Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407267
G. Muhammad, Y. Alotaibi, M. N. Huda
In this paper, we introduce a system for Bangla digit automatic speech recognition (ASR). Though Bangla is one of the largely spoken languages in the world, only a few works on Bangla ASR can be found in the literature, especially on Bangladeshi accented Bangla. In this work, the corpus is collected from natives in Bangladesh. Mel-frequency cepstral coefficients (MFCCs) based features and hidden Markov model (HMM) based classifiers are used for recognition. Experimental results show comparatively high recognition performance (more than 95%) for first six digits (0 – 5) and low performance (less than 90%) for the next four digits (6 – 9). We notice two confused pairs of digits: one with (6) and (9), and the other with (7) and (8), in the experiments. We also find that different dialects in Bangladesh have a greater role on this confusion.
{"title":"Automatic speech recognition for Bangla digits","authors":"G. Muhammad, Y. Alotaibi, M. N. Huda","doi":"10.1109/ICCIT.2009.5407267","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407267","url":null,"abstract":"In this paper, we introduce a system for Bangla digit automatic speech recognition (ASR). Though Bangla is one of the largely spoken languages in the world, only a few works on Bangla ASR can be found in the literature, especially on Bangladeshi accented Bangla. In this work, the corpus is collected from natives in Bangladesh. Mel-frequency cepstral coefficients (MFCCs) based features and hidden Markov model (HMM) based classifiers are used for recognition. Experimental results show comparatively high recognition performance (more than 95%) for first six digits (0 – 5) and low performance (less than 90%) for the next four digits (6 – 9). We notice two confused pairs of digits: one with (6) and (9), and the other with (7) and (8), in the experiments. We also find that different dialects in Bangladesh have a greater role on this confusion.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114780747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407123
M. N. Huda, Manoj Banik, G. Muhammad, Bernd J. Kroger
This paper presents a phoneme recognition method based on distinctive phonetic features (DPFs). The method comprises three stages. The first stage extracts 3 DPF vectors of 15 dimensions each from local features (LFs) of an input speech signal using three multilayer neural networks (MLNs). The second stage incorporates an Inhibition/Enhancement (In/En) network to obtain more categorical DPF movement and decorrelates the DPF vectors using the Gram-Schmidt orthogonalization procedure. Then, the third stage embeds acoustic models (AMs) and language models (LMs) of syllable-based subwords to output more precise phoneme strings. The proposed method provides a higher phoneme correct rate as well as phoneme accuracy with fewer mixture components in hidden Markov models (HMMs).
{"title":"Phoneme recognition based on distinctive phonetic features (DPFs) incorporating a syllable based language model","authors":"M. N. Huda, Manoj Banik, G. Muhammad, Bernd J. Kroger","doi":"10.1109/ICCIT.2009.5407123","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407123","url":null,"abstract":"This paper presents a phoneme recognition method based on distinctive phonetic features (DPFs). The method comprises three stages. The first stage extracts 3 DPF vectors of 15 dimensions each from local features (LFs) of an input speech signal using three multilayer neural networks (MLNs). The second stage incorporates an Inhibition/Enhancement (In/En) network to obtain more categorical DPF movement and decorrelates the DPF vectors using the Gram-Schmidt orthogonalization procedure. Then, the third stage embeds acoustic models (AMs) and language models (LMs) of syllable-based subwords to output more precise phoneme strings. The proposed method provides a higher phoneme correct rate as well as phoneme accuracy with fewer mixture components in hidden Markov models (HMMs).","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407119
S. Banik, M. Anwer, A. Khan
Forecasting exchange rate is very important for many international agents e.g. investors, money managers, investment banks, funds makers and others. We forecasted the daily Bangladeshi exchange rate series for the period of January 1992 to March 2009 using popular non-linear forecasting models, namely Markov switching autoregressive model, fuzzy extension of artificial neural network model (ANFIS) and generalized autoregressive conditional heteroscedastic model. Our target is to investigate whether selected models can serve as useful forecasting models to find volatile and non-linear behaviors of the considered series. By most commonly used statistical measures: mean absolute percentage error, root mean square error and coefficient of determination, we found that ANFIS is a superior predictor than other two selected predictors. We believe findings of this paper will be helpful to make a wide range of policies for multinational companies who are involved with various international business activities.
