MATHEMATICAL ANALYSIS OF REAL TIME DATA MINING MODEL FOR THE MEDICAL AND HEALTH CARE APPLICATION
|
|
- Blanche Elfreda Dean
- 5 years ago
- Views:
Transcription
1 International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 13, December 2018, pp , Article ID: IJMET_09_13_145 Available online at ISSN Print: and ISSN Online: IAEME Publication Scopus Indexed MATHEMATICAL ANALYSIS OF REAL TIME DATA MINING MODEL FOR THE MEDICAL AND HEALTH CARE APPLICATION J Samson Immanuel and G. Manoj, Shajin Prince Department of Electronics and Communication Engineering, Karunya Institute of Technology and Sciences (Deemed to be University), Coimbatore, India ABSTRACT Data mining models for Medical and Health care electronic data collection is a major developing field in this modern era of electronics. Data mining is done using machine languages for the medical field data collected electronically and are converted using the various data mining algorithms. In this paper, A variety of machine learning data mining intelligent tools which are accessible is discussed. In any case, over a while, not all tools are best for all issues inside the realized informational collection. The data mining model proposed in the paper is the modified cross-industrial medical data mining (CRISP- MDM). The performance of the proposed data mining retrieval method is much higher up to 30% increase in the system performance. Keywords: Data mining, machine intelligence, retrieval, CRISP-DM Cite this Article: J Samson Immanuel and G. Manoj, Shajin Prince, Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application, Journal of Mechanical Engineering and Technology, 9(13), 2018, pp INTRODUCTION At the point when data gathered electronically, in additionally, quantity and quality calculation of applied mathematics which acts as indicators inherent in the aid, and the aid relishes the various data mining (DM) [1] ways. When applying data processing in health care and drugs, additional issues like different data in different formats linguistics ability and patient privacy should be determined. The motivation of real-time analysis is the method and strategies of knowledge mining in drugs. The list of topics is directly related to: medical knowledge pre-processing strategies, medical images [2] process, and multi-relational data processing. In the literature, summary works of Philip Baylis [3][4], the means for the booming of mining of medical knowledge for the correct classification of clinical activity. Belazzi R, Zupan B [3] indicated that mining ways generally convey the data s medical specialty data regression, grouping, cataloguing and visualization tasks, to facilitate decision-making to support professionals in keeping with the first recent and sound regular literature impression, performed by Esfandiari et al. [5] editor@iaeme.com
2 J Samson Immanuel and G. Manoj, Shajin Prince 2. DATA MINING IN THE MEDICAL DOMAIN SYSTEM The long-ago decade has witnessed remarkable growth in electronic biomedical journalism, that is generated and keep digitally and is usually thought to be a reliable data source. [6] The completely different tools initially pre-process this information and regenerate into plans understood by the various tools that are in the mining method. The primary objective of this medical data mining was to develop a tool on a hand-held or a mobile machine. The design of the clinical system is shown in the figure1 [7] Generalizing both methods, the objectives of Data Mining usage for medical data's can be comprehensive into 2 main sets: Treatment resources optimization (healthcare organization domain), and Treatment quality improvement (medical treatment and research domain) [8]. In the next section, the different methodologies of data mining (DM) is discussed. 3. METHODOLOGIES OF DATA MINING The methodologies for data mining are Fayaad knowledge discovery in Database Process (KDD) model, Predictive Model Markup Language (PMML)and Sample, Explore, Modify, Model and Assess (SEMMA) process model are the most prominent (Piatetsky-Shapiro, 2014) [9] [10]. Figure 1. Data mining as a function of applied field of Clinical examination in the real-time Environment Figure 1 describes the data mining flow of the clinical examination of the data in the realtime environment in the treatment of patients in the hospitals. A. KDD process model by Fayaad's.' A review of KDD prevailing data discovery method models and available data processing (DM) standards provided by Fayaad et al.,1996. A Fayaad's summarized process model includes nine steps. Step1: Fayaad's process model in which is to understand the application domain: The first step for the process involves relevant prior knowledge of the objectives in the application of the KDD process model by Fayaad s. [13] Step2: Constructing a target dataset The construction of the target dataset is the second step consists of selecting the dataset or focus on a separating up of samples of data upon which the decision has made. Step3: Data clean-up and pre-processing The data clean up and pre-processing, is the third step which have the basic working selection, such as outliers. If necessary, collecting the required information to the description for noise, future on a verdict on strategies for treating not their data fields, and accounting for the time succession information and changes known, as well as making a decision on Data Base Management System (DBMS) [14] challenges, like the schema, data types and mapping of values editor@iaeme.com
