Luis Diego Mora-Jimenez, Oscar Azofeifa-Segura, J. Guevara-Coto
{"title":"Functional Annotations of Novel Cancer-Associated lncRNAs Identified Using Machine Learning Algorithms","authors":"Luis Diego Mora-Jimenez, Oscar Azofeifa-Segura, J. Guevara-Coto","doi":"10.1109/CSCI49370.2019.00274","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00274","url":null,"abstract":"Cancer consists of a set of diseases that result from deregulated cell growth and invasion of adjacent tissues. Due to an increase in research, more information has become available regarding the potential causes for cancer, including non-coding elements such as lncRNAs. This new knowledge can be discovered through machine learning methods that can extract new information from data such as gene expression profiles and identify new cancer-associated genes. For this work we use two different machine learning algorithms, random forests and support vector machines. The models were trained and we tested fine-tuning methods including: balancing and feature selection. The predictors with the highest metrics were: balanced RF with Boruta (AUC-ROC: 0.9696) and the balanced SVM with recursive feature elimination (AUC-ROC: 0.9710). These models were used to identify new potential lncRNA driver-like genes from protein coding expression data. The predicted candidates were then functionally annotated using disease ontologies and molecular function ontologies to determine their enrichment in cancer related processes. These processes included prostate cancer and glycosaminglycan binding, a potential tumor therapeutic target.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attention-Based Surgical Phase Boundaries Detection in Laparoscopic Videos","authors":"Babak Namazi, G. Sankaranarayanan, V. Devarajan","doi":"10.1109/CSCI49370.2019.00109","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00109","url":null,"abstract":"A new deep learning-based method is proposed for identifying the boundaries of all surgical phases in a laparoscopic video. The model is designed based on the sequence-to-sequence architecture with an attention mechanism, to map the extracted visual features to the frame numbers of the beginning and the ending of each phase. The main novelty is that the alignment vectors for each phase are taken as the outputs, and are trained directly to select the indices. We evaluated our model using a large publicly available dataset of laparoscopic cholecystectomy procedure and obtained the Mean Absolute Error (MAE) of 48 seconds.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Hirschmeier, J. Melsbach, D. Schoder, Sven Stahlmann
{"title":"Unsupervised Multi-Label Document Classification for Large Taxonomies Using Word Embeddings","authors":"Stefan Hirschmeier, J. Melsbach, D. Schoder, Sven Stahlmann","doi":"10.1109/CSCI49370.2019.00241","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00241","url":null,"abstract":"More and more businesses are in need for metadata for their documents. However, automatic generation for metadata is not easy, as for supervised document classification, a significant amount of labelled training data is needed, which is not always present in the desired amount or quality. Often, documents need to be tagged with a predefined set of company specific keywords that are organized in a taxonomy. We present an unsupervised approach to perform multi-label document classification for large taxonomies using word embeddings and evaluate it with a dataset of a public broadcaster. We point out strengths of the approach compared to supervised classification and statistical approaches like tf-idf.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121854339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Five Levels of Data Destruction: A Paradigm for Introducing Data Recovery in a Computer Science Course","authors":"Gary Cantrell, Joan Runs Through","doi":"10.1109/CSCI49370.2019.00029","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00029","url":null,"abstract":"Digital forensics has become a fundamental piece of many cyber security programs across the US, and data recovery is an integral building block of digital forensics. Data recovery can be a difficult topic to cover without a system or organization to the different methods of recovery. The following manuscript offers a structure for introducing data recovery in a digital forensics or information technology course and a method for evaluating the admissibility of recovered files as court evidence based on how the data were recovered. This offers both a framework for teaching data recovery and a way for discussing evidence admissibility. The five levels of destruction paradigm is a result of over a decade of teaching digital forensics in vocational and academic environments in a computer science program. The authors offer up this paradigm in hopes it will be useful to other computer science and digital forensics educators.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"79 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132531931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radial Basis Function Network: Its Robustness and Ability to Mitigate Adversarial Examples","authors":"Jules Chenou, G. Hsieh, Tonya Fields","doi":"10.1109/CSCI49370.2019.00024","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00024","url":null,"abstract":"this work is a continuation of an ongoing effort to increase the robustness of the deep neural network, and thus mitigate possible adversarial examples. In our previous work, the emphasis was placed on denoising the input dataset by adding colored noise before processing. In that work, the evaluation made with the empirical robustness score, resulted in a 1% improvement on average for individual noise and a 3.74% improvement on average for ensemble noise. The aim of this paper is to demonstrate the effective robustness of a well-designed radial basis function neural network in tackling adversarial examples. With the empirical robustness as a metric, the results show a 72.5% increase with Fast Gradient Sign Method (FGSM) attack on the MNIST dataset in comparison to a simple deep network and a 6.4 % increase with FGSM on the CIFAR10 dataset.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Recent Trends in Automatic Object Identification","authors":"Xavier Williams, N. Mahapatra","doi":"10.1109/CSCI49370.2019.00083","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00083","url":null,"abstract":"Automatic object identification (auto-ID) involves techniques for automatically identifying objects using visual features or tags with unique identification codes. These auto-ID systems then transfer the collected identification information to computer systems for further data management. In this paper, we analyze the existing auto-ID techniques for physically tagged objects.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study of Technology Use and Information Flow at a Danish E-Clinic","authors":"B. Smaradottir, R. Fensli","doi":"10.1109/CSCI49370.2019.00182","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00182","url":null,"abstract":"There is an urgent call from health organizations, health professionals and health authorities to re-design care delivery for patients with chronic conditions and multi-morbidities. The research project 3P-Patients and Professionals in Productive Teams aims to study health care services that are run with different patient-centered teamwork models. In this context, a case study was made of an E-clinic in Denmark, with a focus on the technology use and information flow in a patient-centered clinical care context. Qualitative methods were applied with observations and interviews with key informants. The results showed that information flow worked well in a patient-centered care perspective, even though the technology was a standalone system for the E-clinic and with limited interoperability with other health care providers.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Algorithms to Solve Integral Equations Automatically","authors":"Jun Zhang, Weiwei Zhu, Fangyang Shen","doi":"10.1109/CSCI49370.2019.00094","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00094","url":null,"abstract":"Integral equations come from a wide range of applications. Laplace transform has been playing an important role in mathematics; it is very powerful and widely used in solving integral equations, however, such a traditional method suffers a serious drawback, which is the calculation of inverse Laplace transform. Such a kind of inverse calculation is problematic or impossible, except some very simple functions. Sumudu transform is a new integral transform with nice features like Laplace transform, in addition, it provides new methodology for problem solving. In this work, a new computational method is proposed to solve integral equations, the new method incorporates useful features from both Laplace transform and Sumudu transform such that the calculation of the inverse Laplace transform is avoided. In addition, it is demonstrated with implementations that the new method and techniques presented in this work can be implemented in computer algebra systems such as Maple to solve Volterra convolution integral equations and mixed differential Volterra convolution integral equations automatically","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124286061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who Is the Father of Deep Learning?","authors":"C. Tappert","doi":"10.1109/CSCI49370.2019.00067","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00067","url":null,"abstract":"This paper evaluates candidates for the father of deep learning. We conclude that Frank Rosenblatt developed and explored all the basic ingredients of the deep learning systems of today, and that he should be recognized as a Father of Deep Learning, perhaps together with Hinton, LeCun and Bengio who have just received the Turing Award as the fathers of the deep learning revolution.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page iii]","authors":"","doi":"10.1109/csci49370.2019.00002","DOIUrl":"https://doi.org/10.1109/csci49370.2019.00002","url":null,"abstract":"","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}