Filters








1,536 Hits in 6.3 sec

Chemical and Textual Embeddings for Drug Repurposing

Galia Nordon, Levi Gottlieb, Kira Radinsky
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
We eventually present a novel embedding technique to combine the merit of the textual and chemical-based approaches. We provide empirical results on a repositioning benchmark set.  ...  Additionally, we present an application of such embedding as part of an ongoing repositioning research conducted with a major health care supplier, and identify a novel drug and indication.  ...  We enable this by inserting key structural components of the chemical representation into the text.  ... 
doi:10.1609/aaai.v34i08.7046 fatcat:ogf5joeponhkriu4jemqsauxgm

A framework for understanding the workspace activity of design teams

John C. Tang, Larry J. Leifer
1988 Proceedings of the 1988 ACM conference on Computer-supported cooperative work - CSCW '88  
Small group design sessions were empirically studied to understand better collaborative workspace activity.  ...  A framework that helps illustrate an expanded view of workspace activity is proposed and supported with empirical data.  ...  We also thank Scott Minneman for reviewing previous drafts of this paper.  ... 
doi:10.1145/62266.62285 dblp:conf/cscw/TangL88 fatcat:biwao4rw7ncdnodkcfkh24rqfi

Arabic English Cross-Lingual Plagiarism Detection Based on Keyphrases Extraction, Monolingual and Machine Learning Approach

Mokhtar Al-Suhaiqi, Muneer A. S. Hazaa, Mohammed Albared
2019 Asian Journal of Research in Computer Science  
The research methodology used in this study has facilitated to accomplish the objectives in terms of designing, developing, and implementing an efficient Arabic – English cross lingual plagiarism detection  ...  Several experiments are conducted to evaluate the performance of the key phrases extraction methods.  ...  The research methodology used in this study has facilitated to accomplish the objectives in terms of designing, developing, and implementing an efficient Arabic -English cross lingual plagiarism detection  ... 
doi:10.9734/ajrcos/2018/v2i330075 fatcat:47grqk43mnhmxnqrpq7pnrmglu

Opinion Prediction with User Fingerprinting [article]

Kishore Tumarada, Yifan Zhang, Fan Yang, Eduard Dragut, Omprakash Gnawali, Arjun Mukherjee
2021 arXiv   pre-print
Experimental results show novel insights that were previously unknown such as better predictions for an increase in dynamic history length, the impact of the nature of the article on performance, thereby  ...  In this work, we propose a novel dynamic fingerprinting method that leverages contextual embedding of user's comments conditioned on relevant user's reading history.  ...  The views and conclusions contained in this document are those of the authors and not of the sponsors. The U.S.  ... 
arXiv:2108.00270v3 fatcat:pdfv6c77ifdw5onnhh4tljc6a4

2L-APD: A Two-Level Plagiarism Detection System for Arabic Documents

El Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun, Didier Schwab
2018 Cybernetics and Information Technologies  
Measuring the amount of shared information between two documents is a key to address a number of Natural Language Processing (NLP) challenges such as Information Retrieval (IR), Semantic Textual Similarity  ...  in each textual unit.  ...  descriptive in each textual units.  ... 
doi:10.2478/cait-2018-0011 fatcat:vxwm6pegkzbf7cclzpmf56db7u

Exploring chemical space using natural language processing methodologies for drug discovery

Hakime Öztürk, Arzucan Özgür, Philippe Schwaller, Teodoro Laino, Elif Ozkirimli
2020 Drug Discovery Today  
Advances in natural language processing (NLP) methodologies in the processing of spoken languages accelerated the application of NLP to elucidate hidden knowledge in textual representations of these biochemical  ...  Text-based representations of chemicals and proteins can be thought of as unstructured languages codified by humans to describe domain-specific knowledge.  ...  From a sequence of (i.e. 8-mers) representation, MACCS and Extended Connectivity Fingerprint (ECFP6) [46].  ... 
doi:10.1016/j.drudis.2020.01.020 pmid:32027969 fatcat:5dhdhn5pxrffnegbqf73cym3kq

Molecular representations in AI-driven drug discovery: a review and practical guide

Laurianne David, Amol Thakkar, Rocío Mercado, Ola Engkvist
2020 Journal of Cheminformatics  
A large number of chemical representations have been developed over the years, their numerosity being due to the fast development of computers and the complexity of producing a representation that encompasses  ...  We present here some of the most popular electronic molecular and macromolecular representations used in drug discovery, many of which are based on graph representations.  ...  Noel O'Boyle, for their extensive comments, suggestions, and patience throughout the many rounds of review.  ... 
doi:10.1186/s13321-020-00460-5 pmid:33431035 doaj:95170f073bcc47b7be927a55fa9a529d fatcat:dsislgo4uvd2zh3ynblhf43ec4

