首页 > 最新文献

2010 International Conference on Information Science and Applications最新文献

英文 中文
Interactive Visual Data Mining of a Large Fire Detector Database 大型火灾探测器数据库的交互式可视化数据挖掘
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480395
SeungJin Lim
As sensor networks become ubiquitous, the need for data mining of sensor network data is gaining momentum. Sensor network data is typically large, noisy and imbalanced, which makes it challenging to build a robust model from the data. In addition, traditional data mining often requires postmortem processing of the resulting statistically significant patterns to identify interesting patterns by means of visualization. For this reason, interactive visual data mining is employed for mining patterns from the fire detector dataset of the National Fire Incident Reporting System (NFIRS) database in this work. The suitability of interactive visual data mining, in place of its traditional counterpart, is demonstrated.
随着传感器网络的普及,对传感器网络数据进行数据挖掘的需求日益增长。传感器网络数据通常是庞大的、有噪声的和不平衡的,这使得从数据中建立一个鲁棒模型具有挑战性。此外,传统的数据挖掘通常需要对结果统计上显著的模式进行事后处理,以便通过可视化的方式识别有趣的模式。为此,本研究采用交互式可视化数据挖掘技术,从国家火灾事件报告系统(NFIRS)数据库的火灾探测器数据集中挖掘模式。演示了交互式可视化数据挖掘取代传统数据挖掘的适用性。
{"title":"Interactive Visual Data Mining of a Large Fire Detector Database","authors":"SeungJin Lim","doi":"10.1109/ICISA.2010.5480395","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480395","url":null,"abstract":"As sensor networks become ubiquitous, the need for data mining of sensor network data is gaining momentum. Sensor network data is typically large, noisy and imbalanced, which makes it challenging to build a robust model from the data. In addition, traditional data mining often requires postmortem processing of the resulting statistically significant patterns to identify interesting patterns by means of visualization. For this reason, interactive visual data mining is employed for mining patterns from the fire detector dataset of the National Fire Incident Reporting System (NFIRS) database in this work. The suitability of interactive visual data mining, in place of its traditional counterpart, is demonstrated.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123134735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Simulated Traffic Generation and Verification Methods Based on the Traffic Pattern Analysis 基于流量模式分析的实时仿真流量生成与验证方法
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480357
Hyuncheol Kim, Wonhyuk Lee, Jeom-goo Kim
The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which has spurred tremendous research activities in real-time traffic estimation and related methodologies. High-speed services and bulk transmission were available and various next-generation converged services are undergoing a change by various services. This paper presents improved real-time simulated traffic generation and verification schemes based on the actual traffic pattern analysis. For this, we analyzed traffic patterns of actual application system and generated simulated traffics. We also suggested scheme that verify similarity of simulated traffic and actual traffic.
互联网流量的爆炸性增长导致对数据传输能力的需求急剧增加,这刺激了对实时流量估计及其相关方法的大量研究活动。高速业务和大容量传输已经实现,各种新一代融合业务正在经历各种业务的变革。本文在分析实际流量模式的基础上,提出了改进的实时模拟流量生成和验证方案。为此,我们分析了实际应用系统的流量模式,并生成了模拟流量。我们还提出了验证模拟流量与实际流量相似度的方案。
{"title":"Real-Time Simulated Traffic Generation and Verification Methods Based on the Traffic Pattern Analysis","authors":"Hyuncheol Kim, Wonhyuk Lee, Jeom-goo Kim","doi":"10.1109/ICISA.2010.5480357","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480357","url":null,"abstract":"The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which has spurred tremendous research activities in real-time traffic estimation and related methodologies. High-speed services and bulk transmission were available and various next-generation converged services are undergoing a change by various services. This paper presents improved real-time simulated traffic generation and verification schemes based on the actual traffic pattern analysis. For this, we analyzed traffic patterns of actual application system and generated simulated traffics. We also suggested scheme that verify similarity of simulated traffic and actual traffic.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Group Key Management Protocol Using Code for Key Calculation: CKC 一种基于密钥计算代码的组密钥管理协议:CKC
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480553
Melisa Hajyvahabzadeh, Elina Eidkhani, S. A. Mortazavi, Alireza Nemaney Pour
This paper presents a new group key management protocol, CKC (Code for Key Calculation). This protocol is based on logical key hierarchy. When a new member joins the group, server sends only the group key for that member. Then, current members and the new member calculate the necessary keys using node codes and one-way hash function. Node code is a code which is assigned to each node of the key tree. Again at leave, server just sends the new group key to remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results show that CKC reduces computational and communication overhead and message size at join while it keeps minimized the overhead of key update at leave.
