The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Functional region identification is of fundamental importance for protein sequences analysis for a protein family. Such knowledge not only provides a better scientific understanding but also assists drug discovery. Domain annotation is one approach but it needs to leverage existing databases. For de novo discovery, motif discovery locates and aligns locally similar sub-sequences and represents them...
With the number increase of biomedical literatures, biomedical relation extraction discovery from the literature represents a new challenge for researchers in recent years. Then, a system that automatically extracts the related genes to the targeted disease is required. In this paper, we explore text mining and pattern clustering for relation extraction of breast cancer and related genes. It can be...
The concept of internet finance has attracted increasing attention in recent years. As a result, more and more online peer-to-peer (P2P) lending platforms have been established at home and abroad. It is actually meaningful to predict investment amounts of online lenders in the following period. In this paper, we propose a Hybrid Investment Prediction Model (HIPM), an effective non-linear prediction...
Cyberbullying is an activity of sending threatening messages to insult person. To prevent cyber victimization from the activity is challenging. This paper enhanced the Naïve Bayes classifier for extracting the words and examining loaded pattern clustering. The algorithm included two main methods: (1) creating partitions by iteratively relocating from entire datasets into clusters using k-mean clustering...
Face detection has become a hot topic in the field of pattern recognition and computer vision. This paper proposed an improved spatial pattern clustering algorithm, each pixel in a color image will be taken as a pattern which implies not only its feature value but its spatial information. So, the clustering of all pixels of an image is converted to the clustering of the corresponding patterns. The...
Recently, with wide use of computer systems, internet, and rapid growth of computer networks, the problem of intrusion detection in network security has become an important issue of concern. In this regard, various intrusion detection systems have been developed for using misuse detection and anomaly detection methodologies. These systems try to improve detection rates of variation in attack types...
According to increase of multimedia applications such as video surveillance and environment monitoring in Wireless Multimedia Sensor Networks (WMSN), energy conservation and prolonging network lifetime become increasingly important. Therefore, energy conservation and maximization of system lifetime are commonly recognized as a key challenge in the design and implementation of WMSNs. In these networks,...
Many research topics in recent years have focused on clustering algorithms as a scalable routing protocol in wireless sensor networks. In these algorithms, by the use of data aggregation techniques and reduction in sensors that should make long distance communications, energy consumption in total network lifetime is decreased. One of algorithms proposed in this field is DECSA. Aiming at the problem...
Advances in the fields of communication technology and software, electrical and mechanical engineering enable the replacement of a single robot by cooperative robotic team in highly demanding applications, such as search and rescue. A robotic team could perform better than a single robot, if certain challenges, such as action planning, coordination, and decision making, are successfully tackled. One...
Wireless sensor network is one of the most promising technology in wireless network. To design a sensor network, improving the lifetime of sensor node is critical issue. For these reason researchers in these field pay great attention to Medium Access Control (MAC) protocol. As most of the nodes are placed in remote and hazardous area, so when the power is down it is difficult to recharge them or it...
Energy proficiency is an essential feature to intend an extensive existence wireless sensor network. More than a few methods have been proposed to boost the battery lifetime of sensor nodes. One of the methods is clustering approach which consists of two ways: selecting cluster heads with more residual energy and rotating cluster heads periodically from cluster to cluster thus extends the network...
Several industries are using legacy softwares, developed with Structured Programming (SP) approach, that should be migrated to Object Oriented Paradigm (OOP) for ensuring better software quality parameters like modularity, manageability and extendability. Automating SP to OOP migration is pivotal as it could reduce time that take in the manual process. Given this potential benefit, the issue is yet...
This paper presents a learning algorithm for adaptive network intrusion detection based on clustering and naïve Bayesian classifier, which induces a hybridization of unsupervised and supervised learning processes. The proposed approach scales up the balance detection rates for different types of network intrusions, and keeps the false positives at acceptable level in network intrusion detection....
Discovering protein patterns for amino acids and their biochemical properties is important for revealing the underlying biophysical models. From this, pattern clustering was introduced in order to relate the discovered protein patterns to taxonomic classes in a localized region of a protein. This paper proposes an algorithm to synthesize and re-group pattern clusters, maximizing their separability...
Electrical load pattern clustering provides useful information on how to partition the customers on the basis of the shape of their actual consumption. The results of the clustering procedure are then used to group the customers into classes by identifying a suitable set of attributes describing each class in a non-overlapping way. Starting from an initial set of centroids, it is possible to construct...
The existence of outliers is a major factor of inaccuracy in cancer gene expression microarray-based experiments. Researchers confirm that in many cases outliers in one class in cancer microarray based-experiments are contaminated. As a result, outliers appear to have gene expression similar to samples of an existing class in the dataset. Hence, it is essential to analyze each class in the dataset...
Ad hoc networks consist of a set of identical nodes that move freely and independently and communicate with other node via wireless links. Such networks may be logically represented as a set of clusters by grouping together nodes that are in close proximity with one another. Clusterheads form a virtual backbone and may be used to route packets for nodes in their cluster. In this paper, a routing scheme...
SaaS is a revolutionary software service mode and it changes the relations of software developer and customer entirely. In this paper, we introduce a model for service clustering based on feature label. We discuss the steps which should be conducted in a generic clustering algorithm, and present hierarchical clustering algorithm to conduct the clustering operation. We also present a case study to...
There are many factors affect the stability of reservoir slopes, each of them is associated and coupled with others. Generally, the analysis of slopes stability can be achieved by the method of effect-factors analogy and cluster analysis. Traditional cluster analysis is difficult to obtain the stable global optimal solution, since the results are sensitive to the initial cluster center and the order...
In 2010, we proposed the improved unsupervised possibilistic clustering algorithm (IUPC) that can be run as an unsupervised clustering and overcome the weakness of the unsupervised possibilistic clustering algorithm (UPC) that it tends to generate coincident clusters. IUPC inherits the merits of UPC. In the meanwhile, IUPC solves the coincident clusters problem of UPC by limiting the feasible regions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.