首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
A survey on brain tumor detection using image processing techniques 图像处理技术在脑肿瘤检测中的应用综述
Luxit Kapoor, Sanjeev Thakur
Biomedical Image Processing is a growing and demanding field. It comprises of many different types of imaging methods likes CT scans, X-Ray and MRI. These techniques allow us to identify even the smallest abnormalities in the human body. The primary goal of medical imaging is to extract meaningful and accurate information from these images with the least error possible. Out of the various types of medical imaging processes available to us, MRI is the most reliable and safe. It does not involve exposing the body to any sorts of harmful radiation. This MRI can then be processed, and the tumor can be segmented. Tumor Segmentation includes the use of several different techniques. The whole process of detecting brain tumor from an MRI can be classified into four different categories: Pre-Processing, Segmentation, Optimization and Feature Extraction. This survey involves reviewing the research by other professionals and compiling it into one paper.
生物医学图像处理是一个不断发展和要求很高的领域。它包括许多不同类型的成像方法,如CT扫描,x射线和MRI。这些技术使我们能够识别人体内哪怕是最小的异常。医学成像的主要目标是从这些图像中以最小的误差提取有意义和准确的信息。在我们可用的各种医学成像过程中,核磁共振成像是最可靠和安全的。它不涉及将身体暴露在任何有害的辐射中。然后可以对MRI进行处理,并对肿瘤进行分割。肿瘤分割包括使用几种不同的技术。从MRI中检测脑肿瘤的整个过程可以分为预处理、分割、优化和特征提取四大类。这项调查包括审查其他专业人士的研究,并将其汇编成一篇论文。
{"title":"A survey on brain tumor detection using image processing techniques","authors":"Luxit Kapoor, Sanjeev Thakur","doi":"10.1109/CONFLUENCE.2017.7943218","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943218","url":null,"abstract":"Biomedical Image Processing is a growing and demanding field. It comprises of many different types of imaging methods likes CT scans, X-Ray and MRI. These techniques allow us to identify even the smallest abnormalities in the human body. The primary goal of medical imaging is to extract meaningful and accurate information from these images with the least error possible. Out of the various types of medical imaging processes available to us, MRI is the most reliable and safe. It does not involve exposing the body to any sorts of harmful radiation. This MRI can then be processed, and the tumor can be segmented. Tumor Segmentation includes the use of several different techniques. The whole process of detecting brain tumor from an MRI can be classified into four different categories: Pre-Processing, Segmentation, Optimization and Feature Extraction. This survey involves reviewing the research by other professionals and compiling it into one paper.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"24 1","pages":"582-585"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89457796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Role of predictive modeling in cloud services pricing: A survey 预测建模在云服务定价中的作用:调查
Meetu Kandpal, Monica Gahlawat, Kalyani Patel
In the era of Big Data analytics predictive modeling plays an important role to predict the future demand and behavior by using historical data. As majority of the IT companies running behind cloud services, the cloud service providers like Amazon, Google cloud, Microsoft Azure etc may be interested to know the future demand of the computing resources so that they can derive new pricing schemes to gain more profit. The providers have different pricing schemes to charge for computing resourcese. g., Amazon provides three pricing schemes, namely, on-demand pricing, reserved pricing and auction pricing in the same way Microsoft has different schemes like Pay-As-You-Go Subscriptions, Prepaid Subscriptions. The paper presents survey of role of predictive modeling in cloud service pricing. The survey result clearly shows that predictions made by various author are closer to actual outcomes, which highlights the importance of predictive modeling to forecast future demand of cloud computing resources and deciding the price of resources.