3 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application Step4: Data trimming and projection Data trimming and prediction [15] consists of getting detection features to symbolize the data, relying on the drive of the job, and using transformation techniques decrease to decline the adequate number of variables which are organism measured, or to obtain invariant depiction for the data. Step5: Selecting the functions Data Mining Choosing the function involves selection of the purpose of the model resulted from the process of Data Mining. Step6: Selecting the Data Mining algorithm Selecting the data mining algorithm is involved in picking the procedure to be enabled for probing for patterns [16] in the data set. Selecting parameters and models may be appropriate and matching a specific Data Mining technique with the general measures of the KDD procedure. Step 7: Technique for Data mining Data mining contains a for patterns of attention in a specific portrayal arrangement or a set of sequential representations, adding regression [17], tress or classification rules, dependency, clustering, line analysis and sequence modeling. Step 8 Interpretations: Interpretations involve understanding the bring into being patterns [17] and perhaps frequent to any of the preceding steps, in addition to the conceivable picturing of the designs extricated, expelling the unessential or pointless designs and deciphering the valuable ones in footings comprehensible by clients. Step 9 Utilizing discovered knowledge Utilizing the found information includes joining this information hooked on the system s execution, taking behaviour based on the information, or only archiving it and treat it to the attentive parties, as well as reviewing and settling possible clashes with already assumed (or extricated) information. In any case, this handle demonstrates one of the foremost referenced and utilized for common Knowledge Dataset Discovery [18] purposes, and it got to be the base demonstrate for other more point by point models. B. Cross Industrial Specific Process - MDM It suggests an iterative prepare stream, with leniently characterized circles in between stages, and a by and large iterative patterned nature of the MDM venture itself. The five stages of CRISP- MDM are given underneath and are as takes after: Phase 1: Medical understanding The primary stage places of intrigued the astute of the destinations of the restorative information investigation and the interpretation of these necessities, from the viewpoint of the subject range, and the issue defined into a definition of the Restorative Data Mining issue. In this stage, the starting arrangement of achievement of objectives is decided, noteworthy the victory model. Phase 2: Data preparations The second phase begins with the congregation of first phase data and admittance to the dataset. The process is the preparation of data, and the phase extend over all the activities that are inexpensive. Issues of information fidelity must be recognized and the introductory presumptions of which datasets might be of mindfulness for advance phases. The exercises of the information arrangement stage enormously depend on the highlights and the quality of the initial crude editor@iaeme.com
4 J Samson Immanuel and G. Manoj, Shajin Prince information. A few of the personal errands of information arrangement include choosing the tables, qualities projections, and records, and traits change. Phase 3: Modeling of the data set In this third case, a suitable selection made for modeling techniques, algorithms, or combinations. Usually, for the same task, there are a few possible modeling methods available. Thus, this step performed repeatedly in an iterative implies until the select demonstrate prominence criteria accomplished. Few routines have precise data standard limitations or data types. The modeling quality of the dataset assessed to arrange, to assess the value of the model, there are standard of measurements used which are significant in Data Mining and statistics: Precisions The proportion of properly classified objects. Specificity Adverse results suitably classified as such in the results set, e.g., sensitivity, accuracy, specificity, ROC curve, and cumulative gain chart. Sensitivity - The relationship between sensitivity and specificity evaluated using a ROC curve (Receiver Operating Characteristic) or a mathematical expression of the area below the curve (AUC)[19]. Cumulative Gain charts display the value of constructive retorts related by the models against the percentage of the populace. Phase 4: Evaluating of Dataset he assessment stage as of now contains aactually high-quality demonstration on a few models. Earlier to the ultimate stage of of the assessment of information set out the demonstrate, it is fundamental to evaluate it carefully, to survey the development steps, and make beyond any doubt that commerce goals accomplished appropriately. The ultimate result of the stage the possibility of whether the Data Mining comes about May down to utilized earth settings. Phase 5: Deployment of the dataset