Geo-Ontology and Geographical Information System Extended by a first-order logic language: Application to malaria control 

 

Guillaume Koum[1]Josiane Etang [2],[3]
[1] Département d’Informatique. Ecole Nationale Supérieure Polytechnique. B.P. 8390
Yaoundé, Cameroun
[2] Organisation de Coordination pour la lutte contre les Endémies en Afrique Centrale
B.P. 288 Yaoundé, Cameroun
[3] Faculté de Médecine et de Sciences pharmaceutiques. Université de Douala, B.P.
2701 Douala, Cameroun

c

Abstract
A geo-ontology can be built around a Geographic Information System (GIS) and enriched with a firstorder logic language under the closed-world assumption (CWA). This extended system provides knowledge representation formalisms that are aimed to describe general conceptual information. They can also be used in the construction of the knowledge base of a reasoning tool. In this paper an environment is defined where a geo-ontology offers possibilities with a system that allows users to represent and reason about some aspects of the real world. With respect to the added intelligence; knowledge is preserved and enhanced. Knowledge enhancement is performed under the CWA in a subset of the first-order logic language. A geo-reasoning task is undertaken so that a GIS and a geo-ontology are integrated in what can correspond to a natural language processing system. The framework is implemented to demonstrate geo-ontology’s ability to enhance knowledge in malaria control domain.


Keywords: geographic information system, geo-ontology; closed-world assumption, geo-reasoning,
malaria control.

 

 

Volume url; https://wireilla.com/ijbb/vol2.html

PDF URL; https://wireilla.com/papers/ijbb/V2N3/2312ijbb01.pdf

IDENTIFICATION OF CONSERVED FUNCTIONAL MOTIFS IN LACTOFERRIN USING MEME


* Shashank Rana1

Shrikant Sharma1

1. Research Scholar, Bioinformatics Facility, Department of Immunology, College of Biotechnology, Sardar VallabhBhai Patel University of Agriculture & Technology. Meerut (U.P.)

Raghvendar Singh2 

2. Head of Department, Bioinformatics Facility, Department of Immunology, College of Biotechnology, SardarVallabhBhai Patel University of Agriculture & Technology. Meerut (U.P.)

VOLUME URL; https://wireilla.com/ijbb/vol2.html

PDF URL; https://wireilla.com/papers/ijbb/V2N4/2412ijbb03.pdf

DESIGNING A NOVEL APPROACH FOR FINGERPRINT BIOMETRIC DETECTION: BASED ON MINUTIAE EXTRACTION

Hossein Jadidoleslamy

Information Technology Engineering Group, Department of Information Technology,
Communications and Security,
University of Malek Ashtar, Tehran, Iran

 

ABSTRACT
People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching algorithm in this area; of course, this algorithm also has been presented based on comparing fingerprint features (especially minutiae points).


KEYWORDS
Biometric, Fingerprint, Minutiae, Automated Fingerprint Identification System (AFIS), Extraction, Matching

VOLUME URL; https://wireilla.com/ijbb/vol2.html

PDF URL; https://wireilla.com/papers/ijbb/V2N4/2412ijbb02.pdf

BIOMETRIC SYSTEM PENETRATION IN RESOURCE
CONSTRAINED MOBILE DEVICE

M.SUJITHRA1 AND DR G. PADMAVATHI 2
1Assistant Professor, Department of Computer Technology & Applications,
Coimbatore Institute of Technology,
2Professor& Head, Department of Computer Science,
Avinashilingam Institute for Home Science and Higher Education for Women,
Coimbatore, Tamil Nadu, India.

ABSTRACT
Over the past few years, the usage of mobile devices to access data hasbecoming more frequent, and the usage of mobile devices in the applications such as web-browsing, email, multimedia, entertainment applications (games, videos, and audios), navigation, trading stocks, electronic purchase, banking and health care are increased, therefore data security is essential and also it becomes a challenge in securing the data in the mobile device. User authentication schemes such as Password or Personal Identificatio Number (PIN) based authentication in mobile device is a difficult process for providing safe access to precious, private information or personalized services. To address these problems in the mobile devices, biometric system can be developed which are more secure, affordable and memorable authentication scheme based on graphical assistance, images and audio. We believe that biometric authentication is the most secure approach among other authentication mechanism. This paper discusses the various features of biometrics and mobile device security threats.