在大数据分析时代,预测建模利用历史数据预测未来的需求和行为发挥着重要作用。由于大多数IT公司都在运行云服务,像亚马逊,谷歌云,微软Azure等云服务提供商可能有兴趣了解未来计算资源的需求,以便他们可以制定新的定价方案,以获得更多的利润。供应商对计算资源有不同的定价方案。例如,亚马逊提供了三种定价方案,即按需定价,保留定价和拍卖定价,就像微软有不同的方案,如按需付费订阅,预付订阅。本文综述了预测建模在云服务定价中的作用。调查结果清楚地表明,各作者的预测更接近实际结果,这凸显了预测建模对预测未来云计算资源需求和决定资源价格的重要性。
{"title":"Role of predictive modeling in cloud services pricing: A survey","authors":"Meetu Kandpal, Monica Gahlawat, Kalyani Patel","doi":"10.1109/CONFLUENCE.2017.7943158","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943158","url":null,"abstract":"In the era of Big Data analytics predictive modeling plays an important role to predict the future demand and behavior by using historical data. As majority of the IT companies running behind cloud services, the cloud service providers like Amazon, Google cloud, Microsoft Azure etc may be interested to know the future demand of the computing resources so that they can derive new pricing schemes to gain more profit. The providers have different pricing schemes to charge for computing resourcese. g., Amazon provides three pricing schemes, namely, on-demand pricing, reserved pricing and auction pricing in the same way Microsoft has different schemes like Pay-As-You-Go Subscriptions, Prepaid Subscriptions. The paper presents survey of role of predictive modeling in cloud service pricing. The survey result clearly shows that predictions made by various author are closer to actual outcomes, which highlights the importance of predictive modeling to forecast future demand of cloud computing resources and deciding the price of resources.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"267 1","pages":"249-254"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79810869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Computational intelligence based approaches to software reliability 基于计算智能的软件可靠性方法
Tamanna, O. Sangwan
Accurate software reliability prediction with a single universal software reliability growth model is very difficult. In this ρ aper we reviewed different models which uses computational intelligence for the prediction purpose and describe how these techniques outperform conventional statistical models. Parameters, efficacy measures with methodologies are concluded in tabular form.
采用单一的通用软件可靠性增长模型进行准确的软件可靠性预测是非常困难的。在这篇论文中,我们回顾了使用计算智能进行预测的不同模型,并描述了这些技术如何优于传统的统计模型。以表格形式总结了参数、疗效指标和方法。
{"title":"Computational intelligence based approaches to software reliability","authors":"Tamanna, O. Sangwan","doi":"10.1109/CONFLUENCE.2017.7943144","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943144","url":null,"abstract":"Accurate software reliability prediction with a single universal software reliability growth model is very difficult. In this ρ aper we reviewed different models which uses computational intelligence for the prediction purpose and describe how these techniques outperform conventional statistical models. Parameters, efficacy measures with methodologies are concluded in tabular form.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"108 1","pages":"171-176"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79580209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of performance modeling of big data applications 大数据应用性能建模研究综述
T. Pattanshetti, V. Attar
Enormous amount of data is being generated at a tremendous rate by multiple sources, often this data exists in different formats thus making it quite difficult to process the data using traditional methods. The platforms used for processing this type of data rely on distributed architecture like Cloud computing, Hadoop etc. The processing of big data can be efficiently carried out by exploring the characteristics of underlying platforms. With the advent of efficient algorithms, software metrics and by identifying the relationship amongst these measures, system characteristics can be evaluated in order to improve the overall performance of the computing system. By focusing on these measures which play important role in determining the overall performance, service level agreements can also be revised. This paper presents a survey of different performance modeling techniques of big data applications. One of the key concepts in performance modeling is finding relevant parameters which accurately represent performance of big data platforms. These extracted relevant performances measures are mapped onto software qualify concepts which are then used for defining service level agreements.
