• Title/Summary/Keyword: Boolean

Search Result 514, Processing Time 0.024 seconds

PubMine: An Ontology-Based Text Mining System for Deducing Relationships among Biological Entities

  • Kim, Tae-Kyung;Oh, Jeong-Su;Ko, Gun-Hwan;Cho, Wan-Sup;Hou, Bo-Kyeng;Lee, Sang-Hyuk
    • Interdisciplinary Bio Central
    • /
    • v.3 no.2
    • /
    • pp.7.1-7.6
    • /
    • 2011
  • Background: Published manuscripts are the main source of biological knowledge. Since the manual examination is almost impossible due to the huge volume of literature data (approximately 19 million abstracts in PubMed), intelligent text mining systems are of great utility for knowledge discovery. However, most of current text mining tools have limited applicability because of i) providing abstract-based search rather than sentence-based search, ii) improper use or lack of ontology terms, iii) the design to be used for specific subjects, or iv) slow response time that hampers web services and real time applications. Results: We introduce an advanced text mining system called PubMine that supports intelligent knowledge discovery based on diverse bio-ontologies. PubMine improves query accuracy and flexibility with advanced search capabilities of fuzzy search, wildcard search, proximity search, range search, and the Boolean combinations. Furthermore, PubMine allows users to extract multi-dimensional relationships between genes, diseases, and chemical compounds by using OLAP (On-Line Analytical Processing) techniques. The HUGO gene symbols and the MeSH ontology for diseases, chemical compounds, and anatomy have been included in the current version of PubMine, which is freely available at http://pubmine.kobic.re.kr. Conclusions: PubMine is a unique bio-text mining system that provides flexible searches and analysis of biological entity relationships. We believe that PubMine would serve as a key bioinformatics utility due to its rapid response to enable web services for community and to the flexibility to accommodate general ontology.

A Study on the Search Interface of Archival Databases in Korea: With a Focus on Search Functions (고서목록 데이터베이스의 검색 인터페이스에 관한 연구 - 검색 기능을 중심으로 -)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.2
    • /
    • pp.257-276
    • /
    • 2011
  • The purpose of this study is to compare and analyze the functions and characteristics of search interfaces of Korean Old and Rare Collection Information System(KORCIS) and Korean History Online. The checklist of OPAC functionalities proposed by Breeding was used to examine eleven functions of these systems. Both system provide the following functions: Search by keywords; Boolean operators in queries; Order results chronologically; Modify search without re-keying the initial terms ; Search within result sets ; and Ability to limit results to an individual library or education. They do not provide such functions as Browse by author, title, subject and View and recall the search history for the current session. Adoption of standard OPAC and next-generation catalog functionalities, in-depth understanding of user needs and information seeking behaviors, and the improvement of subject access to these systems are suggested in this study.

A Web-based Conversational Agent (웹기반 대화형 에이전트)

  • 이승익;오성배
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.530-540
    • /
    • 2003
  • As the amount of information on Internet sites increases, it becomes more necessary to provide information in efficient ways. However, information search methods based on Boolean combination of keywords that most sites provide are difficult to express user's intention adequately so that there are numerous unexpected search results. This paper proposes a conversational agent that provides users with accurate information in a friendly manner through natural language conversation. The agent recognizes user's intention by applying finite state automata to natural language queries, utilizes the intention for structured pattern matching with response knowledge, and thus provides answers that are robust against changes in word order and consistent with the user's intention. To show its practical utility, the agent is applied to the problem of introducing a Web site. The results show that the conversational agent has the ability to provide accurate and friendly responses.

Incremental Techniques for Timing Analysis Considering Timing and Circuit Structure Changes (지연시간과 회로 구조 변화를 고려한 증가적 타이밍 분석)

  • O, Jang-Uk;Han, Chang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2204-2212
    • /
    • 1999
  • In this paper, we present techniques which perform incremental timing analysis using Timed Boolean Algebra that solves the false path problem and extracts the timing information in combinational circuits. Our algorithm sets histories of internal inputs that are substituted for internal output and extracts maximal delays through checking sensitizability of primary outputs. Once finding the sum of primitive delay terms, then it applies modified delay with referencing histories of primary output and it can extract maximal delays of primary outputs fast and efficiently. When the structure of circuit is changed, there is no need to compute the whole circuit again. We can process partial timing analysis of computing on the gates that are need to compute again. These incremental timing analysis methods are considered both delay changes and structure of circuit, and can reduce the costs of a trial error in the circuit design.

  • PDF

A Study on Query Refinement by Online Relevance Feedback in an Information Filtering System (온라인 이용자 피드백을 사용한 정보필터링 시스템의 수정질의 최적화에 관한 연구)

  • Choi, Kwang;Chung, Young-Mee
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.23-48
    • /
    • 2003
  • In this study an information filtering system was implemented and a series of relevance feedback experiments were conducted using the system. For the relevance feedback, the original queries were searched against the database and the results were reviewed by the researchers. Based on users' online relevance judgements a pair of 17 refined queries were generated using two methods called 'co-occurrence exclusion method' and 'lower frequencies exclusion method,' In order to generate them, the original queries, the descriptors and category codes appeared in either relevant or irrelevant document sets were applied as elements. Users' relevance judgments on the search results of the refined queries were compared and analyzed against those of the original queries.