The ultimate stage, i.e., the arrangement stage stipulates the effective use of the comes about of MDM. Model inception isn t the ultimate step of the MDM extend. In spite of the cases where obtained information ought to be organized and displayed to the conclusion client in reasonable shape. Determining the set of necessities, arrangement stage may include, for the best case, a statement or sending of a rehashed Data mining prepare. Regularly, it'll be the conclusion client, instead of the information examiner who will carry out the sending exercises. It is imperative that the conclusion the client expects the activities required to be carried out in arrange to induce the viable benefits of the produced MDM to demonstrate. Figure 2 The design flow of the Medical data mining using R software editor@iaeme.com
5 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application 4. DESCRIPTIVE MEDICAL DATA MINING MODELLING The experimental trial is conducted using the medical data of the echocardiography data analysis and additional claim of the analytical data mining methods, is done using the software. The software used for the development of image processing procedures and predictive modelling is realised in the R environment., = Where the value of simt given as in equation 2 $ " = # # ( (!, (!! $ " ' = # # (() ) (!,() ) (!! $ " * = # # +, - (!,, - (!. The formula of similarity value is sensible to assign the weighted value of the fine-tuned of weighed parameter wt, wu and wv have performed. In the experiment both the statistical and the weighted are relative to the number of the tuples of the related entity. / =,/ 0 =,/ 1 = (1) (2) (3) (4) (5) A. Applying publication meta-analysis clustering The meta-analysis clustering applied to Table 1 for medical data mining in the system using the CRISP model's scoring points for two strategies applied in the system considered the test. The phase classified into four phase of medical data (MD) understanding, and the preparation of the system is very significant. Phase TABLE I. Requirements for the SCORING CRISP_MDM Number of Activity Strategy 1 Strategy 2 Evaluating points Evaluating points MD Understanding MD preparation MD Evaluation MD Deployment Various methods do the accuracy of the different tools used to retrieve the medical data mining in the real-time analysis of the clinical data has given as follows in Table II the experimental analysis of the various Medical data mining accuracy as given below. Table II. Experimental accuracy of various tools for Medical Data Accuracy S.No. Tools Experiment Accuracy 1 WEKA Decision Table % 2 WEKA Decision Tree % 3 WEKA Naïve Bayes % 4 Discover*E Decision Tree % 5 Discover*E Dependence Tree % 6 Discover*E Rule-based Classifier % 7 Linear Vector Quantization % editor@iaeme.com
6 J Samson Immanuel and G. Manoj, Shajin Prince The accuracy of the data obtained over a while through the different tool, as shown in figure 3. The accuracy of the data obtained over the different tool over a period as shown in figure 3. The lowest rate of accuracy as given in the pie chart below shows the performance metrics of the modified algorithm. Figure 3. Incremental accuracy of medical data mining of various tools. 5. CONCLUSION A comparative study for medical databases. Set (MDS) concerning the psychological health patients have done. The MDS-MH is a typical assessment means for assessing patients with issues allied to psychological health. CRISP medical data mining has been successfully mathematically modeled, and the accuracy models of the various techniques have done in the medical domains. Applying CRISP-Medical Data Mining with the proposed echocardiography image preprocessing techniques proved that the resultant precision is adequate for real-world decision making. Furthermore, the resulting models which currently installed in the healthcare facility; therefore, the Deployment phase of the data diagnostics. REFERENCES [1] W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp [2] P. Baylis, "Better Health Care with Data Mining," SPSS White Paper, UK, 1999 [3] Bellazzi, R., Zupan, B. (2008, Feb). Predictive data mining in clinical medicine: current issues and guidelines. Int J Med Inform, 77(2), [4] H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. [5] E. H. Miller, "A note on reflector arrays (Periodical style Accepted for publication)," IEEE Trans. Antennas Propagat., to be published. [6] J. Wang, "Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style Submitted for publication)," IEEE J. Quantum Electron., submitted for publication. [7] M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, [8] J. U. Duncombe, "Infrared navigation Part I: An assessment of feasibility (Periodical style)," IEEE Trans. Electron Devices, vol. ED-11, pp , Jan [Online]. Available: editor@iaeme.com