提出了一种新的组密钥管理协议CKC (Code for key Calculation)。该协议基于逻辑密钥层次结构。当新成员加入组时,服务器只发送该成员的组密钥。然后,当前成员和新成员使用节点代码和单向散列函数计算所需的密钥。节点代码是分配给键树的每个节点的代码。同样,在离开时,服务器只向剩余成员发送新的组密钥。通过此键,成员使用节点代码和单向散列函数计算必要的键。密钥的安全性基于哈希函数的单向性。结果表明,CKC在连接时减少了计算和通信开销以及消息大小,同时在离开时保持了最小的键更新开销。
{"title":"A New Group Key Management Protocol Using Code for Key Calculation: CKC","authors":"Melisa Hajyvahabzadeh, Elina Eidkhani, S. A. Mortazavi, Alireza Nemaney Pour","doi":"10.1109/ICISA.2010.5480553","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480553","url":null,"abstract":"This paper presents a new group key management protocol, CKC (Code for Key Calculation). This protocol is based on logical key hierarchy. When a new member joins the group, server sends only the group key for that member. Then, current members and the new member calculate the necessary keys using node codes and one-way hash function. Node code is a code which is assigned to each node of the key tree. Again at leave, server just sends the new group key to remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results show that CKC reduces computational and communication overhead and message size at join while it keeps minimized the overhead of key update at leave.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks 无线传感器网络流量分析攻击下的位置隐私
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480564
Xi Luo, Xu Ji, Myong-Soon Park
Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.
流量分析攻击是一种被动攻击,它试图根据被窃听的信息推断出流量模式。通过对报文流量的分析,可以推断出战略节点的位置,然后对这些位置发起主动攻击,如DoS攻击。因此,防范流量分析攻击的目的是防止攻击者追踪关键传感器节点的位置。由于开放的无线通信媒体将上下文信息暴露给攻击者,我们无法使用传统的加密和认证来防止攻击者对无线通信进行窃听。本文提出了三种防御流量分析攻击的方案。首先,提出了一种提供路径分集的随机路由方案。其次,我们将RRS与虚拟数据包注入方案(DPIS)相结合,通过跟踪或回溯转发的数据包到达接收方或源方来迷惑攻击者。最后,提出了一种匿名通信方案(ACS)来隐藏参与分组传输的所有节点的身份。通过安全分析和仿真,我们可以看到我们提出的方案能够有效防御流量分析攻击,并且交付时间短,能耗均匀。
{"title":"Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks","authors":"Xi Luo, Xu Ji, Myong-Soon Park","doi":"10.1109/ICISA.2010.5480564","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480564","url":null,"abstract":"Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis attack is to prevent the adversary from tracing the location of critical sensor nodes. Due to the open wireless communication media exposing the context information to adversaries, we cannot use traditional encryption and authentication to prevent the adversaries from eavesdropping on the wireless communication. In this paper, we propose three schemes to defend against the traffic analysis attacks. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally, an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Through security analysis and simulation, we can see that our proposed schemes can efficiently defend against traffic analysis attacks, take less delivery time and achieve uniform energy consumption.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128512280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Intuitive Fuzzy C-Means Algorithm for MRI Segmentation 直观模糊c均值算法在MRI分割中的应用
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480541
Dong-Chul Park
A new model called intuitive fuzzy c-means (IFCM) model is proposed for the segmentation of magnetic resonance image in this paper. Fuzzy c-means (FCM) is one of the most widely used clustering algorithms and assigns memberships to which are inversely related to the relative distance to the point prototypes that are cluster centers in the FCM model. In order to overcome the problem of outliers in data, several models including possibilistic c-means (PCM) and possibilistic-fuzzy cmeans (PFCM) models have been proposed. In IFCM, a new measurement called intuition level is introduced so that the intuition level helps to alleviate the effect of noise. Several numerical examples are first used for experiments to compare the clustering performance of IFCM with those of FCM, PCM, and PFCM. A practical magnetic resonance image data set is then used for image segmentation experiment. Results show that IFCM compares favorably to several clustering algorithms including the SOM, FCM, CNN, PCM, and PFCM models. Since IFCM produces cluster prototypes less sensitive to outliers and to the selection of involved parameters than the other algorithms, IFCM is a good candidate for data clustering and image segmentation problems.