大量的数据正以惊人的速度由多个来源产生,这些数据通常以不同的格式存在,因此使用传统方法处理数据非常困难。用于处理这类数据的平台依赖于分布式架构,如云计算、Hadoop等。通过挖掘底层平台的特点,可以高效地进行大数据的处理。随着高效算法、软件度量的出现,通过识别这些度量之间的关系,可以评估系统特征,以提高计算系统的整体性能。通过关注这些在决定整体表现方面发挥重要作用的措施,服务水平协议也可以得到修订。本文综述了大数据应用中不同的性能建模技术。性能建模的关键概念之一是寻找能够准确表征大数据平台性能的相关参数。这些提取的相关性能度量被映射到软件资格概念,然后用于定义服务水平协议。
{"title":"Survey of performance modeling of big data applications","authors":"T. Pattanshetti, V. Attar","doi":"10.1109/CONFLUENCE.2017.7943145","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943145","url":null,"abstract":"Enormous amount of data is being generated at a tremendous rate by multiple sources, often this data exists in different formats thus making it quite difficult to process the data using traditional methods. The platforms used for processing this type of data rely on distributed architecture like Cloud computing, Hadoop etc. The processing of big data can be efficiently carried out by exploring the characteristics of underlying platforms. With the advent of efficient algorithms, software metrics and by identifying the relationship amongst these measures, system characteristics can be evaluated in order to improve the overall performance of the computing system. By focusing on these measures which play important role in determining the overall performance, service level agreements can also be revised. This paper presents a survey of different performance modeling techniques of big data applications. One of the key concepts in performance modeling is finding relevant parameters which accurately represent performance of big data platforms. These extracted relevant performances measures are mapped onto software qualify concepts which are then used for defining service level agreements.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"7 1","pages":"177-181"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78906843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Review and comparison of face detection algorithms 人脸检测算法的回顾和比较
K. Dang, Shanu Sharma
With the tremendous increase in video and image database there is a great need of automatic understanding and examination of data by the intelligent systems as manually it is becoming out of reach. Narrowing it down to one specific domain, one of the most specific objects that can be traced in the images are people i.e. faces. Face detection is becoming a challenge by its increasing use in number of applications. It is the first step for face recognition, face analysis and detection of other features of face. In this paper, various face detection algorithms are discussed and analyzed like Viola-Jones, SMQT features & SNOW Classifier, Neural Network-Based Face Detection and Support Vector Machine-Based face detection. All these face detection methods are compared based on the precision and recall value calculated using a DetEval Software which deals with precised values of the bounding boxes around the faces to give accurate results.
随着视频和图像数据库的大量增加,智能系统对数据的自动理解和检查变得非常需要,因为人工操作变得越来越遥不可及。将其缩小到一个特定的领域,可以在图像中跟踪的最具体的对象之一是人,即面孔。人脸检测在越来越多的应用中成为一个挑战。它是人脸识别、人脸分析和人脸其他特征检测的第一步。本文讨论和分析了各种人脸检测算法,如Viola-Jones、SMQT特征和SNOW分类器、基于神经网络的人脸检测和基于支持向量机的人脸检测。采用DetEval软件对人脸周围边界框的精确值进行处理,并根据计算的查全率和查全率进行比较,得到准确的检测结果。
{"title":"Review and comparison of face detection algorithms","authors":"K. Dang, Shanu Sharma","doi":"10.1109/CONFLUENCE.2017.7943228","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943228","url":null,"abstract":"With the tremendous increase in video and image database there is a great need of automatic understanding and examination of data by the intelligent systems as manually it is becoming out of reach. Narrowing it down to one specific domain, one of the most specific objects that can be traced in the images are people i.e. faces. Face detection is becoming a challenge by its increasing use in number of applications. It is the first step for face recognition, face analysis and detection of other features of face. In this paper, various face detection algorithms are discussed and analyzed like Viola-Jones, SMQT features & SNOW Classifier, Neural Network-Based Face Detection and Support Vector Machine-Based face detection. All these face detection methods are compared based on the precision and recall value calculated using a DetEval Software which deals with precised values of the bounding boxes around the faces to give accurate results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"10 1","pages":"629-633"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78949971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology 基于蜜罐技术的分布式、高扩展性广域网攻击感知与复杂分析框架
Daniel Fraunholz, Marc Zimmermann, S. D. Antón, Jörg Schneider, H. Dieter Schotten
Recently, the increase of interconnectivity has led to a rising amount of IoT enabled devices in botnets. Such botnets are currently used for large scale DDoS attacks. To keep track with these malicious activities, Honeypots have proven to be a vital tool. We developed and set up a distributed and highly-scalable WAN Honeypot with an attached backend infrastructure for sophisticated processing of the gathered data. For the processed data to be understandable we designed a graphical frontend that displays all relevant information that has been obtained from the data. We group attacks originating in a short period of time in one source as sessions. This enriches the data and enables a more in-depth analysis. We produced common statistics like usernames, passwords, username/password combinations, password lengths, originating country and more. From the information gathered, we were able to identify common dictionaries used for brute-force login attacks and other more sophisticated statistics like login attempts per session and attack efficiency.
