{"title":"Using Texture Descriptor and Radon Transform to Characterize Protein Structure and Build Fast Fold Recognition","authors":"Jian-Yu Shi, Yan-Ning Zhang","doi":"10.1109/IACSIT-SC.2009.56","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.56","url":null,"abstract":"One of the most important research aims is to understand the relationship between structure and function of protein. Inspired by this motivation, automatic classification of protein structure becomes one of major research approaches. However, how to extract compact and effective feature to characterize protein structure is still a challenge to it. In this paper, 3-D tertiary structure of protein fold is mapped into 2-D distance matrix which can be further regarded as gray level image. Firstly, gray level co-occurrence matrix (CoM) of distance matrix image (DMI) is calculated and four descriptors based on it are taken as the first group of features. Next, DMI is transformed into projection view by Radon transform. In succession, the projection magnitudes are analyzed by histogram of which four central moments are taken as the second group of features. After that, we depict the structural meanings of gray distribution, various angles and pixels distance of CoM respectively, and determine the angle band used in Radon transform by the second derivation of the variance of the projections along different orientations. Finally, the presented feature extraction is validated by classification of 27 types of folds, compared with several feature methods based on sequence or structure. The results show that the presented method achieves significant improvement than other methods in terms of both low feature dimension and high classification accuracy.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lungs Nodule Detection by Using Fuzzy Morphology from CT Scan Images","authors":"M. Jaffar, Ayyaz Hussain, A. M. Mirza","doi":"10.1109/IACSIT-SC.2009.89","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.89","url":null,"abstract":"In this paper we have proposed a method for lungs nodule detection from computed tomography (CT) scanned images by using Fuzzy C-Mean (FCM) and morphological techniques. First of all, fuzzy have been used for automated segmentation of lungs. Region of interests (ROIs) have been extracted by using 8 directional searches slice by slice and then 3D ROI image have been constructed. A 3D template has been constructed and convolves with the 3D ROI image. Finally FCM have been used to extract ROI that contain nodule. The proposed system is capable to perform fully automatic segmentation and nodule detection from CT Scan Lungs images, based solely on information contained by the image itself. The technique was tested against the 50 datasets of different patients received from Aga Khan Medical University, Pakistan and Lung Image Database Consortium (LIDC) dataset.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassan Asadollahi, Morteza Sabery Kamarposhty, M. M. Teymoori
{"title":"Classification and Evaluation of Tomato Images Using Several Classifier","authors":"Hassan Asadollahi, Morteza Sabery Kamarposhty, M. M. Teymoori","doi":"10.1109/IACSIT-SC.2009.47","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.47","url":null,"abstract":"The goal of this paper is tomato classification by images processing. Data was used in this paper in related to 90 images of tomato. We extract 10 features from 90 images by machine vision technique. We evaluate results that accepted in considered images. Also we have classified these data using different classification methods and then compare them.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132856883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Practice Areas of Lean Manufacturing","authors":"Y. Wong, K. Wong, Anwar Ali","doi":"10.1109/IACSIT-SC.2009.44","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.44","url":null,"abstract":"Today, many organizations are enthusiastic to adopt lean manufacturing strategy that would enable them to compete in this competitive globalization market. In this respect, it is necessary to assess the implementation of lean manufacturing in different organizations so that the important best practices can be identified. This paper describes the development of key areas which will be used to assess the adoption and implementation of lean manufacturing practices. Specifically, a set of 14 key areas is developed based on a thorough analysis and synthesis of previous studies. These areas are work processes, scheduling, inventory, equipment, layout, material handling, employees, quality, product design, suppliers, tools and techniques, customers, ergonomics and safety, and management and culture.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngwoong Han, Choong-Hyun Sun, Min-Sung Kim, G. Yi
{"title":"Combined Database System for Binary Protein Interaction and Co-complex Association","authors":"Youngwoong Han, Choong-Hyun Sun, Min-Sung Kim, G. Yi","doi":"10.1109/IACSIT-SC.2009.42","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.42","url":null,"abstract":"Protein-protein interaction (PPI) data has been tremendously increased by enhancement in proteomic technologies. Both binary protein interactions and protein complexes have been recognized as valuable sources for protein functional study. Great portion of the binary protein interactions are, however, predicted or inferred ones by computational methods from protein complex data. Validity of these data remains yet in unacceptable status. Hence, it is necessary to combine binary protein interactions and protein complex data for the sake of comprehensiveness while making clear distinction between them in well classified organization. We constructed a web-based database system that combines binary protein interaction and protein complex data from the nine most reliable public databases. Especially, the system maintains validity of data by adequately categorizing PPIs into direct binary interaction, co-complex relationship, and predicted interaction. In addition, we implemented a comprehensive user interface by which they can access relevant information at maximum. For single or group of queried proteins and their homologs, the system reports binary interactions, complexes, protein conservation in complexes, and binary interactions in complexes with their respective evidences. Our system would be a useful resource for identification of functionally correlated candidates in more reliable and comprehensive way. The system is currently available at http://piech.icu.ac.kr/ppi","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan
