• Title/Summary/Keyword: Combined dataset

Search Result 158, Processing Time 0.027 seconds

Intraspecific Molecular Phylogeny, Genetic Variation and Phylogeography of Reticulitermes speratus (Isoptera:Rhinotermitidae)

  • Park, Yung Chul;Kitade, Osamu;Schwarz, Michael;Kim, Joo Pil;Kim, Won
    • Molecules and Cells
    • /
    • v.21 no.1
    • /
    • pp.89-103
    • /
    • 2006
  • Population structure was investigated in Reticulitermes speratus populations in the Korean Peninsula and the Japanese Archipelago. All trees derived from analyses of the combined sequence dataset of two mitochondrial genes, COII and COIII, showed that R. speratus populations cluster into two major clades comprising the Korean/southern Japanese populations and the northern Japanese populations. Analysis of population genetic structure showed strong genetic partitioning between populations of the two clades. To understand historical migration routes and current distributions, the phylogeographic history of R. speratus was inferred from intra-/interspecific phylogeny and divergence times estimated between the clades of the phylogenetic tree. The estimated migration route and divergence time of ancestral R. speratus are congruent with recent paleogeographic hypotheses involving land-bridge connections between the Asian continent and the Japanese Archipelago. We suggest that ancestral R. speratus separated into northern and southern Japanese populations after its migration into the Japanese main islands from East China during the early Pleistocene via the East China Sea basin, which may have been exposed during that period. The Korean populations seem to have diverged recently from southern Japanese populations; this may explain the current distribution of R. speratus in the Japanese Arachipelago, and account for why it is restricted to northern areas of the Tokara Strait.

Improved Classification of Cancerous Histopathology Images using Color Channel Separation and Deep Learning

  • Gupta, Rachit Kumar;Manhas, Jatinder
    • Journal of Multimedia Information System
    • /
    • v.8 no.3
    • /
    • pp.175-182
    • /
    • 2021
  • Oral cancer is ranked second most diagnosed cancer among Indian population and ranked sixth all around the world. Oral cancer is one of the deadliest cancers with high mortality rate and very less 5-year survival rates even after treatment. It becomes necessary to detect oral malignancies as early as possible so that timely treatment may be given to patient and increase the survival chances. In recent years deep learning based frameworks have been proposed by many researchers that can detect malignancies from medical images. In this paper we have proposed a deep learning-based framework which detects oral cancer from histopathology images very efficiently. We have designed our model to split the color channels and extract deep features from these individual channels rather than single combined channel with the help of Efficient NET B3. These features from different channels are fused by using feature fusion module designed as a layer and placed before dense layers of Efficient NET. The experiments were performed on our own dataset collected from hospitals. We also performed experiments of BreakHis, and ICML datasets to evaluate our model. The results produced by our model are very good as compared to previously reported results.

Leak flow prediction during loss of coolant accidents using deep fuzzy neural networks

  • Park, Ji Hun;An, Ye Ji;Yoo, Kwae Hwan;Na, Man Gyun
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2547-2555
    • /
    • 2021
  • The frequency of reactor coolant leakage is expected to increase over the lifetime of a nuclear power plant owing to degradation mechanisms, such as flow-acceleration corrosion and stress corrosion cracking. When loss of coolant accidents (LOCAs) occur, several parameters change rapidly depending on the size and location of the cracks. In this study, leak flow during LOCAs is predicted using a deep fuzzy neural network (DFNN) model. The DFNN model is based on fuzzy neural network (FNN) modules and has a structure where the FNN modules are sequentially connected. Because the DFNN model is based on the FNN modules, the performance factors are the number of FNN modules and the parameters of the FNN module. These parameters are determined by a least-squares method combined with a genetic algorithm; the number of FNN modules is determined automatically by cross checking a fitness function using the verification dataset output to prevent an overfitting problem. To acquire the data of LOCAs, an optimized power reactor-1000 was simulated using a modular accident analysis program code. The predicted results of the DFNN model are found to be superior to those predicted in previous works. The leak flow prediction results obtained in this study will be useful to check the core integrity in nuclear power plant during LOCAs. This information is also expected to reduce the workload of the operators.

On a New Index for Research Assessment

  • Farid, Farid O.
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.56-75
    • /
    • 2021
  • We introduce a new research assessment measure, called the research excellence index. The measure, which we denote by RE-index, accurately assesses the research performance of a researcher. The methodology used in deriving the RE-index tackles many of the flaws of popular research performance indicators such as publication counts, citation counts, and the h and g indices. A dataset is introduced, which takes advantage of the wide coverage of Scopus and the Library of Congress, and, at the same time, deals with the Scopus database depth problem. For an academic publication x, a prestige-type and length scores are assigned, and if x is published in an academic periodical publication J, the stature of J is identified through a quartile score. The three scores are used to assign a value score to every academic publication, and cited academic publications are given citation scores that encompass both cases of including and excluding self-citations. The foregoing scores are used to derive another set of scores measuring the combined qualitative and quantitative aspects of the creative work, citations of creative work, informative work and citations of informative work of a researcher. The scores take into consideration co-authorship. From these scores, two versions of the RE-index for a researcher are derived, covering the cases of including and excluding self-citations. The new measure is calculated for two mathematicians.

