• Title/Summary/Keyword: Similarity rule

Search Result 119, Processing Time 0.024 seconds

Design of knowledge search algorithm for PHR based personalized health information system (PHR 기반 개인 맞춤형 건강정보 탐사 알고리즘 설계)

  • SHIN, Moon-Sun
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.191-198
    • /
    • 2017
  • It is needed to support intelligent customized health information service for user convenience in PHR based Personal Health Care Service Platform. In this paper, we specify an ontology-based health data model for Personal Health Care Service Platform. We also design a knowledge search algorithm that can be used to figure out similar health record by applying machine learning and data mining techniques. Axis-based mining algorithm, which we proposed, can be performed based on axis-attributes in order to improve relevance of knowledge exploration and to provide efficient search time by reducing the size of candidate item set. And K-Nearest Neighbor algorithm is used to perform to do grouping users byaccording to the similarity of the user profile. These algorithms improves the efficiency of customized information exploration according to the user 's disease and health condition. It can be useful to apply the proposed algorithm to a process of inference in the Personal Health Care Service Platform and makes it possible to recommend customized health information to the user. It is useful for people to manage smart health care in aging society.

An Algorithm of Identifying Roaming Pedestrians' Trajectories using LiDAR Sensor (LiDAR 센서를 활용한 배회 동선 검출 알고리즘 개발)

  • Jeong, Eunbi;You, So-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.1-15
    • /
    • 2017
  • Recently terrorism targets unspecified masses and causes massive destruction, which is so-called Super Terrorism. Many countries have tried hard to protect their citizens with various preparation and safety net. With inexpensive and advanced technologies of sensors, the surveillance systems have been paid attention, but few studies associated with the classification of the pedestrians' trajectories and the difference among themselves have attempted. Therefore, we collected individual trajectories at Samseoung Station using an analytical solution (system) of pedestrian trajectory by LiDAR sensor. Based on the collected trajectory data, a comprehensive framework of classifying the types of pedestrians' trajectories has been developed with data normalization and "trajectory association rule-based algorithm." As a result, trajectories with low similarity within the very same cluster is possibly detected.

A Weighted FMM Neural Network and Feature Analysis Technique for Pattern Classification (가중치를 갖는 FMM신경망과 패턴분류를 위한 특징분석 기법)

  • Kim Ho-Joon;Yang Hyun-Seung
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.1
    • /
    • pp.1-9
    • /
    • 2005
  • In this paper we propose a modified fuzzy min-max neural network model for pattern classification and discuss the usefulness of the model. We define a new hypercube membership function which has a weight factor to each of the feature within a hyperbox. The weight factor makes it possible to consider the degree of relevance of each feature to a class during the classification process. Based on the proposed model, a knowledge extraction method is presented. In this method, a list of relevant features for a given class is extracted from the trained network using the hyperbox membership functions and connection weights. Ft)r this purpose we define a Relevance Factor that represents a degree of relevance of a feature to the given class and a similarity measure between fuzzy membership functions of the hyperboxes. Experimental results for the proposed methods and discussions are presented for the evaluation of the effectiveness and feasibility of the proposed methods.

Insights into factors affecting synonymous codon usage in apple mosaic virus and its host adaptability

  • Pourrahim, R.;Farzadfar, Sh.
    • Journal of Plant Biotechnology
    • /
    • v.49 no.1
    • /
    • pp.46-60
    • /
    • 2022
  • The genetic variability and population structure of apple mosaic virus (ApMV) have been studied; however, synonymous codon usage patterns influencing the survival rates and fitness of ApMV have not been reported. Based on phylogenetic analyses of 52 ApMV coat protein (CP) sequences obtained from apple, pear, and hazelnut, ApMV isolates were clustered into two groups. High molecular diversity in GII may indicate their recent expansion. A constant and conserved genomic composition of the CP sequences was inferred from the low codon usage bias. Nucleotide composition and relative synonymous codon usage (RSCU) analysis indicated that the ApMV CP gene is AU-rich, but G- and U-ending codons are favored while coding amino acids. This unequal use of nucleotides together with parity rule 2 and the effective number of codon (ENC) plots indicate that mutation pressure together with natural selection drives codon usage patterns in the CP gene. However, in this combination, selection pressure plays a more crucial role. Based on principal component analysis plots, ApMV seems to have originated from apple trees in Europe. However, according to the relative codon deoptimization index and codon adaptation index (CAI) analyses, ApMV exhibited the greatest fitness to hazelnut. As inferred from the results of the similarity index analysis, hazelnut has a major role in shaping ApMV RSCU patterns, which is consistent with the CAI analysis results. This study contributes to the understanding of plant virus evolution, reveals novel information about ApMV evolutionary fitness, and helps find better ApMV management strategies.

