• Title/Summary/Keyword: Process Discovery

Search Result 500, Processing Time 0.029 seconds

A Competition-based Algorithm for Routing Discovery and Repair in Large-scale VANET

  • Wu, Cheng;Wang, Lujie;Wang, Yiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5729-5744
    • /
    • 2017
  • Vehicular Ad Hoc Networks (VANET) in the large-scale road section usually have typical characteristics of large number of vehicles and unevenly distribution over geographic spaces. These two inherent characteristics lead to the unsatisfactory performance of VANETs. This poor performance is mainly due to fragile communication link and low dissemination efficiency. We propose a novel routing mechanism to address the issue in the paper, which includes a competition-based routing discovery with priority metrics and a local routing repair strategy. In the routing discovery stage, the algorithm uses adaptive scheme to select a stable route by the priorities of routing metrics, which are the length of each hop, as well as the residual lifetime of each link. Comparisons of different ratios over link length and link stability further show outstanding improvements. In the routing repair process, upstream and downstream nodes also compete for the right to establish repair process and to remain as a member of the active route after repair. Our simulation results confirm the improved performance of the proposed algorithm.

Natural radioprotectors and their impact on cancer drug discovery

  • Kuruba, Vinutha;Gollapalli, Pavan
    • Radiation Oncology Journal
    • /
    • v.36 no.4
    • /
    • pp.265-275
    • /
    • 2018
  • Cancer is a complex multifaceted illness that affects different patients in discrete ways. For a number of cancers the use of chemotherapy has become standard practice. Chemotherapy is a use of cytostatic drugs to cure cancer. Cytostatic agents not only affect cancer cells but also affect the growth of normal cells; leading to side effects. Because of this, radiotherapy gained importance in treating cancer. Slaughtering of cancerous cells by radiotherapy depends on the radiosensitivity of the tumor cells. Efforts to improve the therapeutic ratio have resulted in the development of compounds that increase the radiosensitivity of tumor cells or protect the normal cells from the effects of radiation. Amifostine is the only chemical radioprotector approved by the US Food and Drug Administration (FDA), but due to its side effect and toxicity, use of this compound was also failed. Hence the use of herbal radioprotectors bearing pharmacological properties is concentrated due to their low toxicity and efficacy. Notably, in silico methods can expedite drug discovery process, to lessen the compounds with unfavorable pharmacological properties at an early stage of drug development. Hence a detailed perspective of these properties, in accordance with their prediction and measurement, are pivotal for a successful identification of radioprotectors by drug discovery process.

Lexical Discovery and Consolidation Strategies of Proficient and Less Proficient EFL Vocational High School Learners

  • Chon, Yuah Vicky;Kim, You-Hee
    • English Language & Literature Teaching
    • /
    • v.17 no.3
    • /
    • pp.27-56
    • /
    • 2011
  • The analysis on the use of lexical discovery and consolidation strategies that have been researched within the area of vocabulary learning strategies (VLS) have not sufficiently drawn the interest of EFL practitioners with regard to vocational high school learners. The results, however, are expected to have implications for the design of vocabulary tasks and instructional materials for EFL learners. The present study investigates EFL vocational high school learners' use of lexical discovery and consolidation strategies with questionnaires, where the use of the learners' lexical discovery strategies were further validated with the think-aloud methodology by asking samples of proficient and less proficient learners to report on their reading process while reading L2 texts that had not been exposed to the learners. The results indicated that there were significant differences between the two groups of learners in the employment of 11 of the strategies which were in the categories of determination, social, memory, and metacognitive strategies, but not for cognitive strategies. The pattern of strategies indicated that different lexical discovery and consolidation strategies were employed relatively more by one proficiency group than another. The study suggests some implications for how strategy-based instruction can be implemented in EFL classrooms.

  • PDF

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

A Study on Functional Requirements for the Establishment of Evidence Values of Electronic Records Focused on eDiscovery (전자기록의 증거적 가치 수립을 위한 기능요건에 관한 연구: 미국 eDiscovery 적용을 중심으로)

  • Choi, Kippeum;Lee, Gemma;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.2
    • /
    • pp.201-226
    • /
    • 2021
  • Discovery's collection was originally paper documents, but with the advent of the digital age, its collection expanded. Resolving the issue of ESI has now become important in litigation. Therefore, this study analyzes the requirements of each domain for electronic records to be recognized as evidence. It also explained the factors that should be considered in record management. In addition, eDiscovery in the United States was selected as an advanced case to utilize records as evidence. This study investigated the Commentary on Legal Holdings: The Trigger & The Process and analyzed which functions must be considered in order for electronic records to be preserved as evidence. To this end, we analyze the functional requirements of the eDiscovery solution. Through this, necessary functional requirements are derived to help implement the system in preparation for eDiscovery.

