Vector Space Model and Association Rule 基于向量空间模型和关联规则的产品推荐系统
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.48
Debajyoti Mukhopadhyay, R. Dutta, A. Kundu, R. Dattagupta
This paper presents an alternative product recommendation system for Business-to-customer e-commerce purposes. The system recommends the products to a new user. It depends on the purchase pattern of previous users whose purchase pattern are close to that of new user. The system is based on vector space model to find out the closest user profile among the profiles of all users in database. It also implements Association rule mining based recommendation system, taking into consideration the order of purchase, in recommending more than one product. To make the association rule memory-efficient, cellular automata is used.
本文提出了一种用于企业对客户电子商务目的的替代产品推荐系统。系统向新用户推荐产品。它取决于以前用户的购买模式,这些用户的购买模式与新用户的购买模式接近。该系统基于向量空间模型,从数据库中所有用户的配置文件中找出最接近的用户配置文件。并实现了基于关联规则挖掘的推荐系统,在推荐多个产品时考虑了购买顺序。为了提高关联规则的内存效率,使用了元胞自动机。
{"title":"A Product Recommendation System Using Vector Space Model and Association Rule","authors":"Debajyoti Mukhopadhyay, R. Dutta, A. Kundu, R. Dattagupta","doi":"10.1109/ICIT.2008.48","DOIUrl":"https://doi.org/10.1109/ICIT.2008.48","url":null,"abstract":"This paper presents an alternative product recommendation system for Business-to-customer e-commerce purposes. The system recommends the products to a new user. It depends on the purchase pattern of previous users whose purchase pattern are close to that of new user. The system is based on vector space model to find out the closest user profile among the profiles of all users in database. It also implements Association rule mining based recommendation system, taking into consideration the order of purchase, in recommending more than one product. To make the association rule memory-efficient, cellular automata is used.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Design Issues of a Policy Enforcer to Secure Multi-domain Environment 保护多域环境的策略执行器的设计问题
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.58
A. Rao, H. Mohanty
Policy Enforcer is an online monitoring tool for detecting security violations in a multi domain environment where the network, system and service are the multiple domains. One can ensure security for a network service by protecting the sensitive resources at these three domains. This paper presents the various design issues of policy enforcer, which have the performance impact in terms of detection-rate, response-time and protection-rate against resource security violations.
Policy Enforcer是一种在线监控工具,用于检测多域环境中的安全违规,其中网络、系统和服务是多个域。通过保护这三个域中的敏感资源,可以确保网络服务的安全性。本文介绍了策略执行器的各种设计问题,这些问题在资源安全违规的检测率、响应时间和保护率方面对性能产生影响。
{"title":"Design Issues of a Policy Enforcer to Secure Multi-domain Environment","authors":"A. Rao, H. Mohanty","doi":"10.1109/ICIT.2008.58","DOIUrl":"https://doi.org/10.1109/ICIT.2008.58","url":null,"abstract":"Policy Enforcer is an online monitoring tool for detecting security violations in a multi domain environment where the network, system and service are the multiple domains. One can ensure security for a network service by protecting the sensitive resources at these three domains. This paper presents the various design issues of policy enforcer, which have the performance impact in terms of detection-rate, response-time and protection-rate against resource security violations.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124045456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Scenario-Based Test Case Generation 基于场景的测试用例生成的新方法
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.43
Baikuntha Narayan Biswal, Pragyan Nanda, D. Mohapatra
Testing of software is a time-consuming activity which requires a great deal of planning and resources. Model-based testing is gaining importance as a research issue. In scenario-based testing, test scenarios are used for generating test cases, test drivers etc. UML is widely used to describe analysis and design specifications of software development. UML models are important source of information for test case design. UML activity diagrams describe the realization of the operation in design phase and also support description of parallel activities and synchronization aspects involved in different activities perfectly. In this paper we generate test scenarios from activity diagrams, which achieve test adequacy criteria perfectly. Finally we generate test cases by analyzing the respective sequence and class diagrams of each scenario, which achieves maximum path coverage criteria. Also in our approach, the cost of test model creation is reduced as design is reused.
