• Title/Summary/Keyword: discovery framework

Search Result 91, Processing Time 0.024 seconds

Requirement Analysis for Bio-Information Integration Systems

  • Lee, Sean;Lee, Phil-Hyoun;Dokyun Na;Lee, Doheon;Lee, Kwanghyung;Bae, Myung-Nam
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.11-15
    • /
    • 2003
  • Amount of biological data information has been increasing exponentially. In order to cope with this bio-information explosion, it is necessary to construct a biological data information integration system. The integration system could provide useful services for bio-application developers by answering general complex queries that require accessing information from heterogeneous bio data sources, and easily accommodate a new database into the integrated systems. In this paper, we analyze architectures and mechanisms of existing integration systems with their advantages and disadvantages. Based on this analysis and user requirement studies, we propose an integration system framework that embraces advantages of the existing systems. More specifically, we propose an integration system architecture composed of a mediator and wrappers, which can offer a service interface layer for various other applications as well as independent biologists, thus playing the role of database management system for biology applications. In other words, the system can help abstract the heterogeneous information structures and formats from the application layer. In the system, the wrappers send database-specific queries and report the result to the mediator using XML. The proposed system could facilitate in silico knowledge discovery by allowing combination of numerous discrete biological information databases.

  • PDF

The Study of Sensor Network for Information Retrieval and Communication protocol High Performance (센서네트워크의 정보검색 및 통신프로토콜 성능향상에 관한 연구)

  • Kang, Jeong-Yong;Kwon, Hyuk-Dae;Roh, Yong-Gi;Kim, Byoung-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.529-532
    • /
    • 2011
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

  • PDF

The Influence of Learning Styles on a Model of IoT-based Inclusive Education and Its Architecture

  • Sayassatov, Dulan;Cho, Namjae
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.27-39
    • /
    • 2019
  • The Internet of Things (IoT) is a new paradigm that is revolutionizing computing. It is intended that all objects around us will be connected to the network, providing "anytime, anywhere" access to information. This study introduces IoT with Kolb's learning style in order to enhance the learning experience especially for inclusive education for primary and secondary schools where delivery of knowledge is not limited to physical, cognitive disabilities, human diversity with respect to ability, language, culture, gender, age and of other forms of human differences. The article also emphasizes the role of learning style as a discovery process that incorporates the characteristics of problem solving and learning. Kolb's Learning Style was chosen as it is widely used in research and in practical information systems applications. A consistent pattern of finding emerges by using a combination of Kolb's learning style and internet of things where specific individual differences, learning approach differences and IoT application differences are taken as a main research framework. Further several suggestions were made by using this combination to IoT architecture and smart environment of internet of things. Based on these suggestions, future research directions are proposed.

Construction of the Concept-Based Faceted Framework for Thesaurus Integration (시소러스 통합을 위한 개념기반 패싯 프레임워크 구축)

  • Lee, Seung-Min
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.3
    • /
    • pp.269-290
    • /
    • 2010
  • Applying one specific thesaurus might cause several problems because each thesaurus has its own characteristics inherited from its construction process. Therefore, integration of thesauri can be an appropriate approach to overcome the difficulties. This current research selected physics as a domain and two thesauri in the domain: PACS and PIRA. By integrating these two heterogeneous thesauri, this research could construct a conceptual structure that covers the whole concepts related to physics. By constructing the conceptual structure with the use of facet analysis from integrated thesaurus, it provides knowledge base with hierarchical structure and clear relationships between concepts. It can be an alternate approach to effective and efficient information retrieval and knowledge discovery.

  • PDF

A Design of an Abnormal Traffic Control Framework in IPv6 Network (IPv6 네크워크 환경에서의 비정상 트래픽 제어 프레임워크 설계)

  • Kim, Ka-Eul;Kang, Seong-Goo;Kim, Jae-Kwang;Ko, Kwang-Sun;Kang, Young-Hyeok;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1103-1106
    • /
    • 2005
  • IPv4 프로토콜의 주소 고갈 문제를 해결하기 위하여 IPv6 프로토콜이 제안되었고 한국전산원의 발표에 의하면 2010년 이후에는 IPv6 프로토콜이 광범위하게 사용될 것이라고 한다. 이러한 IPv6 프로토콜은 IPv4 프로토콜의 단점들을 해결하기 위하여 ND(Neighbor Discovery) 메커니즘, 주소자동설정, IPsec 등의 기술을 지원하며, 특히 IPv6 프로토콜은 보안 문제를 해결하기 위해서 인증, 데이터 무결성 보호를 위한 IPsec 기술을 사용한다. 이러한 IPsec 기술은 패킷 정보를 보호하기 위한 목적으로 사용되기 때문에 불특정 다수의 사용자를 대상으로 하는 네트워크에 행해지는 분산 서비스 거부 공격과 같은 비정상 대용량 트래픽에 대한 탐지 및 차단에 어려움이 있다. 현재 IPv6 프로토콜을 지원하는 네트워크 공격 대응 기술로 IPv6 네트워크용 방화벽/침입탐지 시스템이 개발되어 제품으로 판매되고 있지만, 대용량의 비정상 트래픽 대응 기술을 탐지하고 차단하기에는 한계가 있다. 본 논문에서는 IPv6 네트워크 환경에서 이러한 대용량의 비정상 트래픽을 제어할 수 있는 프레임워크를 제시한다.