本文提出了一种新的磁共振图像分割模型——直观模糊c均值模型。模糊c均值(FCM)是应用最广泛的聚类算法之一,其分配的隶属度与FCM模型中作为聚类中心的点原型的相对距离成反比。为了克服数据中的异常值问题,提出了几种模型,包括可能性c均值(PCM)模型和可能性-模糊均值(PFCM)模型。在IFCM中,引入了一种称为直觉电平的新测量方法,以便直觉电平有助于减轻噪声的影响。首先用几个数值算例进行了实验,比较了IFCM与FCM、PCM和PFCM的聚类性能。然后利用一个实际的磁共振图像数据集进行图像分割实验。结果表明,IFCM优于SOM、FCM、CNN、PCM和PFCM模型等几种聚类算法。由于IFCM产生的聚类原型对异常值和所涉及参数的选择的敏感性低于其他算法,因此IFCM是数据聚类和图像分割问题的良好候选。
{"title":"Intuitive Fuzzy C-Means Algorithm for MRI Segmentation","authors":"Dong-Chul Park","doi":"10.1109/ICISA.2010.5480541","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480541","url":null,"abstract":"A new model called intuitive fuzzy c-means (IFCM) model is proposed for the segmentation of magnetic resonance image in this paper. Fuzzy c-means (FCM) is one of the most widely used clustering algorithms and assigns memberships to which are inversely related to the relative distance to the point prototypes that are cluster centers in the FCM model. In order to overcome the problem of outliers in data, several models including possibilistic c-means (PCM) and possibilistic-fuzzy cmeans (PFCM) models have been proposed. In IFCM, a new measurement called intuition level is introduced so that the intuition level helps to alleviate the effect of noise. Several numerical examples are first used for experiments to compare the clustering performance of IFCM with those of FCM, PCM, and PFCM. A practical magnetic resonance image data set is then used for image segmentation experiment. Results show that IFCM compares favorably to several clustering algorithms including the SOM, FCM, CNN, PCM, and PFCM models. Since IFCM produces cluster prototypes less sensitive to outliers and to the selection of involved parameters than the other algorithms, IFCM is a good candidate for data clustering and image segmentation problems.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129898490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Financial Tool for Software Risk Measurement 软件风险度量的财务工具
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480537
Masood Uzzafer
Risk measurement of the software projects is presented based on analogies with financial risk measure models. Financial risk measure models assign a monetary value to a risk event to gauge the financial impact of the risk event on the financial investment. Estimated software cost is modeled as a financial investment and financial risk measure models are adopted to measure the monetary loss due to a risk event associated with the estimate cost of a software project. Further risk measure models are utilized for resource contingency planning needed to combat the worst case risk events.
通过与财务风险度量模型的类比,提出了软件项目的风险度量。金融风险度量模型为风险事件分配货币价值,以衡量风险事件对金融投资的财务影响。估计的软件成本被建模为一项财务投资,并采用财务风险度量模型来度量与软件项目估计成本相关的风险事件所造成的货币损失。进一步的风险度量模型用于应对最坏情况风险事件所需的资源应急规划。
{"title":"A Financial Tool for Software Risk Measurement","authors":"Masood Uzzafer","doi":"10.1109/ICISA.2010.5480537","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480537","url":null,"abstract":"Risk measurement of the software projects is presented based on analogies with financial risk measure models. Financial risk measure models assign a monetary value to a risk event to gauge the financial impact of the risk event on the financial investment. Estimated software cost is modeled as a financial investment and financial risk measure models are adopted to measure the monetary loss due to a risk event associated with the estimate cost of a software project. Further risk measure models are utilized for resource contingency planning needed to combat the worst case risk events.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application Coordination Model for Mobile Ubiquitous Environment 面向移动泛在环境的应用协调模型
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480585
Seungkeun Lee, Daesung Lee
Our research targets collaborative environments with focus on mobility of application. As mobile and wireless technology advances people are no longer bound to their offices. Sharing context information thus becomes a vital part of collaborative environments. However, challenges such as heterogeneous devices, connectivity, and bandwidth arise due to the dynamic nature of distributed, mobile teams. We present a methodology for context modeling and employ a framework that reduces costs such as computing information and usage of network resources by transferring context at relevant levels of detail. At the same time, robustness of the system is improved by dealing with uncertain context information. Our framework is implemented on an OSGi container platform using Web services for communication means.
