• Title/Summary/Keyword: Similarity Function

Search Result 557, Processing Time 0.023 seconds

Functional Analysis of ESTs from the 14-year Root of Korean Ginseng

  • Yang, Deok-Chun;In, Jun-Gyo;Kim, Moo-Sung;Jeon, Jong-Seong
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2003.04a
    • /
    • pp.125-125
    • /
    • 2003
  • To assist genetic study of the root development in Panax ginseng, which is one of the most important medicinal plant, expressed sequence tags (EST) analysis was carried out. We constructed a cDNA library using the 14-year ginseng root. Partial sequences were obtained from 2,975 clone. The ESTs could be clustered into 1,991 (70.2%) non-redundant groups. Similarity search of the non-redundant ESTs against public non-redundant databases of both protein and DNA indicated that 1,553 groups show similarity to genes of blown function. These ESTs clones were divided into sixteen categories depending upon gene function. The most abundant transcripts were ribonuclease 1 (67) and ribonuclease 2 (65). Our extensive EST analysis of genes expressed in 14-year ginseng root not only contributes to the understanding of the dynamics of genome expression patterns in root organ but also adds data to the reperoire of all genomic genes.

  • PDF

Optimization of ferrochrome slag as coarse aggregate in concretes

  • Yaragal, Subhash C.;Kumar, B. Chethan;Mate, Krishna
    • Computers and Concrete
    • /
    • v.23 no.6
    • /
    • pp.421-431
    • /
    • 2019
  • The alarming rate of depletion of natural stone based coarse aggregates is a cause of great concern. The coarse aggregates occupy nearly 60-70% by volume of concrete being produced. Research efforts are on to look for alternatives to stone based coarse aggregates from sustainability point of view. Response surface methodology (RSM) is adopted to study and address the effect of ferrochrome slag (FCS) replacement to coarse aggregate replacement in the ordinary Portland cement (OPC) based concretes. RSM involves three different factors (ground granulated blast furnace slag (GGBS) as binder, flyash (FA) as binder, and FCS as coarse aggregate), with three different levels (GGBS (0, 15, and 30%), FA (0, 15, and 30%) and FCS (0, 50, and 100%)). Experiments were carried out to measure the responses like, workability, density, and compressive strength of FCS based concretes. In order to optimize FCS replacement in the OPC based concretes, three different traditional optimization techniques were used (grey relational analysis (GRA), technique for order of preference by similarity (TOPSIS), and desirability function approach (DFA)). Traditional optimization techniques were accompanied with principal component analysis (PCA) to calculate the weightage of responses measured to arrive at the final ranking of replacement levels of GGBS, FA, and FCS in OPC based concretes. Hybrid combination of PCA-TOPSIS technique is found to be significant when compared to other techniques used. 30% GGBS and 50% FCS replacement in OPC based concrete was arrived at, to be optimal.

Similarity-Based Subsequence Search in Image Sequence Databases (이미지 시퀀스 데이터베이스에서의 유사성 기반 서브시퀀스 검색)

  • Kim, In-Bum;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.501-512
    • /
    • 2003
  • This paper proposes an indexing technique for fast retrieval of similar image subsequences using the multi-dimensional time warping distance. The time warping distance is a more suitable similarity measure than Lp distance in many applications where sequences may be of different lengths and/or different sampling rates. Our indexing scheme employs a disk-based suffix tree as an index structure and uses a lower-bound distance function to filter out dissimilar subsequences without false dismissals. It applies the normaliration for an easier control of relative weighting of feature dimensions and the discretization to compress the index tree. Experiments on medical and synthetic image sequences verify that the proposed method significantly outperforms the naive method and scales well in a large volume of image sequence databases.

A Design for Efficient Similar Subsequence Search with a Priority Queue and Suffix Tree in Image Sequence Databases (이미지 시퀀스 데이터베이스에서 우선순위 큐와 접미어 트리를 이용한 효율적인 유사 서브시퀀스 검색의 설계)

  • 김인범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.613-624
    • /
    • 2003
  • This paper proposes a design for efficient and accurate retrieval of similar image subsequences using the multi-dimensional time warping distance as similarity evaluation tool in image sequence database after building of two indexing structures implemented with priority queue and suffix tree respectively. Receiving query image sequence, at first step, the proposed method searches the candidate set of similar image subsequences in priory queue index structure. If it can not get satisfied results, it retrieves another candidate set in suffix tree index structure at second step. The using of the low-bound distance function can remove the dissimilar subsequence without false dismissals during similarity evaluating process between query image sequence and stored sequences in two index structures.