7 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application [9] S. Chen, B. Mulgrew, and P. M. Grant, "A clustering technique for digital communications channel equalization using radial basis function networks," IEEE Trans. Neural Networks, vol. 4, pp , Jul [10] R. W. Lucky, "Automatic equalization for digital communication," Bell Syst. Tech. J., vol. 44, no. 4, pp , Apr [11] S. P. Bingulac, "On the compatibility of adaptive controllers (Published Conference Proceedings style)," in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp [12] G. R. Faulhaber, "Design of service systems with priority reservation," in Conf. Rec IEEE Int. Conf. Communications, pp [13] Waljee, A. K. H. P. D. &. S. A. G., A primer on predictive models. Clinical and translational gastroenterology, 5(1), p. e44. [14] Wehlou, M., Rethinking the Electronic Healthcare Record. S.l.: MITM - Man In The Middle AB. [15] Thomson Reuters Web of Science, Thomson Reuters Web of Science. [Online]. Available at: [Accessed ]. [16] Tibco, Inc., TIBCO Spotfire Miner 8.2 User s Guide. [Accessed ] [17] Yeh, J.Y., Wu, T.-H. & Tsao, C.-W., Using data mining techniques to predict hospitalization of hemodialysis patients. Decision Support Systems, 50(2), pp [18] Yoo, I. et al., Data mining in healthcare and biomedicine: a survey of the literature. Journal of medical systems, 36(4), pp editor@iaeme.com
Shunt Harmonic Compensator Design for Using Fuzzy Logic Controller
Shunt Harmonic Compensator Design for Using Fuzzy Logic Controller Y. Shiva Prasad M.Tech (PE) Student Avanthi Engineering College, Visakhapatnam, India. Abstract Active Power Filters (APFs) are one of
More informationINTELLIGENT APRIORI ALGORITHM FOR COMPLEX ACTIVITY MINING IN SUPERMARKET APPLICATIONS
Journal of Computer Science, 9 (4): 433-438, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.433.438 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) INTELLIGENT APRIORI ALGORITHM FOR COMPLEX
More informationIBM SPSS Neural Networks
IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming
More informationINTELLIGENT SOFTWARE QUALITY MODEL: THE THEORETICAL FRAMEWORK
INTELLIGENT SOFTWARE QUALITY MODEL: THE THEORETICAL FRAMEWORK Jamaiah Yahaya 1, Aziz Deraman 2, Siti Sakira Kamaruddin 3, Ruzita Ahmad 4 1 Universiti Utara Malaysia, Malaysia, jamaiah@uum.edu.my 2 Universiti
More informationPREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm
PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm Ekaterina S. Ponomareva, Kesheng Wang, Terje K. Lien Department of Production and Quality Engieering,
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationMachine Learning, Data Mining, and Knowledge Discovery: An Introduction
Machine Learning, Data Mining, and Kwledge Discovery: An Introduction Outline Data Mining Application Examples Data Mining & Kwledge Discovery Data Mining with Weka AHPCRC Workshop - 8/16/11 - Dr. Martin
More informationCombining scientometrics with patentmetrics for CTI service in R&D decisionmakings
Combining scientometrics with patentmetrics for CTI service in R&D decisionmakings ---- Practices and case study of National Science Library of CAS (NSLC) By: Xiwen Liu P. Jia, Y. Sun, H. Xu, S. Wang,
More informationSoftware as a Medical Device (SaMD)
Software as a Medical Device () Working Group Status Application of Clinical Evaluation Working Group Chair: Bakul Patel Center for Devices and Radiological Health US Food and Drug Administration NWIE
More informationA Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy
A Case Study on the Use of Unstructured Data in Healthcare Analytics Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics: Analysis of Images
More informationContents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements
Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii
More informationA Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects
2011 International Conference on Modeling, Simulation and Control IPCSIT vol.10 (2011) (2011) IACSIT Press, Singapore A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects
More informationTo be published by IGI Global: For release in the Advances in Computational Intelligence and Robotics (ACIR) Book Series
CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: September 15, 2014 Emerging Technologies in Intelligent Applications for Image and Video Processing A book edited by Dr. V. Santhi (VIT University,
More informationCC4.5: cost-sensitive decision tree pruning
Data Mining VI 239 CC4.5: cost-sensitive decision tree pruning J. Cai 1,J.Durkin 1 &Q.Cai 2 1 Department of Electrical and Computer Engineering, University of Akron, U.S.A. 2 Department of Electrical Engineering
More informationClassification Experiments for Number Plate Recognition Data Set Using Weka
Classification Experiments for Number Plate Recognition Data Set Using Weka Atul Kumar 1, Sunila Godara 2 1 Department of Computer Science and Engineering Guru Jambheshwar University of Science and Technology
More informationCollege of Information Science and Technology
College of Information Science and Technology Drexel E-Repository and Archive (idea) http://idea.library.drexel.edu/ Drexel University Libraries www.library.drexel.edu The following item is made available
More informationDC Motor Speed Control: A Case between PID Controller and Fuzzy Logic Controller
DC Motor Speed Control: A Case between PID Controller and Fuzzy Logic Controller Philip A. Adewuyi Mechatronics Engineering Option, Department of Mechanical and Biomedical Engineering, Bells University
More informationCOMPARISON OF MACHINE LEARNING ALGORITHMS IN WEKA
COMPARISON OF MACHINE LEARNING ALGORITHMS IN WEKA Clive Almeida 1, Mevito Gonsalves 2 & Manimozhi R 3 International Journal of Latest Trends in Engineering and Technology Special Issue SACAIM 2017, pp.