The RNA Base Over 95% of Onju Citrus and Coffee Genes Cut & Paste Based on The BCJM Matrix with Chargaff-Shannon Entropy (BCJM 행렬 및 Chargaff 법칙과 Shannon Entropy에 의한 RNA 유전자 비율이 95%이상인 온주감귤과 귤의 유전자 조합)

  • Lee, Sung Kook;Kim, Jeong Su;Lee, Moon Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.415-422
    • /
    • 2022
  • The heterogeneous Onju citrus genes (A=20.57, C=32.71, G=30.01, U=16.71%) and coffee genes (A=20.66, C=31.76, G=30.187, U=16.71%) have the same genetic ratio of 95% or more. It is known that gene compatibility is generally not possible with this group. However, it can be grafted if the conditions of Chargaff rule and Shannon Entropy are met with gene functional-similarity of more than 95%, and it becomes a new breed of Coffrange. We calculated the world's first BCJM matrix for DNA-RNA and published it in US patents and international journals. All animals and viruses are similar to human genes. Based on this, it was announced in June in the British matrix textbook by solving the genetic characteristics of COVID-19 and the human body. In plants, it is treated with BCJM-Transposon treatment, a technique that easily changes gene location. Simulation predicted that the matrix could be successful with Cut & Paste and Transpose.

An effective automated ontology construction based on the agriculture domain

  • Deepa, Rajendran;Vigneshwari, Srinivasan
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.573-587
    • /
    • 2022
  • The agricultural sector is completely different from other sectors since it completely relies on various natural and climatic factors. Climate changes have many effects, including lack of annual rainfall and pests, heat waves, changes in sea level, and global ozone/atmospheric CO2 fluctuation, on land and agriculture in similar ways. Climate change also affects the environment. Based on these factors, farmers chose their crops to increase productivity in their fields. Many existing agricultural ontologies are either domain-specific or have been created with minimal vocabulary and no proper evaluation framework has been implemented. A new agricultural ontology focused on subdomains is designed to assist farmers using Jaccard relative extractor (JRE) and Naïve Bayes algorithm. The JRE is used to find the similarity between two sentences and words in the agricultural documents and the relationship between two terms is identified via the Naïve Bayes algorithm. In the proposed method, the preprocessing of data is carried out through natural language processing techniques and the tags whose dimensions are reduced are subjected to rule-based formal concept analysis and mapping. The subdomain ontologies of weather, pest, and soil are built separately, and the overall agricultural ontology are built around them. The gold standard for the lexical layer is used to evaluate the proposed technique, and its performance is analyzed by comparing it with different state-of-the-art systems. Precision, recall, F-measure, Matthews correlation coefficient, receiver operating characteristic curve area, and precision-recall curve area are the performance metrics used to analyze the performance. The proposed methodology gives a precision score of 94.40% when compared with the decision tree(83.94%) and K-nearest neighbor algorithm(86.89%) for agricultural ontology construction.