{"title":"NIDS: A Network Based Approach to Intrusion Detection and Prevention","authors":"Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan","doi":"10.1109/IACSIT-SC.2009.96","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.96","url":null,"abstract":"Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don’t need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies for Controlling Cost in a Specific Supply Chain Model","authors":"Yuheng Wang, Jing Yu","doi":"10.1109/IACSIT-SC.2009.48","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.48","url":null,"abstract":"Supply chain is likely to output invisible cost when demand of products increasing. In this paper, we first consider a cooperative, two-stage supply chain consisting of three members: suppliers, manufacturer and distributers. Based on the simplified supply chain, we present an overview of cost which is relevant to manufacturer from upstream to downstream, also reveal the key factors that drive the effectiveness of supply to realize better performance. Next we focus on the certain factors and create a model for interpreting how supply chain operates. From the simulation of model, we present how invisible cost emerges and how to limit it within an acceptable level. In addition, we discuss the uncertain elements which might influence the model. Eventually, we conclude when the demand increased, there will be invisible emerging. The previous method of improving collaboration in supply chain will be not enough to reducing it. Supply chain member, especially manufacturer should adopt some new ways like decentralize plant to reduce invisible cost.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swarm Based Text Summarization","authors":"M. Binwahlan, N. Salim, Ladda Suanmali","doi":"10.1109/IACSIT-SC.2009.61","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.61","url":null,"abstract":"The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The treating of all text features with same level of importance can be considered the main factor causing creating a summary with low quality. In this paper, we introduced a novel text summarization model based on swarm intelligence. The main purpose of the proposed model is for scoring the sentences, emphasizing on dealing with the text features fairly based on their importance. The weights obtained from the training of the model were used to adjust the text features scores, which could play an important role in the selection process of the most important sentences to be included in the final summary. The results show that the human summaries H1 and H2 are 49% similar to each other. The proposed model creates summaries which are 43% similar to the manually generated summaries, while the summaries produced by Ms Word summarizer are 39% similar.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Schema-Guiding Evolutionary Algorithm for 0-1 Knapsack Problem","authors":"Yan Liu, Chao Liu","doi":"10.1109/IACSIT-SC.2009.31","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.31","url":null,"abstract":"A Schema-Guiding Evolutionary Algorithm (SGEA) is proposed in this paper. The novel SGEA has many good features. It proposes the schema-modified operator to adjust the distribution of the population. What's more, it constructs an elite-schema space and proposes the cluster-center schema to guide the direction of individual's evolution. And by such two strategies, the diversity of the population and the local and global search power can be greatly improved. The experimental results show that the SGEA proposed in this paper has many better performances, compared with other methods such as simple genetic algorithm, greedy algorithm and so forth.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biomedical Implications of Robust Biomeasurement of Transient Modifications in Cells by Flow Cytometry","authors":"R. Sachidanandham, Gin Yew-Hoong Karina","doi":"10.1109/IACSIT-SC.2009.18","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.18","url":null,"abstract":"Despite the fact that flow cytometry has been a proven biomedical technology [e.g. Ref. 1], its applications in understanding the novel and frontier aspects of human infections and infectious agents continue to emerge. Here we present the challenges, experience and accomplishments in the transient measurements of cells by flow cytometry and cell separation by fluorescence activated cell sorting (FACS). In contrast to the conventional method of characterization of novel or natural human pathogens, gene sequencing and neighbor joining tree have been considered more robust. We have used these approaches involving 16s rRNA gene sequencing of human pathogens (sequences with accession numbers EF419181, EF419183 & EF419182 deposited in the GenBank, USA) and neighbor joining tree to identify and characterize human pathogens (strains deposited in the publicly accessible international culture collections namely NCIMB, Scotland & NCCB, Netherlands). We found that combining multiparametric flow cytometry and FACS unveiled key information on the stress response of human pathogens. With the use of flow cytometry, we report for the first time, the phenomenon of DNAdh in Acinetobacter baylyi, an important nosocomial pathogen in humans. We forecast that DNAdh offers multilayer defense for human pathogens under stress. Furthermore, our strategies offer platform for disclosing genetic pathway(s) of dormancy and DNAdh, for the possible design of new generation of drugs and antimicrobials.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}