More informationPatent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis
Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis by Chih-Ping Wei ( 魏志平 ), PhD Institute of Service Science and Institute of Technology Management National Tsing Hua
More informationIntroduction to Computational Intelligence in Healthcare
1 Introduction to Computational Intelligence in Healthcare H. Yoshida, S. Vaidya, and L.C. Jain Abstract. This chapter presents introductory remarks on computational intelligence in healthcare practice,
More informationQuality Measure of Multicamera Image for Geometric Distortion
Quality Measure of Multicamera for Geometric Distortion Mahesh G. Chinchole 1, Prof. Sanjeev.N.Jain 2 M.E. II nd Year student 1, Professor 2, Department of Electronics Engineering, SSVPSBSD College of
More informationQuantitative Reasoning: It s Not Just for Scientists & Economists Anymore
Quantitative Reasoning: It s Not Just for Scientists & Economists Anymore Corri Taylor Quantitative Reasoning Program Wellesley College ctaylor1@wellesley.edu In today s world awash in numbers, strong
More informationGenerating Groove: Predicting Jazz Harmonization
Generating Groove: Predicting Jazz Harmonization Nicholas Bien (nbien@stanford.edu) Lincoln Valdez (lincolnv@stanford.edu) December 15, 2017 1 Background We aim to generate an appropriate jazz chord progression
More informationSpatial-Temporal Data Mining in Traffic Incident Detection
Spatial-Temporal Data Mining in Traffic Incident Detection Ying Jin, Jing Dai, Chang-Tien Lu Department of Computer Science, Virginia Polytechnic Institute and State University {jiny, daij, ctlu}@vt.edu
More informationImage Finder Mobile Application Based on Neural Networks
Image Finder Mobile Application Based on Neural Networks Nabil M. Hewahi Department of Computer Science, College of Information Technology, University of Bahrain, Sakheer P.O. Box 32038, Kingdom of Bahrain
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationJournal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS
List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE
More informationOptimal Adaptive Filtering Technique for Tamil Speech Enhancement
Optimal Adaptive Filtering Technique for Tamil Speech Enhancement Vimala.C Project Fellow, Department of Computer Science Avinashilingam Institute for Home Science and Higher Education and Women Coimbatore,
More informationDisruption Classification at JET with Neural Techniques
EFDA JET CP(03)01-65 M. K. Zedda, T. Bolzonella, B. Cannas, A. Fanni, D. Howell, M. F. Johnson, P. Sonato and JET EFDA Contributors Disruption Classification at JET with Neural Techniques . Disruption
More informationStructural Analysis of Agent Oriented Methodologies
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 613-618 International Research Publications House http://www. irphouse.com Structural Analysis
More informationEmpirical Mode Decomposition: Theory & Applications
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 873-878 International Research Publication House http://www.irphouse.com Empirical Mode Decomposition:
More informationData and Knowledge as Infrastructure. Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation
Data and Knowledge as Infrastructure Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation 1 Motivation Easy access to data The Hello World problem (courtesy: R.V. Guha)
More informationInternational Journal of Computer Techniques - Volume 2 Issue 5, Sep Oct 2015
RESEARCH ARTICLE Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm Karandeep Kaur*, Ms. Poonamdeep Kaur**, Ms. Lovepreet Kaur*** *(Student (Computer Science & Engineering), Guru
More informationViews from a patent attorney What to consider and where to protect AI inventions?