{"title":"Predictive power of the daily Bangladeshi exchange rate series based on Markov model, neuro fuzzy model and conditional heteroskedastic model","authors":"S. Banik, M. Anwer, A. Khan","doi":"10.1109/ICCIT.2009.5407119","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407119","url":null,"abstract":"Forecasting exchange rate is very important for many international agents e.g. investors, money managers, investment banks, funds makers and others. We forecasted the daily Bangladeshi exchange rate series for the period of January 1992 to March 2009 using popular non-linear forecasting models, namely Markov switching autoregressive model, fuzzy extension of artificial neural network model (ANFIS) and generalized autoregressive conditional heteroscedastic model. Our target is to investigate whether selected models can serve as useful forecasting models to find volatile and non-linear behaviors of the considered series. By most commonly used statistical measures: mean absolute percentage error, root mean square error and coefficient of determination, we found that ANFIS is a superior predictor than other two selected predictors. We believe findings of this paper will be helpful to make a wide range of policies for multinational companies who are involved with various international business activities.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407273
B. S, Phalguni Gupta
This paper proposes an efficient palmprint based verification system which is robust to rotation, scale and occlusion. Images are obtained using a flat bed scanner. Scale Invariant Feature Transform (SIFT) operator is used to extract features from the palmprint. Nearest neighbor ratio method is used to determine the similarity between extracted features of live and enrolled palmprints and to make matching decision. The proposed system has been tested using three databases-IITK database having 549 hand images, CASIA database with 5239 hand images and PolyU database of size 7752. Accuracy of the proposed system is found to be 99.97% with FAR of 0.06% in case of IITK database, while for CASIA and PolyU database is more than 99%. Further the robustness of the system with respect to scale rotation and occlusion has been studied.
{"title":"Palmprint based verification system robust to rotation, scale and occlusion","authors":"B. S, Phalguni Gupta","doi":"10.1109/ICCIT.2009.5407273","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407273","url":null,"abstract":"This paper proposes an efficient palmprint based verification system which is robust to rotation, scale and occlusion. Images are obtained using a flat bed scanner. Scale Invariant Feature Transform (SIFT) operator is used to extract features from the palmprint. Nearest neighbor ratio method is used to determine the similarity between extracted features of live and enrolled palmprints and to make matching decision. The proposed system has been tested using three databases-IITK database having 549 hand images, CASIA database with 5239 hand images and PolyU database of size 7752. Accuracy of the proposed system is found to be 99.97% with FAR of 0.06% in case of IITK database, while for CASIA and PolyU database is more than 99%. Further the robustness of the system with respect to scale rotation and occlusion has been studied.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407288
S. Islam, M. Rokonuzzaman
The architecture of a software application determines the degree of success of both operation and development of software. Adopted architectural options not only affect the functionality and performance of the software, but they also affect delivery related factors such as cost, time, changeability, scalability, and maintainability. It is thus very important to find appropriate means of assessing benefits as well as liabilities of different architectural options to maximize the life-time benefit and reduce the overall cost of ownership of a software application. The Architecture Tradeoff Analysis Method (ATAMSM) developed by Software Engineering Institute (SEI) is that kind of tool. Considerably this is a very big framework for dealing with architectural tradeoff issues faced by large companies for developing large as well as complex software applications. The practicing of full blown ATAM without taking into consideration of diverse forces affecting the value addition from its practice does not maximize benefits from its adoption. Related forces faced by small software companies are significantly different than those faced by large software companies. Therefore, ATAM should be adapted to make it suitable for the practice by small software companies. This paper presents the information about the architectural practice level of organically grown small software companies within the context of ATAM followed by the gap analysis between the industry practices and ATAM, and adaptation recommendations. Both literature review and field investigation based on key informant interview have been performed for this purpose. Based on the findings of this study an adaptation process of ATAM for the small companies has been proposed.