Simplification of Boundary Representation Models Based on Stepwise Volume Decomposition (단계적 볼륨분해에 기반한 경계표현 모델의 단순화)

  • Kim, Byung Chul;Mun, Duhwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.10
    • /
    • pp.1305-1313
    • /
    • 2013
  • In this study, a method to apply feature-based simplification to boundary representation models is proposed. For feature-based simplification, a volume decomposition tree is created from a boundary representation model. The volume decomposition tree is represented by regularized Boolean operations of additive volumes, subtractive volumes, and fillet/round/chamfer volumes, and it is generated by stepwise volume decomposition, which consists of fillet/round/chamfer decomposition, wrap-around decomposition, volume split decomposition, and cell-based decomposition. After the volume decomposition tree is transformed to an infix expression, the CAD model can be simplified by reordering the volumes. To verify the proposed method, a prototype system was implemented, and experiments on test cases were conducted. From the results of the experiments, it is verified that the proposed method is useful for simplifying CAD models based on boundary representation.

Dynamic Behavior of Regulatory Elements in the Hierarchical Regulatory Network of Various Carbon Sources-Grown Escherichia coli

  • Lee, Sung-Gun;Hwang, Kyu-Suk;Kim, Cheol-Min
    • Journal of Microbiology and Biotechnology
    • /
    • v.15 no.3
    • /
    • pp.551-559
    • /
    • 2005
  • The recent rapid increase in genomic data related to many microorganisms and the development of computational tools to accurately analyze large amounts of data have enabled us to design several kinds of simulation approaches for the complex behaviors of cells. Among these approaches, dFBA (dynamic flux balance analysis), which utilizes FBA, differential equations, and regulatory events, has correctly predicted cellular behaviors under given environmental conditions. However, until now, dFBA has centered on substrate concentration, cell growth, and gene on/off, but a detailed hierarchical structure of a regulatory network has not been taken into account. The use of Boolean rules for regulatory events in dFBA has limited the representation of interactions between specific regulatory proteins and genes and the whole transcriptional regulation mechanism with environmental change. In this paper, we adopted the operon as the basic structure, constructed a hierarchical structure for a regulatory network with defined fundamental symbols, and introduced a weight between symbols in order to solve the above problems. Finally, the total control mechanism of regulatory elements (operons, genes, effectors, etc.) with time was simulated through the linkage of dFBA with regulatory network modeling. The lac operon, trp operon, and tna operon in the central metabolic network of E. coli were chosen as the basic models for control patterns. The suggested modeling method in this study can be adopted as a basic framework to describe other transcriptional regulations, and provide biologists and engineers with useful information on transcriptional regulation mechanisms under extracellular environmental change.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.

Study on Quantification Method Based on Monte Carlo Sampling for Multiunit Probabilistic Safety Assessment Models

  • Oh, Kyemin;Han, Sang Hoon;Park, Jin Hee;Lim, Ho-Gon;Yang, Joon Eon;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.4
    • /
    • pp.710-720
    • /
    • 2017
  • In Korea, many nuclear power plants operate at a single site based on geographical characteristics, but the population density near the sites is higher than that in other countries. Thus, multiunit accidents are a more important consideration than in other countries and should be addressed appropriately. Currently, there are many issues related to a multiunit probabilistic safety assessment (PSA). One of them is the quantification of a multiunit PSA model. A traditional PSA uses a Boolean manipulation of the fault tree in terms of the minimal cut set. However, such methods have some limitations when rare event approximations cannot be used effectively or a very small truncation limit should be applied to identify accident sequence combinations for a multiunit site. In particular, it is well known that seismic risk in terms of core damage frequency can be overestimated because there are many events that have a high failure probability. In this study, we propose a quantification method based on a Monte Carlo approach for a multiunit PSA model. This method can consider all possible accident sequence combinations in a multiunit site and calculate a more exact value for events that have a high failure probability. An example model for six identical units at a site was also developed and quantified to confirm the applicability of the proposed method.

An Efficient CPLD Technology Mapping considering Area and the Time Constraint (시간 제약 조건과 면적을 고려한 효율적인 CPLD 기술 매핑)

  • Kim Jae-Jin;Lee Kwan-Houng
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.11-18
    • /
    • 2005
  • In this paper, we propose a new technology mapping algorithm for CPLD consider area under time constraint. This algorithm detect feedbacks from boolean networks, then variables that have feedback are replaced to temporary variables. Creating the temporary variables transform sequential circuit to combinational circuit. The transformed circuits are represented to DAG. After traversing all nodes in DAG, the nodes that have output edges more than two are replicated and reconstructed to fanout free tree. Using time constraints and delay time of device, the number of graph partitionable multi-level is decided. Several nodes in partitioned clusters are merged by collapsing, and are fitted to the number of OR-terms in a given CLB by bin packing. Proposed algorithm have been applied to MCNC logic synthesis benchmark circuits, and have reduced the number of CLBs by $62.2\%$ than those of DDMAP. And reduced the number of CLBs by $17.6\%$ than those of TEMPLA.

  • PDF