Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from...
详细信息
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from very large real world database. These databases contain potential gold mine of valuable information, but it is beyond human ability to analyze massive amount of data and elicit meaningful patterns by using conventional techniques. In this study, DNA sequence was analyzed to locate promoter which is a regulatory region of DNA located upstream of a gene, providing a control point for regulated gene transcription. In this study, some supervised learning algorithms such as artificial neural network (ANN), RULES-3 and newly developed keREM rule induction algorithm were used to analyse to DNA sequence. In the experiments different option of keREM, RULES-3 and ANN were used, and according to the empirical comparisons, the algorithms appeared to be comparable to well-known algorithms in terms of the accuracy of the extracted rule in classifying unseen data.
Accelerators such as graphics processing units (GPUs) provide an inexpensive way of improving the performance of cluster systems. In such an arrangement, the individual nodes of the cluster are directly connected to o...
详细信息
This paper presents a study on a class of algorithms based on Uniform Theory of Diffraction (UTD) for multiple diffractions. S-UTD-CH model can be used for fast and more accurate field prediction for multiple diffract...
详细信息
This paper presents a study on a class of algorithms based on Uniform Theory of Diffraction (UTD) for multiple diffractions. S-UTD-CH model can be used for fast and more accurate field prediction for multiple diffractions in transition zone. An extensive simulation results for comparison of UTD based algorithms with respect to the computation time and accuracy was provided.
Liver is a vital organ of a body that has numerous functions. Severe malfunctioning of these functions causes a liver necrosis. The diagnosis of this necrosis is performed by a specialist who uses appropriate microsco...
详细信息
Liver is a vital organ of a body that has numerous functions. Severe malfunctioning of these functions causes a liver necrosis. The diagnosis of this necrosis is performed by a specialist who uses appropriate microscopic analysis. However, because this analysis is based on specialist's opinion, the results could be subjective and error prone. The aim of this study is to quantify the hepatic necrotic areas using computer aided algorithms and provide quantitative results that are not prone to errors.
In order to use electronic systems comprising of software and hardware components in safety related and high safety related applications, it is necessary to meet the Marginal risk numbers required by standards and leg...
In order to use electronic systems comprising of software and hardware components in safety related and high safety related applications, it is necessary to meet the Marginal risk numbers required by standards and legislative provisions. Existing processes and mathematical models are used to verify the risk numbers. On the hardware side, various accepted mathematical models, processes, and methods exist to provide the required proof. To this day, however, there are no closed models or mathematical procedures known that allow for a dependable prediction of software reliability. This work presents a method that makes a prognosis on the residual critical error number in software. Conventional models lack this ability and right now, there are no methods that forecast critical errors. The new method will show that an estimate of the residual error number of critical errors in software systems is possible by using a combination of prediction models, a ratio of critical errors, and the total error number. Subsequently, the critical expected value-function at any point in time can be derived from the new solution method, provided the detection rate has been calculated using an appropriate estimation method. Also, the presented method makes it possible to make an estimate on the critical failure rate. The approach is modelled on a real process and therefore describes two essential processes - detection and correction process.
Due to the complexity of microprocessor, an efficient testing is a crucial point and serious challenge in safety systems. A new instruction opcode for ALU based Built-In-Test (BIT) is proposed in this paper. With this...
Due to the complexity of microprocessor, an efficient testing is a crucial point and serious challenge in safety systems. A new instruction opcode for ALU based Built-In-Test (BIT) is proposed in this paper. With this novel method stuck-at-fault in Multiplexer (MUX) for Arithmetic Logic Unit (ALU) can be determined. A model that consists of the command and faulty states is developed. According to the designed state model, an algorithm and pseudo program that tests the stuck-at-fault in MUX is implemented and described in this paper.
When dealing with complex systems design and application the notion of ontologies helps the process of application integration. To solve the problems with discover, interpret and reuse data we have to recognize ontolo...
详细信息
A data security and validation framework of a SOA based system for management, storage, processing and visualization of data obtained from scientific experiments is proposed in this paper. The framework covers the thr...
详细信息
The purpose of the automatic conversion of scientific data into canonical format is to provide a link between raw representation of data and database schemas. On the basis of these concepts Web services are developed ...
详细信息
暂无评论