最近,互联性的增加导致僵尸网络中支持物联网的设备数量不断增加。这种僵尸网络目前被用于大规模的DDoS攻击。为了跟踪这些恶意活动,蜜罐已被证明是一个至关重要的工具。我们开发并建立了一个分布式和高度可扩展的WAN蜜罐,并附带了一个后端基础设施,用于对收集的数据进行复杂的处理。为了使处理后的数据易于理解,我们设计了一个图形化的前端,显示从数据中获得的所有相关信息。我们将短时间内在一个源中发起的攻击分组为会话。这丰富了数据,可以进行更深入的分析。我们生成了常见的统计数据,如用户名、密码、用户名/密码组合、密码长度、原始国家等。从收集到的信息中,我们能够识别用于暴力登录攻击的常用字典和其他更复杂的统计数据,如每个会话的登录尝试次数和攻击效率。
{"title":"Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology","authors":"Daniel Fraunholz, Marc Zimmermann, S. D. Antón, Jörg Schneider, H. Dieter Schotten","doi":"10.1109/CONFLUENCE.2017.7943186","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943186","url":null,"abstract":"Recently, the increase of interconnectivity has led to a rising amount of IoT enabled devices in botnets. Such botnets are currently used for large scale DDoS attacks. To keep track with these malicious activities, Honeypots have proven to be a vital tool. We developed and set up a distributed and highly-scalable WAN Honeypot with an attached backend infrastructure for sophisticated processing of the gathered data. For the processed data to be understandable we designed a graphical frontend that displays all relevant information that has been obtained from the data. We group attacks originating in a short period of time in one source as sessions. This enriches the data and enables a more in-depth analysis. We produced common statistics like usernames, passwords, username/password combinations, password lengths, originating country and more. From the information gathered, we were able to identify common dictionaries used for brute-force login attacks and other more sophisticated statistics like login attempts per session and attack efficiency.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"27 1","pages":"416-421"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83303294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance improvement of communication based high speed train control system with packet drops during handover under worst case scenario 基于通信的高速列车控制系统在最坏情况下切换时丢包的性能改进
Rajesh Mishra, Bhupendra Singh, Shobhna Tiwari
Safe operation of rail vehicles is a matter of concern. Communication based train control (CBTC) network is a data communication based automated control network that ensures safety of rail vehicles. In this network status and control command are transmitted using WLAN technology. It has been observed that WLAN is less successful for high speed as because of its design constrains packet drops cannot be avoided. In present work, analysis of random packet drops in CBTC systems during handover process is evaluated. Unlike the existing work that only consider packet drop formulation under specific condition, we analyze system behavior under worst case scenario by varying one parameter over the range and analyze its impact on the packet drop and other related parameters of CBTC system. Simulation results are presented and compared against existing results under specific conditions.
轨道车辆的安全运行是一个值得关注的问题。基于通信的列车控制网络(CBTC)是一种基于数据通信的自动化控制网络,旨在保证轨道车辆的安全。在该网络中,状态和控制命令通过无线局域网技术传输。据观察,WLAN在高速上不太成功,因为它的设计限制无法避免丢包。本文对CBTC系统切换过程中的随机丢包问题进行了分析。与现有工作只考虑特定条件下的丢包形式不同,我们通过在一个范围内改变一个参数来分析最坏情况下的系统行为,并分析其对CBTC系统丢包和其他相关参数的影响。给出了仿真结果,并在特定条件下与现有结果进行了比较。
{"title":"Performance improvement of communication based high speed train control system with packet drops during handover under worst case scenario","authors":"Rajesh Mishra, Bhupendra Singh, Shobhna Tiwari","doi":"10.1109/CONFLUENCE.2017.7943185","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943185","url":null,"abstract":"Safe operation of rail vehicles is a matter of concern. Communication based train control (CBTC) network is a data communication based automated control network that ensures safety of rail vehicles. In this network status and control command are transmitted using WLAN technology. It has been observed that WLAN is less successful for high speed as because of its design constrains packet drops cannot be avoided. In present work, analysis of random packet drops in CBTC systems during handover process is evaluated. Unlike the existing work that only consider packet drop formulation under specific condition, we analyze system behavior under worst case scenario by varying one parameter over the range and analyze its impact on the packet drop and other related parameters of CBTC system. Simulation results are presented and compared against existing results under specific conditions.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"47 1","pages":"412-415"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73496775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images 生物医学图像安全联合加密与水印算法的比较分析
Siddhant Bansal, Garima Mehta
The security of multimedia content such as images while transmission is a cause of concern in current times. Traditional watermarking techniques help in identification of source as well as maintaining patient metadata for biomedical images. Similarly, traditional image encryption techniques allow privacy of patients. There is a need for a two-layer security approach with joint watermarking and encryption, to improve over contemporary methods. This paper presents comparative analysis of various joint encryption and watermarking algorithms of biomedical images to fin d the best pair of algorithms based on previous research. Comparative results also indicate that joint encryption and watermarking algorithms are suitable for security of biomedical images.
