Electronic Health Record (EHR) systems offer a structured approach for the collection, storage, retrieval and analysis of patient health data. However, this very emphasis on structure has led to systems that do not fu...
详细信息
ISBN:
(纸本)9780769545745
Electronic Health Record (EHR) systems offer a structured approach for the collection, storage, retrieval and analysis of patient health data. However, this very emphasis on structure has led to systems that do not fully capture the rich insights present in the narratives that clinicians create and use to document patient 'stories'. We propose a solution of visually representing patient health data centered around the medical problem faced by the patient and augmented by interactivity. We focus on how patients' medical data could be represented such that it facilitates the discovery of insights and understanding of the patient's case that narratives bring to clinicians.
Gene expression and in vivo DNA binding data provide important information for understanding gene regulatory networks: in vivo DNA binding data indicate genomic regions where transcription factors are bound, and expre...
详细信息
ISBN:
(纸本)9780769545745
Gene expression and in vivo DNA binding data provide important information for understanding gene regulatory networks: in vivo DNA binding data indicate genomic regions where transcription factors are bound, and expression data show the output resulting from this binding. Thus, there must be functional relationships between these two types of data. While visualization and dataanalysis tools exist for each data type alone, there is a lack of tools that can easily explore the relationship between them. We propose an approach that uses the average expression driven by multiple of cis-control regions to visually relate gene expression and in vivo DNA binding data. We demonstrate the utility of this tool with examples from the network controlling early Drosophila development. The results obtained support the idea that the level of occupancy of a transcription factor on DNA strongly determines the degree to which the factor regulates a target gene, and in some cases also controls whether the regulation is positive or negative.
The epigenome, such as nucleosome structure and DNA methylation, regulates expression of genes. Searching for evolutionarily conserved sequence motifs essential for controlling the epigenome is a fundamental problem i...
详细信息
Structural Health Monitoring (SHM) analysis has been carried out in various research projects to detect structural problems, thereby providing an early indication of physical damage. SHM analysis is carried out by app...
详细信息
ISBN:
(纸本)9781880843833
Structural Health Monitoring (SHM) analysis has been carried out in various research projects to detect structural problems, thereby providing an early indication of physical damage. SHM analysis is carried out by applying machine learning techniques to analyze structural health data. Unfortunately, most of the results of this analysis are illustrated using 2D graphs. Interpretation of these 2D graphs to gain more insight on the structural problems can be tedious. In this paper, we present a virtual reality (VR) based technique to provide visualization for SHM analysis. Our VR application is developed using popular VR software called DFusion. DFusion provides a programming environment for visualizing SHM analyses. visualization is rendered using off-the-shelf or custom designed 2D/3D objects. Performance evaluation of our software demonstrates the advantage offered by DFusion for SHM analyses.
In this paper, a new data mining method is proposed on the basis of parallel coordinate for early warning of landslides. Landslides have resulted in many severe casualties and damaged structures and facilities. The pr...
详细信息
For a clearer demonstration of the morphological characteristics of an individual Mongolian Scots Pine in its plantation and more supports for teaching as well as research, in this study, the system analysis principle...
详细信息
As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of pres...
详细信息
ISBN:
(纸本)9780769545769
As advancement of information society, information leakages grow into a serious problem. It is important for security managers to analysis log-files for finding out cause of leakages promptly. Existing methods of presenting log-files take the method of ordering them in time. It makes easy to understand a flow of operations. However, if a log recording an incorrect operation is included in the back of log-file, finding out it may drop back. To address this problem, this paper presents visualization system for log analysis with probabilities of incorrect operation. Incorrect operations are operations that may cause a security incident. Probabilities of incorrect operation are set up by rate of number of incorrect operations in past log-files. Security analysts set order of priority, and logs are sorted. Also, we introduce Visualize Part to help security analysts understand a flow of operations in spite of not ordering logs in time. We aim to contribute speedy security analyses by combine visualizing log-file with probabilities of incorrect operation. To evaluate our proposal, accuracy and efficiency are measured by user experiment. Our proposal tool was compared with the tool without probabilities of incorrect operation. As the result, in terms of accuracy, there are no significant difference between. However, our proposal demonstrate a 39.5% improved efficiency.
Many-valued Galois connection reflects on the similarity between attribute values in a many-valued context. In this work we apply many-valued formal concept analysis for answering queries when some of the initial data...
详细信息
ISBN:
(纸本)9783642237331;9783642237348
Many-valued Galois connection reflects on the similarity between attribute values in a many-valued context. In this work we apply many-valued formal concept analysis for answering queries when some of the initial data is available in text form and another part in with crisp values.
This paper proposes a new approach to validating and visualising cluster structure by combining fuzzy membership functions and spectral clustering. By modifying the Visual Cluster Validity algorithm (VCV) to use an ex...
详细信息
ISBN:
(纸本)9781612849720
This paper proposes a new approach to validating and visualising cluster structure by combining fuzzy membership functions and spectral clustering. By modifying the Visual Cluster Validity algorithm (VCV) to use an external fuzzy membership function as the distance measure and using sum of cluster membership as the sorting function, computational experiments on both the Zelnik-Manor synthetic and UCI real datasets show the proposed method, SpecVCMV, more clearly identifies the underlying cluster structure in the data.
In this paper, we design and implement a reliable data processing and analysis test bed (NESCTB) for wireless sensor networks (WSNs). It contains 36 wireless sensor nodes connected through Ethernet to a central server...
详细信息
暂无评论