{"title":"A survey of prediction models for breast cancer survivability","authors":"Amna Ali, Ali Tufail, U. Khan, Minkoo Kim","doi":"10.1145/1655925.1656155","DOIUrl":"https://doi.org/10.1145/1655925.1656155","url":null,"abstract":"Breast cancer prognosis poses a great challenge to the researchers. Recently, there have been breakthroughs in the field of bioinformatics and because of that a new realm of breast cancer prognosis has opened. The use of machine learning and data mining techniques has revolutionized the whole process of breast cancer prognosis. In this paper we present a survey of those models that are being used to enhance the breast cancer prognosis prediction. Firstly, we introduce these models and secondly we give an overview of the current research being carried out using these models. We specify different level of accuracies being claimed by different researchers. Lastly, we conclude that despite the ongoing research efforts towards achieving better capabilities for prediction system, we still need much more to build a more accurate and less invasive prognostic system that can benefit the mankind.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study for the optimal routing of Bluetooth Piconet","authors":"Chung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye","doi":"10.1145/1655925.1656000","DOIUrl":"https://doi.org/10.1145/1655925.1656000","url":null,"abstract":"the best route is to upgrade the network of efficient and effective way to transmit; the NS2 network simulator can effectively simulate a variety of different environments. This paper using the NS2 simulation of Bluetooth System, the formation of two kinds of tree and ring a Bluetooth Piconet. In the transmission data to improve the packet transmission delay or loss. With the best route, this can effectively enhance the transmission efficiency.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-mail authentication system: a spam filtering for smart senders","authors":"Pattaraporn Klangpraphant, P. Bhattarakosol","doi":"10.1145/1655925.1656022","DOIUrl":"https://doi.org/10.1145/1655925.1656022","url":null,"abstract":"In the present time, the electronic mail is the most popular communication method of people around the world. However, the increasing of electronic mails is the beginning of a malevolent aftereffect e-mail. The transgressors have developed a set of codes that is the electronic bomb of the electronic mails passing through the communication line. As a result, various protection methods and software have been implemented. However, miscellaneous problems caused by spams still remain. Therefore, this paper proposed a novel method, called EMAS, to certify delivered mails. The benefits obtained from this system do not only solve the spam problem, but also untie the indirect effects from spams that no other methods have been missed.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, S. Han
{"title":"Malicious content filtering based on semantic features","authors":"Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, S. Han","doi":"10.1145/1655925.1656071","DOIUrl":"https://doi.org/10.1145/1655925.1656071","url":null,"abstract":"This paper proposes a method to filtering malicious contents using semantic features. In conventional content based approach, low-level features such as color and texture are used to filter malicious contents. But, it is difficult to detect them because of semantic gaps between the low-level features and global concepts. In this paper, global concepts are divided into several semantic features. These semantic features are used to classify the global concept of malicious contents. We design semantic features and construct semantic classifier. In experiment, we evaluate the performance to filter malicious contents by comparing low-level features and semantic features. Results show that our proposed method has better performance than the method using only low-level features.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117225868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Laying out the scope of developers' risk management responsibilities","authors":"M. Kajko-Mattsson","doi":"10.1145/1655925.1655966","DOIUrl":"https://doi.org/10.1145/1655925.1655966","url":null,"abstract":"Most of the standards and process models are not explicit enough about identifying risk management responsibilities of developers. Usually, they do not identify them at all. In this paper, we identify the risk management responsibilities of developers within 53 software companies. Our goal is to find out what exactly developers do within pre-project and project phases such as requirements management, project and task planning and what risk management responsibilities they have within these phases. Our results show that the responsibility portfolio of developers varies depending on the degree of their engagement within pre-project and project phases; the broader the developers' responsibility portfolio, the broader their risk management responsibility portfolio.