软件测试是一项耗时的活动,需要大量的计划和资源。基于模型的测试作为一个研究课题越来越受到重视。在基于场景的测试中,测试场景用于生成测试用例、测试驱动程序等。UML被广泛用于描述软件开发的分析和设计规范。UML模型是测试用例设计的重要信息源。UML活动图描述了设计阶段操作的实现,也很好地支持对不同活动中涉及的并行活动和同步方面的描述。在本文中,我们从活动图中生成测试场景,它完美地达到了测试充分性标准。最后,我们通过分析每个场景各自的序列和类图来生成测试用例,从而达到最大路径覆盖标准。同样,在我们的方法中,测试模型创建的成本随着设计的重用而减少。
{"title":"A Novel Approach for Scenario-Based Test Case Generation","authors":"Baikuntha Narayan Biswal, Pragyan Nanda, D. Mohapatra","doi":"10.1109/ICIT.2008.43","DOIUrl":"https://doi.org/10.1109/ICIT.2008.43","url":null,"abstract":"Testing of software is a time-consuming activity which requires a great deal of planning and resources. Model-based testing is gaining importance as a research issue. In scenario-based testing, test scenarios are used for generating test cases, test drivers etc. UML is widely used to describe analysis and design specifications of software development. UML models are important source of information for test case design. UML activity diagrams describe the realization of the operation in design phase and also support description of parallel activities and synchronization aspects involved in different activities perfectly. In this paper we generate test scenarios from activity diagrams, which achieve test adequacy criteria perfectly. Finally we generate test cases by analyzing the respective sequence and class diagrams of each scenario, which achieves maximum path coverage criteria. Also in our approach, the cost of test model creation is reduced as design is reused.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Overheads and Mean Route Failure Time of a Hybrid Protocol for Node-Disjoint Multipath Routing in Mobile Ad Hoc Networks 移动自组织网络中节点分离多路径路由混合协议的开销和平均路由失败时间
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.26
A. Abbas
Identification of node-disjoint paths in an ad hoc network is a challenging task. A protocol that is hybrid of an incremental protocol and a protocol that tries to identify multiple node-disjoint paths in a single route discovery, can be used to identify a maximal set of node-disjoint paths between a given source and destination. In this paper, we analyze the communication and computational overheads and the time after which all node-disjoint paths between a given source and a destination are expected to fail.
自组织网络中节点不相交路径的识别是一项具有挑战性的任务。一个混合了增量协议和试图在单个路由发现中识别多个节点不相交路径的协议,可以用来识别给定源和目的地之间的最大节点不相交路径集。在本文中,我们分析了通信和计算开销以及给定源和目标之间的所有节点不相交路径预计失败的时间。
{"title":"Overheads and Mean Route Failure Time of a Hybrid Protocol for Node-Disjoint Multipath Routing in Mobile Ad Hoc Networks","authors":"A. Abbas","doi":"10.1109/ICIT.2008.26","DOIUrl":"https://doi.org/10.1109/ICIT.2008.26","url":null,"abstract":"Identification of node-disjoint paths in an ad hoc network is a challenging task. A protocol that is hybrid of an incremental protocol and a protocol that tries to identify multiple node-disjoint paths in a single route discovery, can be used to identify a maximal set of node-disjoint paths between a given source and destination. In this paper, we analyze the communication and computational overheads and the time after which all node-disjoint paths between a given source and a destination are expected to fail.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Explorative Study to Identify the Critical Success Factors for ERP Implementation in Indian Small and Medium Scale Enterprises 印度中小企业ERP实施成功关键因素的探索性研究
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.66
Parijat Upadhyay, P. Dan
Over the last few years many firms of any significant size are in some stage of implementing enterprise resources planning (ERP) systems or other similar multifunctional enterprise systems or are planning to implementing ERP systems in their organization to reap the benefits of integration. Some are in the early stages of the process, giving consideration to the very substantial implementation costs. Given the nature and magnitude of the problems in encountered in implementing an ERP project, this study would attempt to identify the critical success factors (CSF¿s) for a successful implementation of an ERP project since it calls for substantial effort on the part of all the stake holders involved to make the implementation a success. This paper explores the existing literature on ERP implementation issues in context to small and medium scale enterprises and attempts a compilation of the factors that assume great significance while implementing ERP in SMEs.