我们的研究目标是协作环境,重点是应用程序的移动性。随着移动和无线技术的进步,人们不再被办公室所束缚。因此,共享上下文信息成为协作环境的重要组成部分。然而,由于分布式移动团队的动态特性,诸如异构设备、连接性和带宽等挑战也随之出现。我们提出了一种上下文建模的方法,并采用了一个框架,该框架通过在相关的细节级别上传输上下文来降低计算信息和网络资源使用等成本。同时,通过对不确定上下文信息的处理,提高了系统的鲁棒性。我们的框架是在使用Web服务作为通信手段的OSGi容器平台上实现的。
{"title":"Application Coordination Model for Mobile Ubiquitous Environment","authors":"Seungkeun Lee, Daesung Lee","doi":"10.1109/ICISA.2010.5480585","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480585","url":null,"abstract":"Our research targets collaborative environments with focus on mobility of application. As mobile and wireless technology advances people are no longer bound to their offices. Sharing context information thus becomes a vital part of collaborative environments. However, challenges such as heterogeneous devices, connectivity, and bandwidth arise due to the dynamic nature of distributed, mobile teams. We present a methodology for context modeling and employ a framework that reduces costs such as computing information and usage of network resources by transferring context at relevant levels of detail. At the same time, robustness of the system is improved by dealing with uncertain context information. Our framework is implemented on an OSGi container platform using Web services for communication means.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallelized Local Volatility Estimation Using GP-GPU Hardware Acceleration 基于GP-GPU硬件加速的并行局部波动估计
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480362
C. Douglas, Hyoseop Lee, D. Sheen
We introduce an inverse problem for the local volatility model in option pricing. We solve the problem using the Levenberg-Marquardt algorithm and use the notion of the Frechet derivative when calculating the Jacobian matrix. We analyze the existence of the Frechet derivative and its numerical computation. To reduce the computational time of the inverse problem, a GP-GPU environment is considered for parallel computation. Numerical results confirm the validity and efficiency of the proposed method.
引入了期权定价中局部波动率模型的逆问题。我们使用Levenberg-Marquardt算法来解决这个问题,并在计算雅可比矩阵时使用Frechet导数的概念。分析了Frechet导数的存在性及其数值计算。为了减少反问题的计算时间,考虑在GP-GPU环境下进行并行计算。数值结果验证了该方法的有效性和有效性。
{"title":"Parallelized Local Volatility Estimation Using GP-GPU Hardware Acceleration","authors":"C. Douglas, Hyoseop Lee, D. Sheen","doi":"10.1109/ICISA.2010.5480362","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480362","url":null,"abstract":"We introduce an inverse problem for the local volatility model in option pricing. We solve the problem using the Levenberg-Marquardt algorithm and use the notion of the Frechet derivative when calculating the Jacobian matrix. We analyze the existence of the Frechet derivative and its numerical computation. To reduce the computational time of the inverse problem, a GP-GPU environment is considered for parallel computation. Numerical results confirm the validity and efficiency of the proposed method.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Machine Learning Techniques in Protein Fold Recognition Problem 机器学习技术在蛋白质折叠识别问题中的性能
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480307
M. A. Khan, M. A. Khan, Z. Jan, Hamid Ali, Anwar M. Mirza
In protein fold recognition problem an effort is made to assign a fold to given proteins, this is of practical importance and has diverse application in the field of bioinformatics such as the discovery of new drugs, the individual implication of amino acid in a protein and bringing improvement in a specific protein function. In this paper, we have studied various machine learning techniques for protein fold recognition problem, and compared Support Vector Machine (SVM) with Radial Basis Function (RBF) kernel and Multilayer Perceptron (MLP) on a number of measures like the recognition accuracy of protein fold, the 10-fold cross validation accuracies and Kappa statistics. These techniques are applied to the well known Structural Classification of Proteins (SCOP) dataset in extensive experimentations. In this study Multilayer Perceptron (MLP) shows better accuracy on single protein feature (C, S, H, P, V, Z) of the SCOP dataset as compared to Support Vector Machine (SVM). A plausible reason of the better performance of MLP is that it uses all the available data for classification where as the SVM model cannot exploit all the available data.
