The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microarrays are a powerful tool in studying genes expressions under several conditions. The obtained data need to be analyzed using data mining methods. Biclustering is a data mining method which consists in simultaneous clustering of rows and columns in a data matrix. Using biclustering, we can extract genes that have similar behavior (co-express) under specific conditions. These genes may share...
To better protect the security of information, this paper proposed an information transmission scheme which combined the cryptosystem and information hiding. The scheme pretreated the information firstly by making use of the RSA arithmetic which belongs to the public key cryptosystem, and then took advantage of the improved LSB which based on the Human Visual System to make the cryptograph hid in...
Selective attention in the human visual system is performed as the way that humans focus on the most important parts when observing a visual scene. Many bottom-up computational models of visual attention have been devised to get the saliency map for an image, which are data-driven or task-independent. However, studies show that the task-driven or top-down mechanism also plays an important role during...
This article introduce the time sequence mining method. The method is practically used to analyze the classical book circulating data of the Library of Harbin Institute of Technology. Th rules of classical books borrowing and returning are found and the circulation trend in one day and one year are showed. And then the result of data mining is analyzed. Some scientific suggestions about the circulation...
This research presents a system that provides useful information by data mining. The system collects human motions to process data mining, and uses the result to detect human intention, and then provide service. The system includes three parts: the input devices part that is to collect data, the server part that is to analyze and process the data mining, and the client part that is to provide service...
Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing applications are often interaction transparent, context aware, and experience capture and reuse capable. Interaction transparency means that the human user is not aware...
Global outbreaks of human influenza arise from influenza A viruses with novel Hemagglutinin (HA) molecules to which humans have no immunity. So understanding of the origin and evolution of HA genes is of particular importance. Here, genomic signatures of the HA protein in different hosts was identified and associative classification for host-typing was conducted. We therefore conducted multiple-sequence...
Vertex is a Wrapper Induction system developed at Yahoo! for extracting structured records from template-based Web pages. To operate at Web scale, Vertex employs a host of novel algorithms for (1) Grouping similar structured pages in a Web site, (2) Picking the appropriate sample pages for wrapper inference, (3) Learning XPath-based extraction rules that are robust to variations in site structure,...
In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation...
In order to realize a human-like intuitive communication between human and robot, a robot should understand the human's basic level knowledge which is usually hidden in communication. However, as human's basic level knowledge has been unconsciously built during our development, it is very hard to build the knowledge network as the computational system. In this paper, we propose the approach to build...
This paper presents an approach for recognition of Activities of Daily Living (ADLs) in smart environments. Our approach is based on the frequent pattern mining principle to extract frequent patterns in the datasets collected from different sensors disseminated in a smart environment. In contrast with existing intrusive activity recognition approaches that have been proposed in the literature, where...
Discovering users' whereabouts patterns is important for many emerging ubiquitous computing applications. Life-log systems, advertisement and smart environments are only some of the applications that can be supported by information regarding user patterns and routine behaviors. Latent Dirichlet Allocation (LDA) is a powerful mechanism to extract recurrent behaviors and high-level patterns (called...
The aim of this paper is to present the role of Artificial Intelligence techniques (Expert systems) to enhance reflective e-portfolios quality. Some AI techniques such as the expert system; scheduling; Data Mining can support us to enhance our reflective e-portfolios quality. These tools together will define new intelligent Reflective e-portfolio that provides intelligent and customized learning method...
Summary form only given. The accumulation of biomedical literature makes it increasingly difficult for scientists to keep up with scientific advancements, requiring the development of text mining tools to collect and integrate data in a high-throughput fashion. A major challenge in biomedical text mining is how to recognize genes sensitively and accurately, and translate them to their official gene...
Structural variation (SV) has been reported to be associated with numerous diseases such as cancer. With the advent of next generation sequencing (NGS) technologies, various types of SV can be potentially identified. We propose a model based clustering approach utilizing a set of features defined for each type of SV event. Our method, termed SVMiner, not only provides a probability score for each...
An essential part in the construction of a mental picture of a situation is our ability to represent, assess and judge on the skill and competency level of a player, an agent, or any entity that makes decisions. Augmented with a suitable reasoning framework, this ability would allow us to diagnose the competency level of a player through real-time monitoring of their actions. The first key question...
It is difficult to analyze how human feels deliciousness by seeing served food because many factors affect to judgment of deliciousness. Human recognizes and evaluates deliciousness of the food from many points of view. In this paper, we propose a method to extract the points of view and factors that recognize deliciousness. Images which are reduced resolution to control information of the image were...
This paper proposed an intelligent model that is aimed at facilitating key workers select suitable trainees for a training program. The proposed model is initiated because it has been found that many motivational training programs fail to meet their objectives because there is a mismatch between the needs of training programs and the integrity levels of trainees. The proposed model consists of three...
The government has arranged many programs for teacher development however the training is organized to fit yearly calendar without considering the right teacher for the right training. The selection of teacher to attend training is done randomly, by rotation and not based on their work performance. This paper investigate the weakest integrity trait of teacher using association rule technique with...
Requirements assurance aims to increase confidence in the quality of requirements through independent audit and review. One important and effort intensive activity is assurance of the traceability matrix (TM). In this, determining the correctness and completeness of the many-to-many relationships between functional and non-functional requirements (NFRs) is a particularly tedious and error prone activity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.