A Model to Identify Expeditiously During Storm to Enable Effective Responses to Flood Threat

  • Husain, Mohammad;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.23-30
    • /
    • 2021
  • In recent years, hazardous flash flooding has caused deaths and damage to infrastructure in Saudi Arabia. In this paper, our aim is to assess patterns and trends in climate means and extremes affecting flash flood hazards and water resources in Saudi Arabia for the purpose to improve risk assessment for forecast capacity. We would like to examine temperature, precipitation climatology and trend magnitudes at surface stations in Saudi Arabia. Based on the assessment climate patterns maps and trends are accurately used to identify synoptic situations and tele-connections associated with flash flood risk. We also study local and regional changes in hydro-meteorological extremes over recent decades through new applications of statistical methods to weather station data and remote sensing based precipitation products; and develop remote sensing based high-resolution precipitation products that can aid to develop flash flood guidance system for the flood-prone areas. A dataset of extreme events has been developed using the multi-decadal station data, the statistical analysis has been performed to identify tele-connection indices, pressure and sea surface temperature patterns most predictive to heavy rainfall. It has been combined with time trends in extreme value occurrence to improve the potential for predicting and rapidly detecting storms. A methodology and algorithms has been developed for providing a well-calibrated precipitation product that can be used in the early warning systems for elevated risk of floods.

Implementation of Recipe Recommendation System Using Ingredients Combination Analysis based on Recipe Data (레시피 데이터 기반의 식재료 궁합 분석을 이용한 레시피 추천 시스템 구현)

  • Min, Seonghee;Oh, Yoosoo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1114-1121
    • /
    • 2021
  • In this paper, we implement a recipe recommendation system using ingredient harmonization analysis based on recipe data. The proposed system receives an image of a food ingredient purchase receipt to recommend ingredients and recipes to the user. Moreover, it performs preprocessing of the receipt images and text extraction using the OCR algorithm. The proposed system can recommend recipes based on the combined data of ingredients. It collects recipe data to calculate the combination for each food ingredient and extracts the food ingredients of the collected recipe as training data. And then, it acquires vector data by learning with a natural language processing algorithm. Moreover, it can recommend recipes based on ingredients with high similarity. Also, the proposed system can recommend recipes using replaceable ingredients to improve the accuracy of the result through preprocessing and postprocessing. For our evaluation, we created a random input dataset to evaluate the proposed recipe recommendation system's performance and calculated the accuracy for each algorithm. As a result of performance evaluation, the accuracy of the Word2Vec algorithm was the highest.

A Computerized Doughty Predictor Framework for Corona Virus Disease: Combined Deep Learning based Approach

  • P, Ramya;Babu S, Venkatesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2018-2043
    • /
    • 2022
  • Nowadays, COVID-19 infections are influencing our daily lives which have spread globally. The major symptoms' of COVID-19 are dry cough, sore throat, and fever which in turn to critical complications like multi organs failure, acute respiratory distress syndrome, etc. Therefore, to hinder the spread of COVID-19, a Computerized Doughty Predictor Framework (CDPF) is developed to yield benefits in monitoring the progression of disease from Chest CT images which will reduce the mortality rates significantly. The proposed framework CDPF employs Convolutional Neural Network (CNN) as a feature extractor to extract the features from CT images. Subsequently, the extracted features are fed into the Adaptive Dragonfly Algorithm (ADA) to extract the most significant features which will smoothly drive the diagnosing of the COVID and Non-COVID cases with the support of Doughty Learners (DL). This paper uses the publicly available SARS-CoV-2 and Github COVID CT dataset which contains 2482 and 812 CT images with two class labels COVID+ and COVI-. The performance of CDPF is evaluated against existing state of art approaches, which shows the superiority of CDPF with the diagnosis accuracy of about 99.76%.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

Image Captioning with Synergy-Gated Attention and Recurrent Fusion LSTM

  • Yang, You;Chen, Lizhi;Pan, Longyue;Hu, Juntao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3390-3405
    • /
    • 2022
  • Long Short-Term Memory (LSTM) combined with attention mechanism is extensively used to generate semantic sentences of images in image captioning models. However, features of salient regions and spatial information are not utilized sufficiently in most related works. Meanwhile, the LSTM also suffers from the problem of underutilized information in a single time step. In the paper, two innovative approaches are proposed to solve these problems. First, the Synergy-Gated Attention (SGA) method is proposed, which can process the spatial features and the salient region features of given images simultaneously. SGA establishes a gated mechanism through the global features to guide the interaction of information between these two features. Then, the Recurrent Fusion LSTM (RF-LSTM) mechanism is proposed, which can predict the next hidden vectors in one time step and improve linguistic coherence by fusing future information. Experimental results on the benchmark dataset of MSCOCO show that compared with the state-of-the-art methods, the proposed method can improve the performance of image captioning model, and achieve competitive performance on multiple evaluation indicators.

Deep Learning Based Rumor Detection for Arabic Micro-Text

  • Alharbi, Shada;Alyoubi, Khaled;Alotaibi, Fahd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.73-80
    • /
    • 2021
  • Nowadays microblogs have become the most popular platforms to obtain and spread information. Twitter is one of the most used platforms to share everyday life event. However, rumors and misinformation on Arabic social media platforms has become pervasive which can create inestimable harm to society. Therefore, it is imperative to tackle and study this issue to distinguish the verified information from the unverified ones. There is an increasing interest in rumor detection on microblogs recently, however, it is mostly applied on English language while the work on Arabic language is still ongoing research topic and need more efforts. In this paper, we propose a combined Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) to detect rumors on Twitter dataset. Various experiments were conducted to choose the best hyper-parameters tuning to achieve the best results. Moreover, different neural network models are used to evaluate performance and compare results. Experiments show that the CNN-LSTM model achieved the best accuracy 0.95 and an F1-score of 0.94 which outperform the state-of-the-art methods.