Views from a patent attorney What to consider and where to protect AI inventions? Folke Johansson 5.2.2019 Director, Patent Department European Patent Attorney Contents AI and application of AI Patentability
More informationRevisiting the USPTO Concordance Between the U.S. Patent Classification and the Standard Industrial Classification Systems
Revisiting the USPTO Concordance Between the U.S. Patent Classification and the Standard Industrial Classification Systems Jim Hirabayashi, U.S. Patent and Trademark Office The United States Patent and
More informationA Novel Fuzzy Neural Network Based Distance Relaying Scheme
902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new
More informationUsing Agent-Based Methodologies in Healthcare Information Systems
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 2 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0033 Using Agent-Based Methodologies
More informationLife Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued)
Life Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued) Projects sorted and classified as: 1. Overarching AM Program
More informationMultiagent System for Home Automation
Multiagent System for Home Automation M. B. I. REAZ, AWSS ASSIM, F. CHOONG, M. S. HUSSAIN, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - Smart-home
More informationThe compliance of Iranian library and information science journals with Thomson Reuters basic standards
Original Article: The compliance of Iranian library and information science journals with Thomson Reuters basic standards Saeideh Valizadeh-Haghi 1, Ronak Hamzehei 2, 3 * 1 Department of Medical Library
More informationWorkshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF
Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization
More informationMATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233
MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 I. Introduction and Background Over the past fifty years,
More informationPETROLEUM ENGINEERING LEARNING PROVOCATION
International Journal of Production Technology and Management (IJPTM) Volume 6, Issue 2, July-Dec 2015, pp. 16-20, Article ID: IJPTM_06_02_003 Available online at http://www.iaeme.com/ijptm/issues.asp?jtype=ijptm&vtype=6&itype=2
More informationAn Improved Path Planning Method Based on Artificial Potential Field for a Mobile Robot
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No Sofia 015 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0037 An Improved Path Planning Method Based
More informationInformation Infrastructure II (Data Mining) I211
Information Infrastructure II (Data Mining) I211 Spring 2010 Basic Information Class meets: Time: MW 9:30am 10:45am Place: I2 130 Instructor: Predrag Radivojac Office: Informatics 219 Email: predrag@indiana.edu
More informationResource Review. In press 2018, the Journal of the Medical Library Association
1 Resource Review. In press 2018, the Journal of the Medical Library Association Cabell's Scholarly Analytics, Cabell Publishing, Inc., Beaumont, Texas, http://cabells.com/, institutional licensing only,
More informationA Study On Preprocessing A Mammogram Image Using Adaptive Median Filter
A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter Dr.K.Meenakshi Sundaram 1, D.Sasikala 2, P.Aarthi Rani 3 Associate Professor, Department of Computer Science, Erode Arts and Science
More information(ii) Methodologies employed for evaluating the inventive step
1. Inventive Step (i) The definition of a person skilled in the art A person skilled in the art to which the invention pertains (referred to as a person skilled in the art ) refers to a hypothetical person
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationExtraction and Recognition of Text From Digital English Comic Image Using Median Filter
Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com
More informationPrivacy preserving data mining multiplicative perturbation techniques
Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data
More informationMeasuring and Analyzing the Scholarly Impact of Experimental Evaluation Initiatives
Measuring and Analyzing the Scholarly Impact of Experimental Evaluation Initiatives Marco Angelini 1, Nicola Ferro 2, Birger Larsen 3, Henning Müller 4, Giuseppe Santucci 1, Gianmaria Silvello 2, and Theodora
More informationTuning Of Conventional Pid And Fuzzy Logic Controller Using Different Defuzzification Techniques
Tuning Of Conventional Pid And Fuzzy Logic Controller Using Different Defuzzification Techniques Afshan Ilyas, Shagufta Jahan, Mohammad Ayyub Abstract:- This paper presents a method for tuning of conventional
More informationhttp://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World
More informationScalable systems for early fault detection in wind turbines: A data driven approach
Scalable systems for early fault detection in wind turbines: A data driven approach Martin Bach-Andersen 1,2, Bo Rømer-Odgaard 1, and Ole Winther 2 1 Siemens Diagnostic Center, Denmark 2 Cognitive Systems,
