2009 International Association of Computer Science and Information Technology - Spring Conference最新文献

筛选
英文 中文
Using Texture Descriptor and Radon Transform to Characterize Protein Structure and Build Fast Fold Recognition 利用纹理描述子和Radon变换对蛋白质结构进行表征,建立快速折叠识别
Jian-Yu Shi, Yan-Ning Zhang
{"title":"Using Texture Descriptor and Radon Transform to Characterize Protein Structure and Build Fast Fold Recognition","authors":"Jian-Yu Shi, Yan-Ning Zhang","doi":"10.1109/IACSIT-SC.2009.56","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.56","url":null,"abstract":"One of the most important research aims is to understand the relationship between structure and function of protein. Inspired by this motivation, automatic classification of protein structure becomes one of major research approaches. However, how to extract compact and effective feature to characterize protein structure is still a challenge to it. In this paper, 3-D tertiary structure of protein fold is mapped into 2-D distance matrix which can be further regarded as gray level image. Firstly, gray level co-occurrence matrix (CoM) of distance matrix image (DMI) is calculated and four descriptors based on it are taken as the first group of features. Next, DMI is transformed into projection view by Radon transform. In succession, the projection magnitudes are analyzed by histogram of which four central moments are taken as the second group of features. After that, we depict the structural meanings of gray distribution, various angles and pixels distance of CoM respectively, and determine the angle band used in Radon transform by the second derivation of the variance of the projections along different orientations. Finally, the presented feature extraction is validated by classification of 27 types of folds, compared with several feature methods based on sequence or structure. The results show that the presented method achieves significant improvement than other methods in terms of both low feature dimension and high classification accuracy.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lungs Nodule Detection by Using Fuzzy Morphology from CT Scan Images 基于CT扫描图像模糊形态学的肺结节检测
M. Jaffar, Ayyaz Hussain, A. M. Mirza
{"title":"Lungs Nodule Detection by Using Fuzzy Morphology from CT Scan Images","authors":"M. Jaffar, Ayyaz Hussain, A. M. Mirza","doi":"10.1109/IACSIT-SC.2009.89","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.89","url":null,"abstract":"In this paper we have proposed a method for lungs nodule detection from computed tomography (CT) scanned images by using Fuzzy C-Mean (FCM) and morphological techniques. First of all, fuzzy have been used for automated segmentation of lungs. Region of interests (ROIs) have been extracted by using 8 directional searches slice by slice and then 3D ROI image have been constructed. A 3D template has been constructed and convolves with the 3D ROI image. Finally FCM have been used to extract ROI that contain nodule. The proposed system is capable to perform fully automatic segmentation and nodule detection from CT Scan Lungs images, based solely on information contained by the image itself. The technique was tested against the 50 datasets of different patients received from Aga Khan Medical University, Pakistan and Lung Image Database Consortium (LIDC) dataset.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification and Evaluation of Tomato Images Using Several Classifier 基于多分类器的番茄图像分类与评价
Hassan Asadollahi, Morteza Sabery Kamarposhty, M. M. Teymoori
{"title":"Classification and Evaluation of Tomato Images Using Several Classifier","authors":"Hassan Asadollahi, Morteza Sabery Kamarposhty, M. M. Teymoori","doi":"10.1109/IACSIT-SC.2009.47","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.47","url":null,"abstract":"The goal of this paper is tomato classification by images processing. Data was used in this paper in related to 90 images of tomato. We extract 10 features from 90 images by machine vision technique. We evaluate results that accepted in considered images. Also we have classified these data using different classification methods and then compare them.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132856883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Key Practice Areas of Lean Manufacturing 精益生产的关键实践领域
Y. Wong, K. Wong, Anwar Ali
{"title":"Key Practice Areas of Lean Manufacturing","authors":"Y. Wong, K. Wong, Anwar Ali","doi":"10.1109/IACSIT-SC.2009.44","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.44","url":null,"abstract":"Today, many organizations are enthusiastic to adopt lean manufacturing strategy that would enable them to compete in this competitive globalization market. In this respect, it is necessary to assess the implementation of lean manufacturing in different organizations so that the important best practices can be identified. This paper describes the development of key areas which will be used to assess the adoption and implementation of lean manufacturing practices. Specifically, a set of 14 key areas is developed based on a thorough analysis and synthesis of previous studies. These areas are work processes, scheduling, inventory, equipment, layout, material handling, employees, quality, product design, suppliers, tools and techniques, customers, ergonomics and safety, and management and culture.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Combined Database System for Binary Protein Interaction and Co-complex Association 二元蛋白相互作用和共络合物结合的组合数据库系统
Youngwoong Han, Choong-Hyun Sun, Min-Sung Kim, G. Yi
{"title":"Combined Database System for Binary Protein Interaction and Co-complex Association","authors":"Youngwoong Han, Choong-Hyun Sun, Min-Sung Kim, G. Yi","doi":"10.1109/IACSIT-SC.2009.42","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.42","url":null,"abstract":"Protein-protein interaction (PPI) data has been tremendously increased by enhancement in proteomic technologies. Both binary protein interactions and protein complexes have been recognized as valuable sources for protein functional study. Great portion of the binary protein interactions are, however, predicted or inferred ones by computational methods from protein complex data. Validity of these data remains yet in unacceptable status. Hence, it is necessary to combine binary protein interactions and protein complex data for the sake of comprehensiveness while making clear distinction between them in well classified organization. We constructed a web-based database system that combines binary protein interaction and protein complex data from the nine most reliable public databases. Especially, the system maintains validity of data by adequately categorizing PPIs into direct binary interaction, co-complex relationship, and predicted interaction. In addition, we implemented a comprehensive user interface by which they can access relevant information at maximum. For single or group of queried proteins and their homologs, the system reports binary interactions, complexes, protein conservation in complexes, and binary interactions in complexes with their respective evidences. Our system would be a useful resource for identification of functionally correlated candidates in more reliable and comprehensive way. The system is currently available at http://piech.icu.ac.kr/ppi","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