Image Analysis Fuzzy System

  • Abdelwahed Motwakel;Adnan Shaout;Anwer Mustafa Hilal;Manar Ahmed Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.163-177
    • /
    • 2024
  • The fingerprint image quality relies on the clearness of separated ridges by valleys and the uniformity of the separation. The condition of skin still dominate the overall quality of the fingerprint. However, the identification performance of such system is very sensitive to the quality of the captured fingerprint image. Fingerprint image quality analysis and enhancement are useful in improving the performance of fingerprint identification systems. A fuzzy technique is introduced in this paper for both fingerprint image quality analysis and enhancement. First, the quality analysis is performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thickness ratio (RVTR), and the Global Contrast Factor (GCF). A fuzzy logic technique that uses Mamdani fuzzy rule model is designed. The fuzzy inference system is able to analyse and determinate the fingerprint image type (oily, dry or neutral) based on the extracted feature values and the fuzzy inference rules. The percentages of the test fuzzy inference system for each type is as follow: For dry fingerprint the percentage is 81.33, for oily the percentage is 54.75, and for neutral the percentage is 68.48. Secondly, a fuzzy morphology is applied to enhance the dry and oily fingerprint images. The fuzzy morphology method improves the quality of a fingerprint image, thus improving the performance of the fingerprint identification system significantly. All experimental work which was done for both quality analysis and image enhancement was done using the DB_ITS_2009 database which is a private database collected by the department of electrical engineering, institute of technology Sepuluh Nopember Surabaya, Indonesia. The performance evaluation was done using the Feature Similarity index (FSIM). Where the FSIM is an image quality assessment (IQA) metric, which uses computational models to measure the image quality consistently with subjective evaluations. The new proposed system outperformed the classical system by 900% for the dry fingerprint images and 14% for the oily fingerprint images.

A Template-based Interactive University Timetabling Support System (템플릿 기반의 상호대화형 전공강의시간표 작성지원시스템)

  • Chang, Yong-Sik;Jeong, Ye-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.121-145
    • /
    • 2010
  • University timetabling depending on the educational environments of universities is an NP-hard problem that the amount of computation required to find solutions increases exponentially with the problem size. For many years, there have been lots of studies on university timetabling from the necessity of automatic timetable generation for students' convenience and effective lesson, and for the effective allocation of subjects, lecturers, and classrooms. Timetables are classified into a course timetable and an examination timetable. This study focuses on the former. In general, a course timetable for liberal arts is scheduled by the office of academic affairs and a course timetable for major subjects is scheduled by each department of a university. We found several problems from the analysis of current course timetabling in departments. First, it is time-consuming and inefficient for each department to do the routine and repetitive timetabling work manually. Second, many classes are concentrated into several time slots in a timetable. This tendency decreases the effectiveness of students' classes. Third, several major subjects might overlap some required subjects in liberal arts at the same time slots in the timetable. In this case, it is required that students should choose only one from the overlapped subjects. Fourth, many subjects are lectured by same lecturers every year and most of lecturers prefer the same time slots for the subjects compared with last year. This means that it will be helpful if departments reuse the previous timetables. To solve such problems and support the effective course timetabling in each department, this study proposes a university timetabling support system based on two phases. In the first phase, each department generates a timetable template from the most similar timetable case, which is based on case-based reasoning. In the second phase, the department schedules a timetable with the help of interactive user interface under the timetabling criteria, which is based on rule-based approach. This study provides the illustrations of Hanshin University. We classified timetabling criteria into intrinsic and extrinsic criteria. In intrinsic criteria, there are three criteria related to lecturer, class, and classroom which are all hard constraints. In extrinsic criteria, there are four criteria related to 'the numbers of lesson hours' by the lecturer, 'prohibition of lecture allocation to specific day-hours' for committee members, 'the number of subjects in the same day-hour,' and 'the use of common classrooms.' In 'the numbers of lesson hours' by the lecturer, there are three kinds of criteria : 'minimum number of lesson hours per week,' 'maximum number of lesson hours per week,' 'maximum number of lesson hours per day.' Extrinsic criteria are also all hard constraints except for 'minimum number of lesson hours per week' considered as a soft constraint. In addition, we proposed two indices for measuring similarities between subjects of current semester and subjects of the previous timetables, and for evaluating distribution degrees of a scheduled timetable. Similarity is measured by comparison of two attributes-subject name and its lecturer-between current semester and a previous semester. The index of distribution degree, based on information entropy, indicates a distribution of subjects in the timetable. To show this study's viability, we implemented a prototype system and performed experiments with the real data of Hanshin University. Average similarity from the most similar cases of all departments was estimated as 41.72%. It means that a timetable template generated from the most similar case will be helpful. Through sensitivity analysis, the result shows that distribution degree will increase if we set 'the number of subjects in the same day-hour' to more than 90%.