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship of blink, affect, and usability of graph reading tasks","authors":"G. Kim, S. M. Lui","doi":"10.1145/1655925.1655935","DOIUrl":"https://doi.org/10.1145/1655925.1655935","url":null,"abstract":"Dynamic graphs that represent a great deal of time-series data have become increasingly common these days. Although previous research revealed that blink facilitates visual search tasks by attracting human attention, blink features have not been clearly evident in a dynamic graph reading context. This study examines the effects of blink on the user's affective experience and usability of using a blinking line graph. Additionally, this study describes the empirical experiment setup for investigating the characteristics of task types as a moderator to the relationship between blink and the user's experience. This research aims (1) to theoretically contribute graph comprehension domain by investigating the effects of blink on a graph comprehension process, (2) to design a quantitative experiment and to propose possible hypotheses, and (3) to understand the influence of task types on reading of a blinking graph.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132387884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on QoS issues for mobile ad-hoc networks","authors":"R. Priya, N. Chaki","doi":"10.1145/1655925.1656040","DOIUrl":"https://doi.org/10.1145/1655925.1656040","url":null,"abstract":"In this paper a comprehensive review on some of the very recent works on Quality of Service issues in MANET has been presented. Although MANET has been initially proposed for disaster recovery and military communication, in today's world it has reached the civilians in all pervasive manner. QoS support is required to satisfy the growing need for multimedia technologies and commercial applications. More than 70% of the works referred and critically reviewed in the paper have been published in last five years. The papers sited here are particularly rich with novel ideas and thorough implementations. However, the limitations and sometimes restricted scope of these works are highlighted here. The motivation is not to underrate these excellent works, but to open up the scope of further improving the state of the art scenario for the future researchers. Qualitative evaluation on individual approaches followed by comparative analysis of simulation results would ease the task of researchers who intend to work in this area.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on cloud storage architecture and key technologies","authors":"Wenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song","doi":"10.1145/1655925.1656114","DOIUrl":"https://doi.org/10.1145/1655925.1656114","url":null,"abstract":"This paper proposes a general architecture of cloud storage system, analyzes the functions of the components, and discusses the key technologies, etc. Cloud storage is a novel storage service mode which the service providers supply storage capacities and data storage services through the Internet to the clients; meanwhile, the clients needn't know the details and lowered structures and mechanisms. The proposed architecture of cloud storage is layered and cooperative, and the discussed key technologies involve deployment, storage virtualization, data organization, migration, security, etc. The operation mechanism including ecology chain, game theory, ant colony optimization, data life cycle management, maintenance and update, convergence and evolution mechanisms are analyzed too. So an overall and new viewpoint to cloud storage system is illustrated.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132097185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective solution for community identification","authors":"Dongming Chen","doi":"10.1145/1655925.1655989","DOIUrl":"https://doi.org/10.1145/1655925.1655989","url":null,"abstract":"A popular method now widely used relies on the optimization of a quantity called modularity, which is a quality index for a partition of a network into communities. Current approaches, however, have difficulty splitting two clusters that are densely connected by one or more hub vertices. Further, traditional methods are less able to deal with very confused structures. An extended modularity conception based on similarity for graph partitioning is proposed. Experimental results demonstrate that the proposed modularity largely identifies hubs and obtains higher accuracy than competing methods. In addition, we show that this definition can be incorporated with Newman's fast agglomerative algorithms to detect communities in very large networks.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133488149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang-Cheng Kuo, Kuan-Yu Su, P. Ong, Jen-peng Huang
{"title":"Learning a prediction model for protein-protein recognition","authors":"Huang-Cheng Kuo, Kuan-Yu Su, P. Ong, Jen-peng Huang","doi":"10.1145/1655925.1656059","DOIUrl":"https://doi.org/10.1145/1655925.1656059","url":null,"abstract":"Study on protein-protein interaction is important for understanding the protein function in cell activity. Protein-protein recognition plays a crucial role of biology. Therefore, we use the properties of protein interface for protein recognition prediction because the interface offers important clues in biological functions. Genetic Programming (GP), one of artificial intelligence technologies, has been proposed in data classification research in biology. In this paper, we present a prediction method with GP for protein-protein recognition based on protein binding site features. We successfully predict recognition proteins with an average accuracy rate of 78% with ten-fold cross validation.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}