{"title":"Adaptation of ATAMSM to software architectural design practices for organically growing small software companies","authors":"S. Islam, M. Rokonuzzaman","doi":"10.1109/ICCIT.2009.5407288","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407288","url":null,"abstract":"The architecture of a software application determines the degree of success of both operation and development of software. Adopted architectural options not only affect the functionality and performance of the software, but they also affect delivery related factors such as cost, time, changeability, scalability, and maintainability. It is thus very important to find appropriate means of assessing benefits as well as liabilities of different architectural options to maximize the life-time benefit and reduce the overall cost of ownership of a software application. The Architecture Tradeoff Analysis Method (ATAMSM) developed by Software Engineering Institute (SEI) is that kind of tool. Considerably this is a very big framework for dealing with architectural tradeoff issues faced by large companies for developing large as well as complex software applications. The practicing of full blown ATAM without taking into consideration of diverse forces affecting the value addition from its practice does not maximize benefits from its adoption. Related forces faced by small software companies are significantly different than those faced by large software companies. Therefore, ATAM should be adapted to make it suitable for the practice by small software companies. This paper presents the information about the architectural practice level of organically grown small software companies within the context of ATAM followed by the gap analysis between the industry practices and ATAM, and adaptation recommendations. Both literature review and field investigation based on key informant interview have been performed for this purpose. Based on the findings of this study an adaptation process of ATAM for the small companies has been proposed.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129730800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407308
A. Islam, Tishna Sabrina
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) are widely known security attacks which attempt to make computer resources unavailable to its intended users. In this paper, I discuss some well known DoS and DDoS attacks. Experience shows that in the detection of these attacks human brain is more perfect than mathematical computation. Therefore, I propose a technique to incorporate the representative of human brain, Recurrent Neural Networks (RNN), to identify these attacks.
{"title":"Detection of various denial of service and Distributed Denial of Service attacks using RNN ensemble","authors":"A. Islam, Tishna Sabrina","doi":"10.1109/ICCIT.2009.5407308","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407308","url":null,"abstract":"Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) are widely known security attacks which attempt to make computer resources unavailable to its intended users. In this paper, I discuss some well known DoS and DDoS attacks. Experience shows that in the detection of these attacks human brain is more perfect than mathematical computation. Therefore, I propose a technique to incorporate the representative of human brain, Recurrent Neural Networks (RNN), to identify these attacks.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407295
Muhammad Mahfuzul Alam
In this paper, the design of a microstrip antenna array with four port Butler matrix is presented. The Butler matrix is used as a beamforming network and it produces orthogonal beams that can be steered in different directions. Simulated butler matrix has 10 dB return loss bandwidth of 20%. This matrix feeds four single element microstrip antennas that can be operated from 2.412GHz to 2.484GHz. The circuit is designed by considering a single layer microstrip structure that makes it simpler. The design of wide band microwave devices such as branch-line coupler; cross-coupler and phase-shifters are also incorporated. The switched beam antenna is designed for 2.4GHz band Wi-Fi (Wireless Fidelity) system.
{"title":"Microstrip antenna array with four port Butler matrix for switched beam base station application","authors":"Muhammad Mahfuzul Alam","doi":"10.1109/ICCIT.2009.5407295","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407295","url":null,"abstract":"In this paper, the design of a microstrip antenna array with four port Butler matrix is presented. The Butler matrix is used as a beamforming network and it produces orthogonal beams that can be steered in different directions. Simulated butler matrix has 10 dB return loss bandwidth of 20%. This matrix feeds four single element microstrip antennas that can be operated from 2.412GHz to 2.484GHz. The circuit is designed by considering a single layer microstrip structure that makes it simpler. The design of wide band microwave devices such as branch-line coupler; cross-coupler and phase-shifters are also incorporated. The switched beam antenna is designed for 2.4GHz band Wi-Fi (Wireless Fidelity) system.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129791530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407297
Md. Rakibul Haque, Mahmuda Naznin, M. Asaduzzaman, R. Ahmed
Event detection and notification is a common task in a Wireless Sensor Networks (WSN). Efficient data aggregation and minimization of energy consumption are the great research challenges in WSN. In WSN, aggregated event information is more important than individual event information for energy saving and reliability. Proximity queries or query approximation can be used to reduce the complexity of data aggregation and energy consumption. This paper presents an efficient and scalable hybrid framework for processing spatial and temporal proximity queries in WSN which we call STP. STP builds tree structure with less overhead, and reduces the event propagation cost through proximity queries. STP reduces energy consumption by reducing the number of aggregator nodes, which ultimately increases the network life time. STP eliminates the unnecessary aggregation of events using a tunable temporal proximity threshold. We compare STP's performance with another spatial query processing method and we show that, STP performs better.
