Background: Competitions in text mining have been used to measure the performance of automatic text processing solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is time-cons...
详细信息
Background: Competitions in text mining have been used to measure the performance of automatic text processing solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is time-consuming and costly and the final corpus consists at the most of a few thousand documents annotated with a limited set of semantic groups. To overcome these shortcomings, the CALBC project partners (PPs) have produced a large-scale annotated biomedical corpus with four different semantic groups through the harmonisation of annotations from automatic text mining solutions, the first version of the Silver Standard Corpus (SSC-I). The four semantic groups are chemical entities and drugs (CHED), genes and proteins (PRGE), diseases and disorders (DISO) and species (SPE). This corpus has been used for the First CALBC Challenge asking the participants to annotate the corpus with their text processing solutions. Results: All four PPs from the CALBC project and in addition, 12 challenge participants (CPs) contributed annotated data sets for an evaluation against the SSC-I. CPs could ignore the training data and deliver the annotations from their genuine annotation system, or could train a machine-learning approach on the provided pre-annotated data. In general, the performances of the annotation solutions were lower for entities from the categories CHED and PRGE in comparison to the identification of entities categorized as DISO and SPE. The best performance over all semantic groups were achieved from two annotation solutions that have been trained on the SSC-I. The data sets from participants were used to generate the harmonised Silver Standard Corpus II (SSC-II), if the participant did not make use of the annotated data set from the SSC-I for training purposes. The performances of the participants' solutions were again measured against the SSC-II. The performances of the annotation solutions showed again better results for DISO and SPE in comparison to CHED and P
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding m...
详细信息
Background: It has been apparent in the last few years that small non coding RNAs (ncRNA) play a very significant role in biological regulation. Among these microRNAs (miRNAs), 22-23 nucleotide small regulatory RNAs, ...
详细信息
Background: It has been apparent in the last few years that small non coding RNAs (ncRNA) play a very significant role in biological regulation. Among these microRNAs (miRNAs), 22-23 nucleotide small regulatory RNAs, have been a major object of study as these have been found to be involved in some basic biological processes. So far about 706 miRNAs have been identified in humans alone. However, it is expected that there may be many more miRNAs encoded in the human genome. In this report, a "context-sensitive" Hidden Markov Model (CSHMM) to represent miRNA structures has been proposed and tested extensively. We also demonstrate how this model can be used in conjunction with filters as an ab initio method for miRNA identification. Results: The probabilities of the CSHMM model were estimated using known human miRNA sequences. A classifier for miRNAs based on the likelihood score of this "trained" CSHMM was evaluated by: (a) cross-validation estimates using known human sequences, (b) predictions on a dataset of known miRNAs, and (c) prediction on a dataset of non coding RNAs. The CSHMM is compared with two recently developed methods, miPred and CID-miRNA. The results suggest that the CSHMM performs better than these methods. In addition, the CSHMM was used in a pipeline that includes filters that check for the presence of EST matches and the presence of Drosha cutting sites. This pipeline was used to scan and identify potential miRNAs from the human chromosome 19. It was also used to identify novel miRNAs from small RNA sequences of human normal leukocytes obtained by the Deep sequencing (Solexa) methodology. A total of 49 and 308 novel miRNAs were predicted from chromosome 19 and from the small RNA sequences respectively Conclusion: The results suggest that the CSHMM is likely to be a useful tool for miRNA discovery either for analysis of individual sequences or for genome scan. Our pipeline, consisting of a CSHMM and filters to reduce false positives shows promise as
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
Laboratory experiments were conducted to investigate the run-up of internal solitary waves (ISWs) on steep uniform slopes in a two-layered fluid system with a free surface. A 12 m long wave flume, which incorporated a...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student is attentive, drowsy or absent. If teachers can know the student's affective state, they can overcome the difficult. The research applies the image recognition technologies to capture the face images of students when they are learning and analyzes their face features to evaluate the student's affective state by Fuzzy Integral. Finally, teachers can monitor the student's behavior by the detection results on the system interface.
Learner attention affects learning efficiency. However, in many classes, teachers cannot assess the degree of attention of every student. When a teacher is capable of addressing inattentive students immediately, he ca...
详细信息
Learner attention affects learning efficiency. However, in many classes, teachers cannot assess the degree of attention of every student. When a teacher is capable of addressing inattentive students immediately, he can avoid situations in which students are inattentive. Many studies have analyzed student attentiveness by the applying of image detection technologies. If this mechanism can be applied to in-class learning, it will help teachers keep students attentive, and reduce teacher load during class. This study mainly applies fuzzy logic analysis of student facial images when participating in class. Applying fuzzy logic can prevent erroneous judgments associated with a single term, and help teachers deal with student attentiveness.
In this paper, we describe a user-oriented reliability model that addresses extensive web content, including many links, and that simultaneously addresses user dynamic navigation behaviour. Computation time is a probl...
详细信息
General topology has been introduced into the realm of rough sets. In this paper, the topological properties of map on generalized rough approximation space on binary relation are discussed. We point out that a map be...
详细信息
General topology has been introduced into the realm of rough sets. In this paper, the topological properties of map on generalized rough approximation space on binary relation are discussed. We point out that a map between a generalized rough approximation space and a finite set can induce a binary relation on the finite set. If the binary relation is reflective and transitive, then the map is continuous which is regarded as a map on topological space. Furthermore, if the map is bijective, then it is simultaneously open and closed, and image and inverse image of a rough set are rough.
This paper addresses the dynamic location management for personal communication service (PCS) networks with consideration of mobility patterns. The popular hexagonal cellular architecture is considered. In this paper,...
详细信息
暂无评论