在过去的几年中,任何规模的许多公司都处于实施企业资源规划(ERP)系统或其他类似的多功能企业系统的某个阶段,或者正在计划在其组织中实施ERP系统以获得集成的好处。由于考虑到执行费用的巨大,有些国家正处于这一进程的早期阶段。鉴于在实施ERP项目中遇到的问题的性质和规模,本研究将试图确定成功实施ERP项目的关键成功因素(CSF¿s),因为它需要所有利益相关者的大量努力,以使实施成功。本文对已有的关于中小企业实施ERP问题的文献进行了梳理,并试图对中小企业实施ERP的重要因素进行整理。
{"title":"An Explorative Study to Identify the Critical Success Factors for ERP Implementation in Indian Small and Medium Scale Enterprises","authors":"Parijat Upadhyay, P. Dan","doi":"10.1109/ICIT.2008.66","DOIUrl":"https://doi.org/10.1109/ICIT.2008.66","url":null,"abstract":"Over the last few years many firms of any significant size are in some stage of implementing enterprise resources planning (ERP) systems or other similar multifunctional enterprise systems or are planning to implementing ERP systems in their organization to reap the benefits of integration. Some are in the early stages of the process, giving consideration to the very substantial implementation costs. Given the nature and magnitude of the problems in encountered in implementing an ERP project, this study would attempt to identify the critical success factors (CSF¿s) for a successful implementation of an ERP project since it calls for substantial effort on the part of all the stake holders involved to make the implementation a success. This paper explores the existing literature on ERP implementation issues in context to small and medium scale enterprises and attempts a compilation of the factors that assume great significance while implementing ERP in SMEs.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems 带备份投票的恢复块:安全关键型嵌入式系统的扩展表示新模式
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.60
Ashraf Armoush, F. Salewski, S. Kowalewski
The concept of design patterns has been widely used in the software and hardware domain. Several fault tolerance patterns have been proposed to document widely used fault tolerance methods. In this paper, we propose a new software fault tolerance pattern, which is called recovery block with backup voting pattern. This pattern can be used to improve the software reliability of the classical recovery block pattern in applications in which the construction of an effective acceptance test can not be guaranteed. In order to represent the new pattern, we use a pattern representation that focuses on the nonfunctional consequences of the design patterns on safety critical embedded systems. These nonfunctional consequences contain: safety, reliability, modifiability, cost, and execution time. Among other side effects, the implications part of the new pattern shows that it is resulting in higher reliability than the classical recovery block with relatively low additional hardware cost.
设计模式的概念已广泛应用于软件和硬件领域。已经提出了几种容错模式来记录广泛使用的容错方法。本文提出了一种新的软件容错模式——带备份投票的恢复块模式。在不能保证构建有效验收测试的应用中,该模式可用于提高经典恢复块模式的软件可靠性。为了表示新模式,我们使用了一种模式表示,该模式主要关注安全关键型嵌入式系统上设计模式的非功能后果。这些非功能性后果包括:安全性、可靠性、可修改性、成本和执行时间。除了其他副作用之外,新模式的含义部分表明,它比传统的恢复块具有更高的可靠性,并且额外的硬件成本相对较低。
{"title":"Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems","authors":"Ashraf Armoush, F. Salewski, S. Kowalewski","doi":"10.1109/ICIT.2008.60","DOIUrl":"https://doi.org/10.1109/ICIT.2008.60","url":null,"abstract":"The concept of design patterns has been widely used in the software and hardware domain. Several fault tolerance patterns have been proposed to document widely used fault tolerance methods. In this paper, we propose a new software fault tolerance pattern, which is called recovery block with backup voting pattern. This pattern can be used to improve the software reliability of the classical recovery block pattern in applications in which the construction of an effective acceptance test can not be guaranteed. In order to represent the new pattern, we use a pattern representation that focuses on the nonfunctional consequences of the design patterns on safety critical embedded systems. These nonfunctional consequences contain: safety, reliability, modifiability, cost, and execution time. Among other side effects, the implications part of the new pattern shows that it is resulting in higher reliability than the classical recovery block with relatively low additional hardware cost.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127561537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cascaded Multi-level Promoter Recognition of  E. coli Using Dinucleotide Features 利用二核苷酸特征级联多级启动子识别大肠杆菌
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.56
T. Rani, R. Bapi
Promoter recognition has been attempted using different paradigms such as motif/binding regions alone or whole promoter itself. In an earlier paper, a scheme is proposed to use 2-gram features to represent a promoter. These 2-grams gave a comparable performance with the existing methods in the literature. An in-depth analysis of data sets using 2-grams is performed. The analysis presented a scenario where there is a confusion between a majority of promoters with a minor set of non-promoter and vice versa. In an effort to build a complete classification system, using the majority and minority sets in promoters as well as non-promoters, a multi-level cascading system and Ada-Boost classifier are applied. The results indicate that much further improvement is not possible with the modifications proposed.