  • PDF

Structural Similarity Based Video Quality Metric using Human Visual System (구조적 유사도 기반의 인간의 시각적 특성을 이용한 비디오 품질 측정 기준)

  • Park, Jin-Cheol;Lee, Sang-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.14 no.1
    • /
    • pp.36-43
    • /
    • 2009
  • Recently, the structural similarity (SSIM) index metric is proposed. In the present paper, a new framework, which is called visual SSIM (VSSIM), is proposed by incorporating crucial human factors into the SSIM. The human factors are foveation, luminance, frequency and motion information. The performance of VSSIM is evaluated by subjective quality test compliant with the Video Quality Expert Group (VQEG) multimedia group test plan. It shows that the visual SSIM is more correlated with the subjective quality result than the conventional SSIM.

Micro-seismic monitoring in mines based on cross wavelet transform

  • Huang, Linqi;Hao, Hong;Li, Xibing;Li, Jun
    • Earthquakes and Structures
    • /
    • v.11 no.6
    • /
    • pp.1143-1164
    • /
    • 2016
  • Time Delay of Arrival (TDOA) estimation methods based on correlation function analysis play an important role in the micro-seismic event monitoring. It makes full use of the similarity in the recorded signals that are from the same source. However, those methods are subjected to the noise effect, particularly when the global similarity of the signals is low. This paper proposes a new approach for micro-seismic monitoring based on cross wavelet transform. The cross wavelet transform is utilized to analyse the measured signals under micro-seismic events, and the cross wavelet power spectrum is used to measure the similarity of two signals in a multi-scale dimension and subsequently identify TDOA. The offset time instant associated with the maximum cross wavelet transform spectrum power is identified as TDOA, and then the location of micro-seismic event can be identified. Individual and statistical identification tests are performed with measurement data from an in-field mine. Experimental studies demonstrate that the proposed approach significantly improves the robustness and accuracy of micro-seismic source locating in mines compared to several existing methods, such as the cross-correlation, multi-correlation, STA/LTA and Kurtosis methods.

A Study on the Color Functions of the Textile Design System based on CAD using Image Analysis Methods (텍스타일 디자인 캐드 시스템의 색정리 기능에 대한 정량적 분석 연구)

  • Choi, Kyung-Me;Kim, Jong-Jun
    • Journal of Fashion Business
    • /
    • v.15 no.4
    • /
    • pp.43-54
    • /
    • 2011
  • Printing process has been a major sector in the textile industries for a long period of time. With the advent of digital textile printing, the complex procedures of printing preparations and after-treatment processes have been streamlined. For the design of the motives of images to be printed, the use of image handling software, e.g. Photoshop(Adobe), has been of prime importance. Even though the software is extremely useful and functionally versatile, there are many laborious steps involved for the specific textile printing process. The use of a CAD-based textile printing function may help the textile printing process in streamlining the complex processing stages. The image qualities of the output designs have been compared objectively with the aid of several image similarity evaluation schemes including the SSIM, and FSIM Index methods.

Measures of Abnormal User Activities in Online Comments Based on Cosine Similarity (코사인 유사도 기반의 인터넷 댓글 상 이상 행위 분석 방법)

  • Kim, Minjae;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.335-343
    • /
    • 2014
  • It is more important to ensure the credibility of internet media which influence the public opinion. However, there are vague suspicions in public from the examples of manipulation of online reviews with anonymity. In this study, we explore the possibility of manipulating public opinion in online web sites. We investigate the characteristics of comments posted by users on web sites and compare each comments by using the cosine similarity function. Our result shows followings. First, we found a correlation between the similarities of comments and the article ranks in the web sites. Second, it is possible to identify abnormal user activities indicating excessive multiple posting, double posting and astroturf activities.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

Object Material Confirmation for Source Code Comparison on Embedded System (임베디드 시스템의 동일기능 소스코드 유사도 분석 요구사항)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2021
  • In case of evaluating the similarity of the source code analysis material in the embedded system, the provided source code must be confirmed to be executable. However, it is currently being in which compilation and interface matching with hardware are provided in an unconfirmed materials. The complainant assumes that many parts of the source code are similar because the characteristics of the operation are similar and the expression of the function is similar. As for the analysis result, the analysis result may appear different than expected due to these unidentified objects. In this study, the improvement direction is sugested through the case study by the analysis process of the source code and the similarity of the unverified source code.