  • PDF

Generation of semantic Web service based on Ontology by CBD (CBD에 의한 온톨로지 기반 시맨틱 웹 서비스 생성)

  • Ha, Yan
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.389-394
    • /
    • 2007
  • This study suggests that it dynamically generates semantic Web services from Java and C++ components in order to supporting semantic Web service by using ontology. And the semantic Web should enable greater access not only to content but also to services on the Web. It needs semantic service discovery for components. So, we add ontology-based framework to Web service generation system from components. Especially, components and ontologies are transformed UML model so that it makes WSDL documents to support a generation of dynamic Web service using object modeling. The main contribution of this study is to generate web service dynamically from components and to support semantic Web environment by using ontology. In other words, this study integrates semantic Web service based on ontology and CBD method.

Design and Implementation of Integrated Query System for e-Business Registries (e-비즈니스 레지스트리 통합 질의 시스템 설계 및 구현)

  • 김계용;이규철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2003
  • With the spread of Internet, e-business using Internet technology is being actively developed and operated. Currently, on behalf of the international e-business framework, International standard such as ebXML and Web Service is being advanced. We are able to publish and search business information through ebXML and Web Service and then actual trading between partners is accomplished. By the way, it is Registry that play an important part in e-business. Registry is an e-business infrastructure for enabling building, deploying, and the discovery of business Information. We can do e-business through Registries dynamically and share the resources. Representatives of Registry are ebXML and UDDI used as an international standard. We will meet with some problems when using Registries. ebXML Is focused on B2B collaborations and Web Service Is focused on application integrations. So we must use ebXML and Web Service characteristically, and sometimes use all at need. ebXML and Web Service contain business information by Registry specific way. So When using the services offered by ebXML and Web Service, we should access each Registry by using Registry specific tools. This thesis intended to integrate business information from ebXML Registry and UDDI Registry to accomplish e-business conveniently This thesis defined the common data model as well as integrated query language for integrated access to ebXML and Web Service along with design and implementation of the system.

  • PDF

Identifying differentially expressed genes using the Polya urn scheme

  • Saraiva, Erlandson Ferreira;Suzuki, Adriano Kamimura;Milan, Luis Aparecido
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.627-640
    • /
    • 2017
  • A common interest in gene expression data analysis is to identify genes that present significant changes in expression levels among biological experimental conditions. In this paper, we develop a Bayesian approach to make a gene-by-gene comparison in the case with a control and more than one treatment experimental condition. The proposed approach is within a Bayesian framework with a Dirichlet process prior. The comparison procedure is based on a model selection procedure developed using the discreteness of the Dirichlet process and its representation via Polya urn scheme. The posterior probabilities for models considered are calculated using a Gibbs sampling algorithm. A numerical simulation study is conducted to understand and compare the performance of the proposed method in relation to usual methods based on analysis of variance (ANOVA) followed by a Tukey test. The comparison among methods is made in terms of a true positive rate and false discovery rate. We find that proposed method outperforms the other methods based on ANOVA followed by a Tukey test. We also apply the methodologies to a publicly available data set on Plasmodium falciparum protein.

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.

Resistome Study in Aquatic Environments

  • Hanseob Shin;Yongjin Kim;Seunggyun Han;Hor-Gil Hur
    • Journal of Microbiology and Biotechnology
    • /
    • v.33 no.3
    • /
    • pp.277-287
    • /
    • 2023
  • Since the first discovery of antibiotics, introduction of new antibiotics has been coupled with the occurrence of antibiotic resistant bacteria (ARB) and antibiotic resistance genes (ARGs). Rapid dissemination of ARB and ARGs in the aquatic environments has become a global concern. ARB and ARGs have been already disseminated in the aquatic environments via various routes. Main hosts of most of ARGs were found to belong to Gammaproteobacteria class, including clinically important potential pathogens. Transmission of ARGs also occurs by horizontal gene transfer (HGT) mechanisms between bacterial strains in the aquatic environments, resulting in ubiquity of ARGs. Thus, a few of ARGs and MGEs (e.g., strA, sul1, int1) have been suggested as indicators for global comparability of contamination level in the aquatic environments. With ARB and ARGs contamination, the occurrence of critical pathogens has been globally issued due to their widespread in the aquatic environments. Thus, active surveillance systems have been launched worldwide. In this review, we described advancement of methodologies for ARGs detection, and occurrence of ARB and ARGs and their dissemination in the aquatic environments. Even though numerous studies have been conducted for ARB and ARGs, there is still no clear strategy to tackle antibiotic resistance (AR) in the aquatic environments. At least, for consistent surveillance, a strict framework should be established for further research in the aquatic environments.