启动子识别已经尝试使用不同的范式,如单独的基序/结合区域或整个启动子本身。在较早的一篇论文中,提出了一种使用2g特征表示启动子的方案。这2-g给出了与文献中现有方法相当的性能。使用2g对数据集进行深入分析。该分析提出了一个场景,其中大多数启动子与一小部分非启动子之间存在混淆,反之亦然。利用启动子和非启动子的多数集和少数集,采用多级级联系统和Ada-Boost分类器构建完整的分类系统。结果表明,再进一步的改进是不可能的修改所提出的。
{"title":"Cascaded Multi-level Promoter Recognition of  E. coli Using Dinucleotide Features","authors":"T. Rani, R. Bapi","doi":"10.1109/ICIT.2008.56","DOIUrl":"https://doi.org/10.1109/ICIT.2008.56","url":null,"abstract":"Promoter recognition has been attempted using different paradigms such as motif/binding regions alone or whole promoter itself. In an earlier paper, a scheme is proposed to use 2-gram features to represent a promoter. These 2-grams gave a comparable performance with the existing methods in the literature. An in-depth analysis of data sets using 2-grams is performed. The analysis presented a scenario where there is a confusion between a majority of promoters with a minor set of non-promoter and vice versa. In an effort to build a complete classification system, using the majority and minority sets in promoters as well as non-promoters, a multi-level cascading system and Ada-Boost classifier are applied. The results indicate that much further improvement is not possible with the modifications proposed.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SCOPE: An Efficient One Pass Approach to Find Strongly Correlated Item Pairs SCOPE:一种高效的单次查找强相关项目对的方法
Pub Date : 2008-12-17 DOI: 10.1109/ICIT.2008.10
Swarup Roy, D. Bhattacharyya
This paper presents an efficient one pass technique, SCOPE (strongly correlated item pairs extraction), which finds all the strongly correlated item pairs from transaction database, without generating any candidate sets. We experimented with real and synthetic datasets and compared the performance of SCOPE with its other counterparts i.e. TAPER and TCP and found satisfactory.
本文提出了一种高效的一次性强相关项对抽取技术SCOPE(强相关项对抽取),该技术可以在不生成候选集的情况下,从事务数据库中找到所有强相关项对。我们在真实和合成数据集上进行了实验,并将SCOPE的性能与其他同类(即锥度和TCP)进行了比较,结果令人满意。
{"title":"SCOPE: An Efficient One Pass Approach to Find Strongly Correlated Item Pairs","authors":"Swarup Roy, D. Bhattacharyya","doi":"10.1109/ICIT.2008.10","DOIUrl":"https://doi.org/10.1109/ICIT.2008.10","url":null,"abstract":"This paper presents an efficient one pass technique, SCOPE (strongly correlated item pairs extraction), which finds all the strongly correlated item pairs from transaction database, without generating any candidate sets. We experimented with real and synthetic datasets and compared the performance of SCOPE with its other counterparts i.e. TAPER and TCP and found satisfactory.","PeriodicalId":184201,"journal":{"name":"2008 International Conference on Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 International Conference on Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1