Bioinformatics is a field of biology merging with few other sciences like information technology and statistics which involves in the discovery of new tools for data analysis and interpretation of accurate result. Som...
详细信息
ISBN:
(纸本)9781605583518
Bioinformatics is a field of biology merging with few other sciences like information technology and statistics which involves in the discovery of new tools for data analysis and interpretation of accurate result. Some of the areas in which bioinformatics is applicable are in disease identification, drug discovery, DNA sequence analysis and structural analysis. There are various tools that have been developed in text mining, in the area of bioinformatics in various analysis processes like sequence analysis, functional analysis, structural analysis and similarity analysis. Performance is a key factor in utilization of existing tools or in the development of new tools which could be evaluated by means of comparison of feature or by means of evaluating metrics. Metrics based assessment is made on developed products because it qualifies the characteristics of a product like precision, recall, information retrieval. The merit that we are discovering by evaluating the existing products, leads us in the development of new products by avoiding the pitfalls of the existing products. This work describes the standard procedure for evaluating text mining tools in bioinformatics based on (1) features, functionalities and (2) performance metrics. The metrics set that have been used here are involved in the performance evaluation of text mining tools like error rate, ontological improvement are specified with detailed result analysis. The results observed during this evaluation made on the specified tools have made an indication for having a standard development cum evaluation of text mining based bioinformatics tools. Copyright 2009 ACM.
As communication systems become more and more complex and integrate an increasing variety of different types of systems and devices, an important aim of pervasive systems is to provide users with more control over the...
详细信息
ISBN:
(纸本)9780889867901
As communication systems become more and more complex and integrate an increasing variety of different types of systems and devices, an important aim of pervasive systems is to provide users with more control over the delivery of different forms of communications. Simple forms of user control already exist in some systems, and work is ongoing to develop more sophisticated systems. Daidalos and Persist are two European research projects aimed at developing pervasive systems. In the process one aspect that has been investigated is the user control over communications in a general context-aware pervasive system. This paper outlines a general model developed to describe the processes, which was used as the basis of the implemented system in Daidalos. This model is being studied further in the Persist project.
This book constitutes the refereed proceedings of the 24th IFIP TC 11 international Information Security conference, SEC 2009, held in Pafos, Cyprus, in May 2009. The38 revised full papers presented were carefully rev...
ISBN:
(数字)9783642012440
ISBN:
(纸本)9783642012433
This book constitutes the refereed proceedings of the 24th IFIP TC 11 international Information Security conference, SEC 2009, held in Pafos, Cyprus, in May 2009. The38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, trusted computing, security policies, validation, verification and evaluation, privacy protection and security assessment, role mining and content protection, security protocols, access control, and internet and Web applications security.
Despite the recent advances in the area of Business Process Management (BPM), today's business processes have largely been implemented without clearly defined conceptual modeling. This results in growing difficult...
详细信息
ISBN:
(纸本)9783642033537
Despite the recent advances in the area of Business Process Management (BPM), today's business processes have largely been implemented without clearly defined conceptual modeling. This results in growing difficulties for identification, maintenance, and reuse of rules, processes, and control-flow patterns. To mitigate these problems in future implementations, we propose a new approach to business process modeling using conceptual schemas, which represent hierarchies of concepts for rules and processes shared among collaborating information systems. This methodology bridges the gap between conceptual model description and identification of actual control-flow patterns for workflow implementation. We identify modeling guidelines that are characterized by clear phase separation, step-by-step execution, and process building through diagrams and tables. The separation of business process modeling in seven mutually exclusive phases clearly delimits information technology from business expertise. The sequential execution of these phases leads to the step-by-step creation of complex control-flow graphs. The process model is refined through intuitive table and diagram generation in each phase. Not only does the rigorous application of our modeling framework minimize the impact of rule and process changes, but it also facilitates the identification and maintenance of control-flow patterns in BPM-based information system architectures.
A photochemical reaction is initiated by a charge separation process in the reaction center (RC) complex. Major research in this regard is to analyze the light driven electron transfer and to study the response of the...
详细信息
Whenever a mobile node moves across different networks, service disruption occurs thus making mobility management a key issue. In order to ensure the continuity of TCP session between communicating nodes, a number of ...
详细信息
ISBN:
(纸本)9781605586595
Whenever a mobile node moves across different networks, service disruption occurs thus making mobility management a key issue. In order to ensure the continuity of TCP session between communicating nodes, a number of protocols have been proposed so far. These protocols may be classified into two main categories: end-to-end and network-centric. As end-to-end mobility management protocols do not require additional entities in the network and no additional deployment cost is involved, that makes deployment of these protocols network operator independent. Due to these reasons end-to-end mobility management protocols are gaining popularity. However, performance evaluation of these end-to-end protocols on the basis of service disruption time has not been discussed so far. This paper analyzes these protocols on the basis of service disruption time using mathematical modeling techniques of performance evaluation. Results show that service disruption time of protocols that allow simultaneous communication through multiple interfaces is always smaller than the protocols that do not allow simultaneous communication. Copyright 2009 ACM.
In this paper, a mathematical model has been developed for cellular wireless network with Gamma inter-arrivals and general call holding times. Measurement based studies have shown that Poisson assumption averages out ...
详细信息
In this paper, a mathematical model has been developed for cellular wireless network with Gamma inter-arrivals and general call holding times. Measurement based studies have shown that Poisson assumption averages out the traffic characteristics to a single parameter (i.e. average rate) which does not represent the real dynamics involved in the process. The actual traffic pattern in the next generation cellular wireless networks is more complex for the presence of multiple services. This work evaluates the QoS parameters from a more pragmatic model for future cellular wireless networks.
The rise in peer-to-peer (P2P) networking has been tremendous in last several years;a large amount of network bandwidth backbone is consumed by P2P traffic. Although many methods have been proposed to manage P2P traff...
详细信息
In this paper Berkeley wavelet transform (BWT) based watermarking is described. BWT is a two-dimensional triadic wavelet transform. In order to achieve copyright protection, the proposed scheme embeds watermark into h...
详细信息
In this paper Berkeley wavelet transform (BWT) based watermarking is described. BWT is a two-dimensional triadic wavelet transform. In order to achieve copyright protection, the proposed scheme embeds watermark into host image. The efficiency of the watermarking scheme is supported with the help of experimental results.
As the technology of mobile sensors advances, mobility control becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mob...
详细信息
As the technology of mobile sensors advances, mobility control becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mobile sensors to optimal positions to minimize energy consumption for communication. We identify a unique privacy issue in mobility control protocols that discloses the physical location of the sink node to intruders in WSNs. To protect the sink node, we propose a new privacy preserving scheme to secure mobility control protocols against attacks that locate and sabotage the sink node. The privacy preserving scheme obfuscates the sink location with dummy sink nodes. Analysis shows that the scheme can effectively hide the sink location via anonymity. The scheme can also be easily integrated into current mobility control protocols without raising much additional overhead. The performance simulation and analysis show that, with the sink node well-protected, mobility control protocols achieve similar performance as original protocols.
暂无评论