多媒体内容(如图像)在传输过程中的安全性是当前人们关注的一个问题。传统的水印技术有助于生物医学图像的源识别和患者元数据的维护。同样,传统的图像加密技术允许患者的隐私。需要一种联合水印和加密的两层安全方法来改进现有的方法。本文对生物医学图像的各种联合加密和水印算法进行了比较分析,在前人研究的基础上找到最佳的算法对。对比结果还表明,联合加密和水印算法适用于生物医学图像的安全。
{"title":"Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images","authors":"Siddhant Bansal, Garima Mehta","doi":"10.1109/CONFLUENCE.2017.7943224","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943224","url":null,"abstract":"The security of multimedia content such as images while transmission is a cause of concern in current times. Traditional watermarking techniques help in identification of source as well as maintaining patient metadata for biomedical images. Similarly, traditional image encryption techniques allow privacy of patients. There is a need for a two-layer security approach with joint watermarking and encryption, to improve over contemporary methods. This paper presents comparative analysis of various joint encryption and watermarking algorithms of biomedical images to fin d the best pair of algorithms based on previous research. Comparative results also indicate that joint encryption and watermarking algorithms are suitable for security of biomedical images.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"615 1","pages":"609-612"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77362456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study on prediction of breast cancer recurrence using data mining techniques 基于数据挖掘技术的乳腺癌复发预测研究
Uma Ojha, Savita Goel
Breast cancer is the most common cancer in women and thus the early stage detection in breast cancer can provide potential advantage in the treatment of this disease. Early treatment not only helps to cure cancer but also helps in its prevention of its recurrence. Data mining algorithms can provide great assistance in prediction of earl y stage breast cancer that always has been a challenging research problem. The main objective of this research is to find how precisely can these data mining algorithms predict the probability of recurrence of the disease among the patients on the basis of important stated parameters. The research highlights the performance of different clustering and classification algorithms on the dataset. Experiments show that classification algorithms are better predictors than clustering algorithms. The result indicates that the decision tree (C5.0) and SVM is the best predictor with 81% accuracy on the holdout sample and fuzzy c-means came with the lowest accuracy of37% among the algorithms used in this paper.