More informationTechniques for Sentiment Analysis survey
I J C T A, 9(41), 2016, pp. 355-360 International Science Press ISSN: 0974-5572 Techniques for Sentiment Analysis survey Anu Sharma* and Savleen Kaur** ABSTRACT A Sentiment analysis is a technique to analyze
More informationAn Exploratory Study of Design Processes
International Journal of Arts and Commerce Vol. 3 No. 1 January, 2014 An Exploratory Study of Design Processes Lin, Chung-Hung Department of Creative Product Design I-Shou University No.1, Sec. 1, Syuecheng
More informationA Metric-Based Machine Learning Approach to Genealogical Record Linkage
A Metric-Based Machine Learning Approach to Genealogical Record Linkage S. Ivie, G. Henry, H. Gatrell and C. Giraud-Carrier Department of Computer Science, Brigham Young University Abstract Genealogical
More informationDESIGN OF HIGH PERFORMANCE MODIFIED RADIX8 BOOTH MULTIPLIER
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 27, pp. 376 382, Article ID: IJMET_8_8_4 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=8
More informationThe exponentially weighted moving average applied to the control and monitoring of varying sample sizes
Computational Methods and Experimental Measurements XV 3 The exponentially weighted moving average applied to the control and monitoring of varying sample sizes J. E. Everett Centre for Exploration Targeting,
More informationBiomedical Equipment Technician
Biomedical Equipment Technician Occupational Skill Stards Texas Skill Stards Board Recognized Critical Work Function 1. Install Biomedical Equipment 1.1 Receive, inspect inventory upon delivery 1.2 Deliver
More informationApplication of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2
Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2 Department of Electrical Engineering, Deenbandhu Chhotu Ram University
More informationKnowledge discovery & data mining Classification & fraud detection
Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection 5/24/00 Click here to start Table of Contents Author: Dino Pedreschi
More informationPreference-based Organization Interfaces: Aiding User Critiques in Recommender Systems
Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems Li Chen and Pearl Pu Human Computer Interaction Group, School of Computer and Communication Sciences Swiss Federal
More informationEnergy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management
Paper ID #7196 Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management Dr. Hyunjoo Kim, The University of North Carolina at Charlotte
More informationL(p) 0 p 1. Lorenz Curve (LC) is defined as
A Novel Concept of Partial Lorenz Curve and Partial Gini Index Sudesh Pundir and Rajeswari Seshadri Department of Statistics Pondicherry University, Puducherry 605014, INDIA Department of Mathematics,
More informationLow Power Approach for Fir Filter Using Modified Booth Multiprecision Multiplier
Low Power Approach for Fir Filter Using Modified Booth Multiprecision Multiplier Gowridevi.B 1, Swamynathan.S.M 2, Gangadevi.B 3 1,2 Department of ECE, Kathir College of Engineering 3 Department of ECE,
More informationI. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:
A Friend Recommendation System based on Similarity Metric and Social Graphs Rashmi. J, Dr. Asha. T Department of Computer Science Bangalore Institute of Technology, Bangalore, Karnataka, India rash003.j@gmail.com,
More informationSocial Events in a Time-Varying Mobile Phone Graph
Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute 1, Jorge Brea 1, Javier Burroni 1, Klaus Wehmuth 2, Artur Ziviani 2, and J.I. Alvarez-Hamelin 3 1 Grandata Labs, Argentina 2 LNCC, Brazil
More informationCOMPARATIVE ANALYSIS OF ACCURACY ON MISSING DATA USING MLP AND RBF METHOD V.B. Kamble 1, S.N. Deshmukh 2 1
COMPARATIVE ANALYSIS OF ACCURACY ON MISSING DATA USING MLP AND RBF METHOD V.B. Kamble 1, S.N. Deshmukh 2 1 P.E.S. College of Engineering, Aurangabad. (M.S.) India. 2 Dr. Babasaheb Ambedkar Marathwada University,
More informationMinistry of Justice: Call for Evidence on EU Data Protection Proposals
Ministry of Justice: Call for Evidence on EU Data Protection Proposals Response by the Wellcome Trust KEY POINTS It is essential that Article 83 and associated derogations are maintained as the Regulation
More informationA No Reference Image Blur Detection using CPBD Metric and Deblurring of Gaussian Blurred Images using Lucy-Richardson Algorithm
A No Reference Image Blur Detection using CPBD Metric and Deblurring of Gaussian Blurred Images using Lucy-Richardson Algorithm Suresh S. Zadage, G. U. Kharat Abstract This paper addresses sharpness of
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationImplementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise
International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS Implementation of Block based Mean and Median Filter for Removal of