A comparison study of the characteristics of private and public security service of Koryo dynasty and modern security service (고려시대 공적·사적경호의 특성과 현대경호와의 비교연구)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.417-442
    • /
    • 2013
  • This study considers the characteristics of the separation of public and private security service during Koryo dynasty, and compares it with the modern security service. Modern day security service's definition of private and public security service was used to distinguish them. Given the different historical settings, it's difficult to argue that the distinction between public and private service during Koryo dynasty was clear, but it can be said that public security service was centered around palace guard and concerns the activities of protest, and military made for the relationship, and private security service was centered around power of DoBang and includes the activities of malingering, and Byolchogun. During the early days of Koryo, protest, district military and soldiers who stay in the palace were all parts of a palace revolt and this institutional improvement of soldiers who stay in the palace was accomplished during King Seongjong's rule. The tradition of a palace revolt can find its roots in the middle military, and after the unification, a palace revolt was reformed into the king's palace revolt of second and the 6th along the course of establishing the nation's system. All of the changes stem from the reformation for consolidating the royal authority. Gyung Dae Seoung wanted to protect himself and he slept with his army night and days and because of that, group of soldiers was created and it was called DOBANG. Some members were from dobang gyeonryong, The forced were powerful because it was gathered with a warriors with extraordinaire martial arts and competent management. Most of the soldiers followed gyeong dae seung because they believed that he has a strong leadership and loves his people, and had a strong faith in him. However, the general gyeong jang had a belief that politics must be reverted to the previous so the relationships between jungbang wasn't smooth. Because of the economic operational problems, due to fraud committed by the mens under his command failed to maintain integrity and was criticised.The misconception also fed up with the emperor and the deepening relationships between the soldiers, his dobang was dismantled. After he took over the dobang, for his personal safety and to strengthen his position he compensated gyeon dae seong's dobang and developed the organization. In the process of extending the dobang Choi chung heon recruited many talented people to strengthen the military base, and also accepted the advice and expanded the power of Dobang. Choi Chung Heon thus consolidated his political gains by weakening the power of the king's army and adjusting the myth, which could've threatened his regime, and this was called Dobang number 6th. Dobang number six got even more powerful by his son named Choi woo, and after ruling, he expanded into a room, and a substantial reorganization of Dobang was developed. And then the creation of yabyeolcho also showed the effect to prevent the crisis. Although the palace guards who were public security service of Koryo Dynasty was still maintained during the military rule era when the royal authority was incapacitated, it was only maintained to have a symbolic meaning as the actual authority including military power was with Choi, the master of Dobang, private security service group. Likewise, during the rule of Choi, private securty service could reign over public security service, and the noteworthy characteristic of Dobang is that it assisted the private soldier groups to seize the military power by reorganizing and modifying military system. Although both differences and similarities can be found when comparing the guards of Koryo Dynasty with those of contemporary society, they have a similarity in terms of the essence of guards that they guarantee the safety of their clients. As for differences, the royalty of Koryo Dynasty and the pursuit of profit of contemporary society are in contrast, and contemporary guards can be seen as the fulfillment of responsibility and duty by free will, whereas guards of Koryo Dynasty were ruled with military coercion.

  • PDF

Building Domain Ontology through Concept and Relation Classification (개념 및 관계 분류를 통한 분야 온톨로지 구축)

  • Huang, Jin-Xia;Shin, Ji-Ae;Choi, Key-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.562-571
    • /
    • 2008
  • For the purpose of building domain ontology, this paper proposes a methodology for building core ontology first, and then enriching the core ontology with the concepts and relations in the domain thesaurus. First, the top-level concept taxonomy of the core ontology is built using domain dictionary and general domain thesaurus. Then, the concepts of the domain thesaurus are classified into top-level concepts in the core ontology, and relations between broader terms (BT) - narrower terms (NT) and related terms (RT) are classified into semantic relations defined for the core ontology. To classify concepts, a two-step approach is adopted, in which a frequency-based approach is complemented with a similarity-based approach. To classify relations, two techniques are applied: (i) for the case of insufficient training data, a rule-based module is for identifying isa relation out of non-isa ones; a pattern-based approach is for classifying non-taxonomic semantic relations from non-isa. (ii) For the case of sufficient training data, a maximum-entropy model is adopted in the feature-based classification, where k-NN approach is for noisy filtering of training data. A series of experiments show that performances of the proposed systems are quite promising and comparable to judgments by human experts.