Genetically Engineered Mouse Models for Drug Development and Preclinical Trials

  • Lee, Ho
    • Biomolecules & Therapeutics
    • /
    • v.22 no.4
    • /
    • pp.267-274
    • /
    • 2014
  • Drug development and preclinical trials are challenging processes and more than 80% to 90% of drug candidates fail to gain approval from the United States Food and Drug Administration. Predictive and efficient tools are required to discover high quality targets and increase the probability of success in the process of new drug development. One such solution to the challenges faced in the development of new drugs and combination therapies is the use of low-cost and experimentally manageable in vivo animal models. Since the 1980's, scientists have been able to genetically modify the mouse genome by removing or replacing a specific gene, which has improved the identification and validation of target genes of interest. Now genetically engineered mouse models (GEMMs) are widely used and have proved to be a powerful tool in drug discovery processes. This review particularly covers recent fascinating technologies for drug discovery and preclinical trials, targeted transgenesis and RNAi mouse, including application and combination of inducible system. Improvements in technologies and the development of new GEMMs are expected to guide future applications of these models to drug discovery and preclinical trials.

Combining Faceted Classification and Concept Search: A Pilot Study

  • Yang, Kiduk
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.5-23
    • /
    • 2014
  • This study reports the first step in the Classification-based Search and Knowledge Discovery (CSKD) project, which aims to combine information organization and retrieval approaches for building digital library applications. In this study, we explored the generation and application of a faceted vocabulary as a potential mechanism to enhance knowledge discovery. The faceted vocabulary construction process revealed some heuristics that can be refined in follow-up studies to further automate the creation of faceted classification structure, while our concept search application demonstrated the utility and potential of integrating classification-based approach with retrieval-based approach. Integration of text- and classification-based methods as outlined in this paper combines the strengths of two vastly different approaches to information discovery by constructing and utilizing a flexible information organization scheme from an existing classification structure.

Artificial Intelligence and Pattern Recognition Using Data Mining Algorithms

  • Al-Shamiri, Abdulkawi Yahya Radman
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.221-232
    • /
    • 2021
  • In recent years, with the existence of huge amounts of data stored in huge databases, the need for developing accurate tools for analyzing data and extracting information and knowledge from the huge and multi-source databases have been increased. Hence, new and modern techniques have emerged that will contribute to the development of all other sciences. Knowledge discovery techniques are among these technologies, one popular technique of knowledge discovery techniques is data mining which aims to knowledge discovery from huge amounts of data. Such modern technologies of knowledge discovery will contribute to the development of all other fields. Data mining is important, interesting technique, and has many different and varied algorithms; Therefore, this paper aims to present overview of data mining, and clarify the most important of those algorithms and their uses.

Modeling Vulnerability Discovery Process in Major Cryptocurrencies

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.191-200
    • /
    • 2022
  • These days, businesses, in both online and offline, have started accepting cryptocurrencies as payment methods. Even in countries like El Salvador, cryptocurrencies are recognized as fiat currencies. Meanwhile, publicly known, but not patched software vulnerabilities are security threats to not only software users but also to our society in general. As the status of cryptocurrencies has gradually increased, the impact of security vulnerabilities related to cryptocurrencies on our society has increased as well. In this paper, we first analyze vulnerabilities from the two major cryptocurrency vendors of Bitcoin and Ethereum in a quantitative manner with the respect to the CVSS, to see how the vulnerabilities are roughly structured in those systems. Then we introduce a modified AML vulnerability discovery model for the vulnerability datasets from the two vendors, after showing the original AML dose not accurately represent the vulnerability discovery trends on the datasets. The analysis shows that the modified model performs better than the original AML model for the vulnerability datasets from the major cryptocurrencies.

Detection of API(Anomaly Process Instance) Based on Distance for Process Mining (프로세스 마이닝을 위한 거리 기반의 API(Anomaly Process Instance) 탐지법)

  • Jeon, Daeuk;Bae, Hyerim
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.6
    • /
    • pp.540-550
    • /
    • 2015
  • There have been many attempts to find knowledge from data using conventional statistics, data mining, artificial intelligence, machine learning and pattern recognition. In those research areas, knowledge is approached in two ways. Firstly, researchers discover knowledge represented in general features for universal recognition, and secondly, they discover exceptional and distinctive features. In process mining, an instance is sequential information bounded by case ID, known as process instance. Here, an exceptional process instance can cause a problem in the analysis and discovery algorithm. Hence, in this paper we develop a method to detect the knowledge of exceptional and distinctive features when performing process mining. We propose a method for anomaly detection named Distance-based Anomaly Process Instance Detection (DAPID) which utilizes distance between process instances. DAPID contributes to a discovery of distinctive characteristic of process instance. For verifying the suggested methodology, we discovered characteristics of exceptional situations from log data. Additionally, we experiment on real data from a domestic port terminal to demonstrate our proposed methodology.