在蛋白质折叠识别问题中,为给定的蛋白质分配一个折叠是一种努力,这在生物信息学领域具有实际意义,并且在新药的发现,蛋白质中氨基酸的个体含义以及特定蛋白质功能的改进等领域具有多种应用。本文研究了用于蛋白质折叠识别问题的各种机器学习技术,并将支持向量机(SVM)与径向基函数(RBF)核和多层感知器(MLP)在蛋白质折叠识别精度、10倍交叉验证精度和Kappa统计量等多项指标上进行了比较。这些技术在广泛的实验中应用于众所周知的蛋白质结构分类(SCOP)数据集。在本研究中,与支持向量机(SVM)相比,多层感知器(MLP)在SCOP数据集的单个蛋白质特征(C, S, H, P, V, Z)上显示出更好的准确性。MLP性能更好的一个合理原因是它使用了所有可用的数据进行分类,而支持向量机模型无法利用所有可用的数据。
{"title":"Performance of Machine Learning Techniques in Protein Fold Recognition Problem","authors":"M. A. Khan, M. A. Khan, Z. Jan, Hamid Ali, Anwar M. Mirza","doi":"10.1109/ICISA.2010.5480307","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480307","url":null,"abstract":"In protein fold recognition problem an effort is made to assign a fold to given proteins, this is of practical importance and has diverse application in the field of bioinformatics such as the discovery of new drugs, the individual implication of amino acid in a protein and bringing improvement in a specific protein function. In this paper, we have studied various machine learning techniques for protein fold recognition problem, and compared Support Vector Machine (SVM) with Radial Basis Function (RBF) kernel and Multilayer Perceptron (MLP) on a number of measures like the recognition accuracy of protein fold, the 10-fold cross validation accuracies and Kappa statistics. These techniques are applied to the well known Structural Classification of Proteins (SCOP) dataset in extensive experimentations. In this study Multilayer Perceptron (MLP) shows better accuracy on single protein feature (C, S, H, P, V, Z) of the SCOP dataset as compared to Support Vector Machine (SVM). A plausible reason of the better performance of MLP is that it uses all the available data for classification where as the SVM model cannot exploit all the available data.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131095068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing the Web Crawler as a Feed Forward Engine for an Efficient Solution to the Search Problem in the Minimum Amount of Time through a Distributed Framework 分析网络爬虫作为一种前馈引擎,通过分布式框架在最短时间内有效解决搜索问题
Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480411
M. A. Qureshi, A. Younus, F. Rojas
A web crawler forms the backbone of a search engine and this backbone needs a careful re- assessment that could enhance the efficiency of search engines. This paper conducts such a re- assessment from the perspective of systems and this is achieved through implementation and analysis of a web crawler "VisionerBOT" as a feed forward engine for search engines using the MapReduce distributed programming model. Our crawler implementations revisit the classical OS debate of threads vs. events, with a significant contribution from our work which concludes that events is the ideal way forward for web crawlers. Furthermore, in implementing the feed forward mechanisms within the web crawler, we came up with some important design considerations for the operating system research community which can lead to a whole new class of operating systems.
网络爬虫构成了搜索引擎的主干,这个主干需要仔细的重新评估,以提高搜索引擎的效率。本文从系统的角度进行重新评估,通过使用MapReduce分布式编程模型实现和分析网络爬虫“VisionerBOT”作为搜索引擎的前馈引擎来实现。我们的爬虫实现重新审视了线程与事件的经典操作系统之争,我们的工作中有一个重要的贡献,即事件是网络爬虫的理想发展方向。此外,在实现网络爬虫中的前馈机制时,我们为操作系统研究社区提出了一些重要的设计考虑,这可能会导致一个全新的操作系统类别。
{"title":"Analyzing the Web Crawler as a Feed Forward Engine for an Efficient Solution to the Search Problem in the Minimum Amount of Time through a Distributed Framework","authors":"M. A. Qureshi, A. Younus, F. Rojas","doi":"10.1109/ICISA.2010.5480411","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480411","url":null,"abstract":"A web crawler forms the backbone of a search engine and this backbone needs a careful re- assessment that could enhance the efficiency of search engines. This paper conducts such a re- assessment from the perspective of systems and this is achieved through implementation and analysis of a web crawler \"VisionerBOT\" as a feed forward engine for search engines using the MapReduce distributed programming model. Our crawler implementations revisit the classical OS debate of threads vs. events, with a significant contribution from our work which concludes that events is the ideal way forward for web crawlers. Furthermore, in implementing the feed forward mechanisms within the web crawler, we came up with some important design considerations for the operating system research community which can lead to a whole new class of operating systems.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2010 International Conference on Information Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1