More informationTechnology Roadmap using Patent Keyword
Technology Roadmap using Patent Keyword Jongchan Kim 1, Jiho Kang 1, Joonhyuck Lee 1, Sunghae Jun 3, Sangsung Park 2, Dongsik Jang 1 1 Department of Industrial Management Engineering, Korea University
More informationAndalusian Agency for Health Technology Assessment (AETSA)
Andalusian Agency for Health Technology Assessment (AETSA) Seville, 22 nd of July, 2016 Comments on the concept paper Facilitating the translation of advanced therapies to patients in Europe 1 Introduction
More informationModelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema
Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Neeraj Sharma Associate Professor Department of Computer Science Punjabi University, Patiala (India) ABSTRACT
More informationLossy Compression of Permutations
204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationPredicting Content Virality in Social Cascade
Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,
More informationEfficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.
Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationHTA Position Paper. The International Network of Agencies for Health Technology Assessment (INAHTA) defines HTA as:
HTA Position Paper The Global Medical Technology Alliance (GMTA) represents medical technology associations whose members supply over 85 percent of the medical devices and diagnostics purchased annually
More informationClassification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine
Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah
More informationDesign and Implementation of Gaussian, Impulse, and Mixed Noise Removal filtering techniques for MR Brain Imaging under Clustering Environment
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 265-272 Research India Publications http://www.ripublication.com Design and Implementation of Gaussian, Impulse,
More informationApplication of Data Mining Techniques for Tourism Knowledge Discovery
Application of Data Mining Techniques for Tourism Knowledge Discovery Teklu Urgessa, Wookjae Maeng, Joong Seek Lee Abstract Application of five implementations of three data mining classification techniques
More informationLocation Services with Riverbed Xirrus APPLICATION NOTE
Location Services with Riverbed Xirrus APPLICATION NOTE Introduction Indoor location tracking systems using Wi-Fi, as well as other shorter range wireless technologies, have seen a significant increase
More informationThis list supersedes the one published in the November 2002 issue of CR.
PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.
More informationBiometrics Final Project Report
Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was
More informationSpeech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm A.T. Rajamanickam, N.P.Subiramaniyam, A.Balamurugan*,
More informationDifferentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern
Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent
More informationSoftware Maintenance Cycles with the RUP
Software Maintenance Cycles with the RUP by Philippe Kruchten Rational Fellow Rational Software Canada The Rational Unified Process (RUP ) has no concept of a "maintenance phase." Some people claim that
More informationResolution Enhancement and Frequency Compounding Techniques in Ultrasound.
Resolution Enhancement and Frequency Compounding Techniques in Ultrasound. Proposal Type: Innovative Student PI Name: Kunal Vaidya PI Department: Chester F. Carlson Center for Imaging Science Position:
More informationExploring the New Trends of Chinese Tourists in Switzerland
Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:
More informationHarmonic Distortion Levels Measured at The Enmax Substations
Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned
More informationReflector A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis
Reflector A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis Behroz Mirza MS Computing, Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 90 and 100 Clifton
More information& Medical Tourism. DIHTF - Dubai 20 th -21 st Feb 2018 V S Venkatesh -India
& Medical Tourism DIHTF - Dubai 20 th -21 st Feb 2018 V S Venkatesh -India The human brain is an amazing work of art, it has very complex neural circuits and the way it registers, stores, processes and
More informationLIST OF PUBLICATIONS
Dr.Shomona Gracia Jacob Associate Professor CSE SSN College of Engineering, Kalavakkam, Chennai. LIST OF PUBLICATIONS International Journals (SCI Thomson Reuters Indexed) 1. Ramani RG, Jacob SG, HIV1-Human
More informationDesign of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time Process
International Journal of Electronics and Computer Science Engineering 538 Available Online at www.ijecse.org ISSN- 2277-1956 Design of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time
More information