{"title":"STP: In-network aggregation through proximity queries in a Sensor Network","authors":"Md. Rakibul Haque, Mahmuda Naznin, M. Asaduzzaman, R. Ahmed","doi":"10.1109/ICCIT.2009.5407297","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407297","url":null,"abstract":"Event detection and notification is a common task in a Wireless Sensor Networks (WSN). Efficient data aggregation and minimization of energy consumption are the great research challenges in WSN. In WSN, aggregated event information is more important than individual event information for energy saving and reliability. Proximity queries or query approximation can be used to reduce the complexity of data aggregation and energy consumption. This paper presents an efficient and scalable hybrid framework for processing spatial and temporal proximity queries in WSN which we call STP. STP builds tree structure with less overhead, and reduces the event propagation cost through proximity queries. STP reduces energy consumption by reducing the number of aggregator nodes, which ultimately increases the network life time. STP eliminates the unnecessary aggregation of events using a tunable temporal proximity threshold. We compare STP's performance with another spatial query processing method and we show that, STP performs better.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"14 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407137
Md. Anamul Haque, A. Islam, M. Islam
Wireless network link is debilitated by fading, attenuation, non-linear distortion and noise. Analogically sound system in a conference room shows similar phenomena due to the fact that the reflected feedback signals resemble the multi-path propagation of wireless communication; exception is that the noise level is very low. The signal path of the feedback signal is a non-linear system can be replaced by a finite impulse response filter. The aim of the paper is to compare the performance of three well known adaptive filters (Frequency Domain Adaptive Filter, Least Mean Square Filter, Kalman Filter) in context of echo cancellation under adaptive white Gaussian noisy environment.
{"title":"Evaluation of performances of digital adaptive filters in acoustic echo cancellation","authors":"Md. Anamul Haque, A. Islam, M. Islam","doi":"10.1109/ICCIT.2009.5407137","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407137","url":null,"abstract":"Wireless network link is debilitated by fading, attenuation, non-linear distortion and noise. Analogically sound system in a conference room shows similar phenomena due to the fact that the reflected feedback signals resemble the multi-path propagation of wireless communication; exception is that the noise level is very low. The signal path of the feedback signal is a non-linear system can be replaced by a finite impulse response filter. The aim of the paper is to compare the performance of three well known adaptive filters (Frequency Domain Adaptive Filter, Least Mean Square Filter, Kalman Filter) in context of echo cancellation under adaptive white Gaussian noisy environment.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130677144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407309
B. Ristevski, S. Loskovska
The cell functions and development are regulated by complex networks of genes, proteins and other components by means of their mutual interactions. These networks are called gene regulatory networks (GRNs). GRNs are used to reveal the fundamental gene regulatory mechanisms, to determine the reasons for many diseases and interactions between drugs and their targets. The introduction of experimental technologies such as microarrays, ChIP-chip which combines chromatin immunoprecipitation (ChIP) with microarrays and ChIP-Seq which combines ChIP with DNA sequencing, has provided a large number of available datasets related to gene expression and transcription factors (TFs) and their interactions. These datasets are basis for further analysis to reveal the gene regulation mechanisms. Many models have been applied to represent gene regulatory networks. We have used the dynamic Bayesian network model which is able to cope with missing data and can include a prior knowledge about transcription factors and their activation/inhibition of corresponding genes. We describe the obtained results and survey the common structure learning algorithms for learning of GRN's structure. We tested the obtained GRN for test datasets with different sizes and in the paper describe obtained dependencies between the ratio of Bayesian score and BIC and dataset size.
{"title":"Bayesian networks application for representation and structure learning of gene regulatory networks","authors":"B. Ristevski, S. Loskovska","doi":"10.1109/ICCIT.2009.5407309","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407309","url":null,"abstract":"The cell functions and development are regulated by complex networks of genes, proteins and other components by means of their mutual interactions. These networks are called gene regulatory networks (GRNs). GRNs are used to reveal the fundamental gene regulatory mechanisms, to determine the reasons for many diseases and interactions between drugs and their targets. The introduction of experimental technologies such as microarrays, ChIP-chip which combines chromatin immunoprecipitation (ChIP) with microarrays and ChIP-Seq which combines ChIP with DNA sequencing, has provided a large number of available datasets related to gene expression and transcription factors (TFs) and their interactions. These datasets are basis for further analysis to reveal the gene regulation mechanisms. Many models have been applied to represent gene regulatory networks. We have used the dynamic Bayesian network model which is able to cope with missing data and can include a prior knowledge about transcription factors and their activation/inhibition of corresponding genes. We describe the obtained results and survey the common structure learning algorithms for learning of GRN's structure. We tested the obtained GRN for test datasets with different sizes and in the paper describe obtained dependencies between the ratio of Bayesian score and BIC and dataset size.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131660493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}