乳腺癌是妇女中最常见的癌症,因此早期发现乳腺癌可以为治疗这种疾病提供潜在的优势。早期治疗不仅有助于治愈癌症,而且有助于预防癌症复发。数据挖掘算法可以为早期乳腺癌的预测提供很大的帮助,这一直是一个具有挑战性的研究问题。本研究的主要目的是发现这些数据挖掘算法在重要的既定参数的基础上预测患者疾病复发的概率有多精确。该研究重点研究了不同聚类和分类算法在数据集上的性能。实验表明,分类算法比聚类算法具有更好的预测效果。结果表明,在本文使用的算法中,决策树(C5.0)和支持向量机是最好的预测器,对滞留样本的预测精度为81%,模糊c-means的预测精度最低,为37%。
{"title":"A study on prediction of breast cancer recurrence using data mining techniques","authors":"Uma Ojha, Savita Goel","doi":"10.1109/CONFLUENCE.2017.7943207","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943207","url":null,"abstract":"Breast cancer is the most common cancer in women and thus the early stage detection in breast cancer can provide potential advantage in the treatment of this disease. Early treatment not only helps to cure cancer but also helps in its prevention of its recurrence. Data mining algorithms can provide great assistance in prediction of earl y stage breast cancer that always has been a challenging research problem. The main objective of this research is to find how precisely can these data mining algorithms predict the probability of recurrence of the disease among the patients on the basis of important stated parameters. The research highlights the performance of different clustering and classification algorithms on the dataset. Experiments show that classification algorithms are better predictors than clustering algorithms. The result indicates that the decision tree (C5.0) and SVM is the best predictor with 81% accuracy on the holdout sample and fuzzy c-means came with the lowest accuracy of37% among the algorithms used in this paper.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"61 1","pages":"527-530"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88489020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Lexicalizing linked data for a human friendly web 为人类友好的网络词汇化链接数据
Rivindu Perera, P. Nand, Wen-Hsin Yang, Kohichi Toshioka
The consumption of Linked Data has dramatically increased with the increasing momentum towards semantic web. Linked data is essentially a very simplistic format for representation of knowledge in that all the knowledge is represented as triples which can be linked using one or more components from the triple. To date, most of the efforts has been towards either creating linked data by mining the web or making it available for users as a source of knowledgebase for knowledge engineering applications. In recent times there has been a growing need for these applications to interact with users in a natural language which required the transformation of the linked data knowledge into a natural language. The aim of the RealText project described in this paper, is to build a scalable framework to transform Linked Data into natural language by generating lexicalization patterns for triples. A lexicalization pattern is a syntactical pattern that will transform a given triple into a syntactically correct natural language sentence. Using DBpedia as the Linked Data resource, we have generated 283 accurate lexicalization patterns for a sample set of 25 ontology classes. We performed human evaluation on a test sub-sample with an inter-rater agreement of 0.86 and 0.80 for readability and accuracy respectively. This results showed that the lexicalization patterns generated language that are accurate, readable and emanates qualities of a human produced language.
随着语义网的发展,关联数据的消耗量急剧增加。链接数据本质上是一种非常简单的知识表示格式,因为所有的知识都表示为三元组,可以使用三元组中的一个或多个组件进行链接。到目前为止,大多数的努力都是通过挖掘网络来创建链接数据,或者将其作为知识工程应用程序的知识库来源提供给用户。近年来,这些应用程序越来越需要以自然语言与用户交互,这需要将关联数据知识转换为自然语言。本文中描述的RealText项目的目标是构建一个可扩展的框架,通过生成三元组的词法化模式将关联数据转换为自然语言。词汇化模式是一种语法模式,它将给定的三元组转换为语法正确的自然语言句子。使用DBpedia作为关联数据资源,我们已经为25个本体类的样本集生成了283个准确的词汇化模式。我们对测试子样本进行了人工评估,其可读性和准确性的评分一致性分别为0.86和0.80。结果表明,词汇化模式生成的语言是准确的、可读的,并散发出人类产生的语言的品质。
{"title":"Lexicalizing linked data for a human friendly web","authors":"Rivindu Perera, P. Nand, Wen-Hsin Yang, Kohichi Toshioka","doi":"10.1109/CONFLUENCE.2017.7943119","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943119","url":null,"abstract":"The consumption of Linked Data has dramatically increased with the increasing momentum towards semantic web. Linked data is essentially a very simplistic format for representation of knowledge in that all the knowledge is represented as triples which can be linked using one or more components from the triple. To date, most of the efforts has been towards either creating linked data by mining the web or making it available for users as a source of knowledgebase for knowledge engineering applications. In recent times there has been a growing need for these applications to interact with users in a natural language which required the transformation of the linked data knowledge into a natural language. The aim of the RealText project described in this paper, is to build a scalable framework to transform Linked Data into natural language by generating lexicalization patterns for triples. A lexicalization pattern is a syntactical pattern that will transform a given triple into a syntactically correct natural language sentence. Using DBpedia as the Linked Data resource, we have generated 283 accurate lexicalization patterns for a sample set of 25 ontology classes. We performed human evaluation on a test sub-sample with an inter-rater agreement of 0.86 and 0.80 for readability and accuracy respectively. This results showed that the lexicalization patterns generated language that are accurate, readable and emanates qualities of a human produced language.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"29 1","pages":"30-35"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91540813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1