NIDS: A Network Based Approach to Intrusion Detection and Prevention NIDS:基于网络的入侵检测和防御方法
Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan
{"title":"NIDS: A Network Based Approach to Intrusion Detection and Prevention","authors":"Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan","doi":"10.1109/IACSIT-SC.2009.96","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.96","url":null,"abstract":"Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don’t need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Strategies for Controlling Cost in a Specific Supply Chain Model 特定供应链模式下的成本控制策略
Yuheng Wang, Jing Yu
{"title":"Strategies for Controlling Cost in a Specific Supply Chain Model","authors":"Yuheng Wang, Jing Yu","doi":"10.1109/IACSIT-SC.2009.48","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.48","url":null,"abstract":"Supply chain is likely to output invisible cost when demand of products increasing. In this paper, we first consider a cooperative, two-stage supply chain consisting of three members: suppliers, manufacturer and distributers. Based on the simplified supply chain, we present an overview of cost which is relevant to manufacturer from upstream to downstream, also reveal the key factors that drive the effectiveness of supply to realize better performance. Next we focus on the certain factors and create a model for interpreting how supply chain operates. From the simulation of model, we present how invisible cost emerges and how to limit it within an acceptable level. In addition, we discuss the uncertain elements which might influence the model. Eventually, we conclude when the demand increased, there will be invisible emerging. The previous method of improving collaboration in supply chain will be not enough to reducing it. Supply chain member, especially manufacturer should adopt some new ways like decentralize plant to reduce invisible cost.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Based Text Summarization 基于群的文本摘要
M. Binwahlan, N. Salim, Ladda Suanmali
{"title":"Swarm Based Text Summarization","authors":"M. Binwahlan, N. Salim, Ladda Suanmali","doi":"10.1109/IACSIT-SC.2009.61","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.61","url":null,"abstract":"The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The treating of all text features with same level of importance can be considered the main factor causing creating a summary with low quality. In this paper, we introduced a novel text summarization model based on swarm intelligence. The main purpose of the proposed model is for scoring the sentences, emphasizing on dealing with the text features fairly based on their importance. The weights obtained from the training of the model were used to adjust the text features scores, which could play an important role in the selection process of the most important sentences to be included in the final summary. The results show that the human summaries H1 and H2 are 49% similar to each other. The proposed model creates summaries which are 43% similar to the manually generated summaries, while the summaries produced by Ms Word summarizer are 39% similar.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
A Schema-Guiding Evolutionary Algorithm for 0-1 Knapsack Problem 0-1背包问题的模式引导进化算法
Yan Liu, Chao Liu
{"title":"A Schema-Guiding Evolutionary Algorithm for 0-1 Knapsack Problem","authors":"Yan Liu, Chao Liu","doi":"10.1109/IACSIT-SC.2009.31","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.31","url":null,"abstract":"A Schema-Guiding Evolutionary Algorithm (SGEA) is proposed in this paper. The novel SGEA has many good features. It proposes the schema-modified operator to adjust the distribution of the population. What's more, it constructs an elite-schema space and proposes the cluster-center schema to guide the direction of individual's evolution. And by such two strategies, the diversity of the population and the local and global search power can be greatly improved. The experimental results show that the SGEA proposed in this paper has many better performances, compared with other methods such as simple genetic algorithm, greedy algorithm and so forth.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Biomedical Implications of Robust Biomeasurement of Transient Modifications in Cells by Flow Cytometry 流式细胞术对细胞瞬时修饰的强大生物测量的生物医学意义
R. Sachidanandham, Gin Yew-Hoong Karina
{"title":"Biomedical Implications of Robust Biomeasurement of Transient Modifications in Cells by Flow Cytometry","authors":"R. Sachidanandham, Gin Yew-Hoong Karina","doi":"10.1109/IACSIT-SC.2009.18","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.18","url":null,"abstract":"Despite the fact that flow cytometry has been a proven biomedical technology [e.g. Ref. 1], its applications in understanding the novel and frontier aspects of human infections and infectious agents continue to emerge. Here we present the challenges, experience and accomplishments in the transient measurements of cells by flow cytometry and cell separation by fluorescence activated cell sorting (FACS). In contrast to the conventional method of characterization of novel or natural human pathogens, gene sequencing and neighbor joining tree have been considered more robust. We have used these approaches involving 16s rRNA gene sequencing of human pathogens (sequences with accession numbers EF419181, EF419183 & EF419182 deposited in the GenBank, USA) and neighbor joining tree to identify and characterize human pathogens (strains deposited in the publicly accessible international culture collections namely NCIMB, Scotland & NCCB, Netherlands). We found that combining multiparametric flow cytometry and FACS unveiled key information on the stress response of human pathogens. With the use of flow cytometry, we report for the first time, the phenomenon of DNAdh in Acinetobacter baylyi, an important nosocomial pathogen in humans. We forecast that DNAdh offers multilayer defense for human pathogens under stress. Furthermore, our strategies offer platform for disclosing genetic pathway(s) of dormancy and DNAdh, for the possible design of new generation of drugs and antimicrobials.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信