A. Abdullah, S. Deris, S. Hashim, Hamimah Mohd Jamil
{"title":"Graph Partitioning Method for Functional Module Detections of Protein Interaction Network","authors":"A. Abdullah, S. Deris, S. Hashim, Hamimah Mohd Jamil","doi":"10.1109/ICCTD.2009.168","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.168","url":null,"abstract":"Study on topology structure of protein interaction network has been suggested as a potential effort to discover biological functions and cellular mechanisms at systems level. In this work, we introduced a graph partitioning method to partition protein interaction network into several clusters of interacting proteins that share similar functions called functional modules. Our proposed method encompasses three major steps which are preprocessing, informative proteins selection and graph partitioning algorithm. We utilized the protein-protein interaction dataset from MIPS to test the proposed method. We use Gene Ontology information to validate the biological significance of the detected modules. We also downloaded protein complex information to evaluate the performance of our method. In our analysis, the method showed high accuracy performance indicates that this method capable to detect highly significance modules. Hence, this showed that functional modules detected by the proposed method are biologically significant which can be used to predict uncharacterized proteins and infer new complexes.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Betweeness-Centrality of Grid Networks","authors":"I. Rajasingh, Bharati Rajan, F. D.","doi":"10.1109/ICCTD.2009.230","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.230","url":null,"abstract":"Importance of estimating the centrality of the nodes in large networks has recently attracted increased interest. Betweenness is one of the most important centrality indices, which basically counts the number of shortest paths going through a node. Betweenness has been used in diverse applications such as social network analysis or route planning. In this paper we find a formula to obtain the betweeness-centrality for grids.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification and Validation of Activity Diagrams Using Graph Transformation","authors":"V. Rafe, R. Rafeh, S. Azizi, M. Miralvand","doi":"10.1109/ICCTD.2009.172","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.172","url":null,"abstract":"Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa
{"title":"Secure Virtual Application Distribution","authors":"W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa","doi":"10.1109/ICCTD.2009.56","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.56","url":null,"abstract":"This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Soft-sensing Method Used to Predict the Overhead Product Purity of the Styrene Distillation Column","authors":"Cao Wei, Zhao Ying-kai, L. Zhaojie, Liao Zhiliang","doi":"10.1109/ICCTD.2009.99","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.99","url":null,"abstract":"In the paper, a new adaptive soft-sensor model has been used to predict the overhead product purity of the styrene distillation column. Combined with process characteristics of the tower, an adaptive correction method with three deviations is proposed, which based on the recursive PLS. The predictive ability of this soft-sensing method gives accurate predictions of both measured and unmeasured quantities, even in the presence of large unmeasured disturbances. The application results show that this model has a high accurate property. The proposed method also provides a case study to aid in applications to other industrial problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Submarine Maneuverability of Flooded Compartment","authors":"Liu Hui, Pu Jinyun, Jin Tao","doi":"10.1109/ICCTD.2009.70","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.70","url":null,"abstract":"The paper establishes the emergency recovery maneuver motion model. According to the characteristic of hydrodynamics coefficients on flooded submarine, attaining hydrodynamics coefficients of different angle of attack by limited ship model hydrodynamics experiment of large angle of attack. A sensitivity index is introduced to evaluate submarine’s controllability. The experiment results are regressed to two kinds of hydrodynamic coefficients for big sensitivity index hydrodynamic coefficients, then forecast the submarine’s maneuverability. The calculation example proves the validity and feasibility of applied method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Heavy Tailed Distribution on Statistical and Neural Network Based Control Charts","authors":"Ong Hong Choon, Poh-Ying Lim","doi":"10.1109/ICCTD.2009.55","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.55","url":null,"abstract":"Artificial Neural Networks (ANN) had been used for the detection and classification of patterns in control charts. It has been shown that neural network can detect smaller shifts better than statistical control charts. However, nearly all studies in this area assume that the in-control process data in the control charts follow a normal distribution. In our study, we focus on the effects of heavy tailed distributions on the performance of neural network based control chart and statistical control charts. Statistical control charts like Shewhart X control chart, Exponentially Weighted Moving Average (EWMA) control chart and Cumulative Sum (CUSUM) control chart are presented to make the comparison of the effects of heavy tailed distribution with Neural network based control chart. The criterion to compare the performance of both types of control charts is the average run length (ARL). From the results, the neural network is less robust than the statistical based control charts in the presence of heavy tailed data.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case","authors":"A. H. Abdullah, M. Nor, A. Saman","doi":"10.1109/ICCTD.2009.28","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.28","url":null,"abstract":"Aseptic loosening is the critical reason for the failure of the cemented total hip arthroplasty. It occurs due to bone remodeling triggered by stress shielding and cement mantle fracture. In this study, stress shielding and bone thickening phenomenon of the cemented THA femur was analysed using three dimensional finite element method for walking load case. The intact femur is modeled to consist of cortical bone and cancellous bone. The prosthesis stem and bone cement are modeled to be biocompatibility Ti-6Al-4V alloy and polymethyl-methacrylate (PMMA). The maximum principal stress of THA femur is lower than that predicted in intact femur at the middle region which leads to stress shielding problems. While higher stress at the bottom region enhance bone thickening and contribute to prosthesis loosening.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Large Scale Nonnegative Least Squares Problems","authors":"Longquan Yong","doi":"10.1109/ICCTD.2009.88","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.88","url":null,"abstract":"We present a new method for solving large scale nonnegative least squares problems. Firstly, nonnegative least squares problem was transformed into monotone linear complementarity problem. Then we apply potential-reduction interior point algorithm to monotone linear complementarity problem which is based on the Newton direction and centering direction. We show that this algorithm have the polynomial complexity. Numerical results are reported which demonstrate very good computational performance on nonnegative least squares problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflection of Network Security Caused by a Wheel","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.49","url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}