KEYWORDS
Biometrics, Mobile Device, Authentication, Threats, Security

Volume URL; https://wireilla.com/ijbb/vol3.html

PDF URL; https://wireilla.com/papers/ijbb/V3N1/3113ijbb04.pdf

SRAMM: SHORT READ ALIGNMENT MAPPING METRICS

Alvin Chon and Xiaoqiu Huang

1Bioinformatics and Computational Biology Graduate Program, Iowa State
University, Ames, IA 50010, USA
2Department of Computer Science, Iowa State University, Ames, IA 50010, USA

ABSTRACT

Short Read Alignment Mapping Metrics (SRAMM): is an efficient and versatile command line tool providing additional short read mapping metrics, filtering, and graphs. Short read aligners report MAPing Quality (MAPQ), but these methods generally are neither standardized nor well described in literature or software manuals. Additionally, third party mapping quality programs are typically computationally intensive or designed for specific applications. SRAMM efficiently generates multiple different concept-based mapping scores to provide for an informative post alignment examination and filtering process of aligned short reads for various downstream applications. SRAMM is compatible with Python 2.6+ and Python 3.6+ on all operating systems. It works with any short read aligner that generates SAM/BAM/CRAM file outputs and reports ‘AS’ tags. It is freely available under the MIT license at http://github.com/achon/sramm.

KEYWORDS

Bioinformatics, ngs, short read alignments, mapq, quality filtering

For More details: https://wireilla.com/papers/ijbb/V11N2/11221ijbb01.pdf

TI Implant Hole Quality Improvement with new Tool Designed

Quanli Han and Dongchen Han

ABSTRACT
Ti-implant is drilled to get hole in nearly each operation and hole quality took great effect on success of operation .This paper aims at the research of drilling characteristics of through hole on ti-implant, specially the macro-burrs formed after drilling which determined the cost of implant largely. Series experiments were conducted to analysis the effect of processing parameter on formed burr, particularly the axial feed, had a great effect on volume burr. Experiments finds that, the volume of burr at hole entrant is less than that at hole exit, and the burr volume has great effect on workpiece quality and product cost, the burr height formed easily decreases because great attention from scholars and engineers has been paid to, while the burr width size despised naturally plays a great influence on product quality and machining cost. Finally, The new de-burring tool are designed and applied in experiment, the decrease in burr width is obviously found, so the removal of burrs becomes much little than that gotten in traditional tool. The result indicates a promising future of de-burring in practical application.

KEYWORDS

Drilling, Burr, De-Burr, Hole Exit, Hole Entrance.

For More Details: https://wireilla.com/papers/ijbb/V9N1/9119ijbb01.pdf

Survey on Modelling Methods Applicable to Gene Regulatory Network

Chanda Panse and Manali Kshirsagar

ABSTRACT

Gene Regulatory Network (GRN) plays an important role in knowing insight of cellular life cycle. It gives information about at which different environmental conditions genes of particular interest get over expressed or under expressed. Modelling of GRN is nothing but finding interactive relationships between genes. Interaction can be positive or negative. For inference of GRN, time series data provided by Microarray technology is used. Key factors to be considered while constructing GRN are scalability, robustness, reliability and maximum detection of true positive interactions between genes. This paper gives detailed technical review of existing methods applied for building of GRN along with scope for future work.

KEYWORDS

Gene Regulatory Network, Microarray, robustness, scalability, reliability

For More Details: https://wireilla.com/papers/ijbb/V3N3/3313ijbb02.pdf

A Morphological Multiphase Active Contour for Vascular Segmentation

Victoria L. Fox, Mariofana Milanova and Salim Al-Ali

ABSTRACT

This paper presents a morphological active contour ideal for vascular segmentation in biomedical images. The unenhanced images of vessels and background are successfully segmented using a two-step morphological active contour based upon Chan and Vese’s Active Contour without Edges. Using dilation and erosion as an approximation of curve evolution, the contour provides an efficient, simple, and robust alternative to solving partial differential equations used by traditional level-set Active Contour models. The
proposed method is demonstrated with segmented data set images and compared to results garnered from multiphase Active Contour without Edges, morphological watershed, and Fuzzy C-means segmentations.

KEYWORDS

Active Contour, Morphology, Segmentation, Curve Evolution

For More details: https://wireilla.com/papers/ijbb/V3N3/3313ijbb01.pdf

Sliding Mode Controller Design for The Global Chaos Synchronization of Rucklidge Chaotic Systems

Sundarapandian Vaidyanathan

ABSTRACT

This paper describes the design of sliding mode controller for the global chaos synchronization of identical Rucklidge chaotic systems (Rucklidge, 1992). Rucklidge chaotic system is one of the paradigms of threedimensional chaotic systems. The stability results derived in this paper for the complete synchronization of the identical Rucklidge chaotic systems via sliding mode control are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the sliding mode control method is very effective and convenient to achieve global chaos synchronization of Rucklidge chaotic systems. Numerical simulations are presented to demonstrate the effectiveness of to the synchronization schemes derived in this paper for the identical Rucklidge chaotic systems.

KEYWORDS
Sliding Mode Control, Chaos Synchronization, Chaotic Systems, Rucklidge Systems

For More details: https://wireilla.com/papers/ijbb/V2N1/2112ijbb03.pdf

Design a site like this with WordPress.com
Get started