An Investigation on Various Learning Ontology Methods using in Medical Systems

Author(s):  
R. Aravazhi ◽  
M. Chidambaram

Universal health researchers are creating, editing, investigating, incorporating, and storing huge amounts of digital medical statistics daily, through observation, testing, and replication. In the event that we could viably exchange and coordinate information from every single conceivable asset, at that point a more profound comprehension of every one of these informational indexes and better uncovered learning, alongside fitting bits of knowledge and activities, would be allowed. Tragically, as a rule, the information clients are not the information makers, and they in this way confront challenges in tackling information in unanticipated and spontaneous ways. With a specific end goal to get the capacity to incorporate heterogeneous information, and along these lines proficiently alter the customary therapeutic and organic research, new approaches created upon the undeniably inescapable cyberinfrastructure are required to conceptualize conventional medical and biological data, and gain the "profound" knowledge out of unique information from that point. As formal information portrayal models, ontologies can render precious help in such manner. In this paper, we shorten the state-of-the-art research in ontological systems and their creative application in medical and biological areas.

2018 ◽  
Vol 12 (02) ◽  
pp. 191-213
Author(s):  
Nan Zhu ◽  
Yangdi Lu ◽  
Wenbo He ◽  
Hua Yu ◽  
Jike Ge

The sheer volume of contents generated by today’s Internet services is stored in the cloud. The effective indexing method is important to provide the content to users on demand. The indexing method associating the user-generated metadata with the content is vulnerable to the inaccuracy caused by the low quality of the metadata. While the content-based indexing does not depend on the error-prone metadata, the state-of-the-art research focuses on developing descriptive features and misses the system-oriented considerations when incorporating these features into the practical cloud computing systems. We propose an Update-Efficient and Parallel-Friendly content-based indexing system, called Partitioned Hash Forest (PHF). The PHF system incorporates the state-of-the-art content-based indexing models and multiple system-oriented optimizations. PHF contains an approximate content-based index and leverages the hierarchical memory system to support the high volume of updates. Additionally, the content-aware data partitioning and lock-free concurrency management module enable the parallel processing of the concurrent user requests. We evaluate PHF in terms of indexing accuracy and system efficiency by comparing it with the state-of-the-art content-based indexing algorithm and its variances. We achieve the significantly better accuracy with less resource consumption, around 37% faster in update processing and up to 2.5[Formula: see text] throughput speedup in a multi-core platform comparing to other parallel-friendly designs.


Author(s):  
Vít Bukač ◽  
Vashek Matyáš

In this chapter, the reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly investigated, and its limitations and benefits are discussed. Seminal research findings and ideas are presented and supplied with comments. Separate sections are devoted to the protection against tampering and to the HIDS evasion techniques that are employed by attackers. Existing research trends are highlighted, and possible future directions are suggested.


Author(s):  
Riaz Ahmed Shaikh ◽  
Brian J. dAuriol ◽  
Heejo Lee ◽  
Sungyoung Lee

Until recently, researchers have focused on the cryptographic-based security issues more intensively than the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solution. In this chapter, we present generic and flexible taxonomies of privacy and trust. We also give detailed critical analyses of the state-of-the-art research, in the field of privacy and trust that is currently not available in the literature. This chapter also highlights the challenging issues and problems.


Author(s):  
Pil-Ho Lee ◽  
Haseung Chung ◽  
Sang Won Lee ◽  
Jeongkon Yoo ◽  
Jeonghan Ko

This paper reviews the state-of-the-art research related to the dimensional accuracy in additive manufacturing (AM) processes. It is considered that the improvement of dimensional accuracy is one of the major scientific challenges to enhance the qualities of the products by AM. This paper analyzed the studies for commonly used AM techniques with respect to dimensional accuracy. These studies are classified by process characteristics, and relevant accuracy issues are examined. The accuracies of commercial AM machines are also listed. This paper also discusses suggestions for accuracy improvement. With the increase of the dimensional accuracy, not only the application of AM processes will diversify but also their value will increase.


2020 ◽  
Author(s):  
Muhammad Shoaib Farooq

In this era of technology, people rely on online posted reviews before buying any product. These reviews are very important for both the consumers and people. Consumers and people use this information for decision making while buying products or investing money in any product. This has inclined the spammers to generate spam or fake reviews so that they can recommend their products and beat the competitors. Spammers have developed many systems to generate the bulk of spam reviews within hours. Many techniques, strategies have been designed and recommended to resolve the issue of spam reviews. In this paper, a complete review of existing techniques and strategies for detecting spam review is discussed. Apart from reviewing the state-of-the-art research studies on spam review detection, a taxonomy on techniques of machine learning for spam review detection has been proposed. Moreover, its focus on research gaps and future recommendations for spam review identification.


2010 ◽  
Vol 4 (2) ◽  
pp. 5-28 ◽  
Author(s):  
Behzad Hezarkhani ◽  
Wiesław Kubiak

Supply chain coordination through contracts has been a burgeoning area of re- search in recent years. In spite of rapid development of research, there are only a few structured analyses of assumptions, methods, and applicability of insights in this field. The aim of this paper is to provide a systematic overview of coordinating contracts in supply chain through highlighting the main concepts, assumptions, methods, and present the state-of-the- art research in this field.


Author(s):  
Filippo Gandino ◽  
Erwing Ricardo Sanchez ◽  
Bartolomeo Montrucchio ◽  
Maurizio Rebaudengo

This chapter deals with the use of RFID technology for improving management and security of agri-food products. In order to protect health and to make transparent the production flow of alimentary commodities, traceability is becoming mandatory for food products in an increasing number of countries. Everywhere, innovative solutions are investigated by agri-food companies in order to improve their traceability management systems. The RFID technology seems to be able to solve in a very efficient way the requirements for traceability systems, however some technological problems, such as the lack of consolidated systems, and the costs are the main obstacles to the wide adoption of RFID-based traceability systems. In this chapter the peculiarities of agri-food traceability and the most relevant results reached by the state-of-the-art research studies are detailed.


Sign in / Sign up

Export Citation Format

Share Document