ENHANCING SECURITY USING KEYSTROKE DYNAMICS

Preetha S ., Suhas Kini K ., Shailesh A Patil .
2019 International Journal of Engineering Applied Sciences and Technology  
ACKNOWLEDGMENT The authors would like to acknowledge BMS college of Engineering and TEQIP III phase for their immense support in carrying out and encouraging this research work. VIII. REFERENCE  ...  Kevin S et.al [18] presents an anomaly detector for keystroke dynamics authentication, based on a statistical measure of proximity, evaluated through the empirical study of an independent benchmark of  ...  The system is based on an Emotion Estimation module that assesses the affective content of textual messages.  ... 
doi:10.33564/ijeast.2019.v04i03.037 fatcat:mxtzdutob5g65n7pgkjt34fhmy

Fine-grainedWeb Content Classificationvia Entity-level Analytics:The Case ofSemantic Fingerprinting

Céline Alec, Marc Spaniol
2019 Journal of Web Engineering  
In parallel, business, sociological, political, and media analysts require a structured access to these contents in order to conduct their studies.  ...  Approaching three decades of Web contents being created, the amount of heterogeneous data of diverse provenance becomes seemingly overwhelming and its organization is a "continuous battle" against time  ...  Examples of such studies include, utilizing the word order of the textual data for document classification [11] .  ... 
doi:10.13052/jwe1540-9589.17673 fatcat:zdn43vkaljbxhcskl23x3zftw4

Chapter 9 Molecular Similarity: Advances in Methods, Applications and Validations in Virtual Screening and QSAR [chapter]

Andreas Bender, Jeremy L. Jenkins, Qingliang Li, Sam E. Adams, Edward O. Cannon, Robert C. Glen
2006 Annual Reports in Computational Chemistry  
Although some of their limitations are surely because of underlying principles and limitations of fundamental concepts, others will certainly be eliminated in the future.  ...  The chapter also presents some of the recent applications of methods discussed focusing on the successes of virtual screening applications, database clustering and comparisons (such as drug- and in-house-likeness  ...  What is the functional form between structure (or rather structural representation) and the property under consideration so that we can derive an empirical measure of similarity?  ... 
doi:10.1016/s1574-1400(06)02009-3 pmid:32362803 pmcid:PMC7185533 fatcat:f3vdetrycvdezchxtllwjmmcsi

Meta-QSAR: a large-scale application of meta-learning to drug design and discovery

Ivan Olier, Noureddin Sadawi, G. Richard Bickerton, Joaquin Vanschoren, Crina Grosan, Larisa Soldatova, Ross D. King
2017 Machine Learning  
We investigate the learning of quantitative structure activity relationships (QSARs) as a case-study of meta-learning.  ...  This application area is of the highest societal importance, as it is a key step in the development of new medicines.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution  ... 
doi:10.1007/s10994-017-5685-x pmid:31997851 pmcid:PMC6956898 fatcat:mjfqx65vi5hb5f4hysbcwicaea

Tamper-Resistant Biometric IDs [chapter]

Darko Kirovski, Nebojša Jojić, Gavin Jancke
2004 ISSE 2004 — Securing Electronic Business Processes  
A FaceCert is a printout of person's portrait photo, an arbitrary textual message, and a 2-D color barcode which encodes an RSA signature of the message hash and the compressed representation of the face  ...  The signature is created using the private key of the party issuing the ID. ID verification is performed by a simple off-line scanning device that contains the public key of the issuer.  ...  In the next step, message m is signed with the private key of the FaceCert issuer. We use an RSA private key of |m| + 1 bits to sign/decrypt m.  ... 
doi:10.1007/978-3-322-84984-7_17 dblp:conf/isse/KirovskiJJ04 fatcat:gkghwj3rm5fkzb5biil33guwva

Context Similarity Strategy for Text Data Plagiarism Detection

Durga Bhavani Dasari, Dr Venu Gopala Rao. K
2018 International Journal of Engineering & Technology  
Advent development of anti-plagiarism solutions has supported varied range of elementary forms of textual recycling, however, considering the magnum of content that is being generated, a tool alone might  ...  Certain preventive strategies that have evolved in the recent past are relying on semantic solutions, comprehensive texts evaluation, graphics, reference lists, key words, digital technologies.  ...  Fingerprinting models are the largely incorporated PD model, attempting at establishing the summary of the entire research by choosing a pair of subsections from the research study.  ... 
doi:10.14419/ijet.v7i2.32.13517 fatcat:zlxudbrgrvagpjzq6bdzuog4ea

A cluster-based approach to XML similarity joins

Leonardo A. Ribeiro, Theo Härder, Fernanda S. Pimenta
2009 Proceedings of the 2009 International Database Engineering & Applications Symposium on - IDEAS '09  
In this context, we explore different ways to weigh and combine evidence from textual and structural XML representations.  ...  A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documents.  ...  Because this decomposition of the original set of clusters defines which parts of an XML document will deliver textual or structural tokens, it is a key design decision.  ... 
doi:10.1145/1620432.1620451 dblp:conf/ideas/RibeiroHP09 fatcat:mtdwccb2mje6ndtokepnkxkwr4

Similarity methods in chemoinformatics

Peter Willett
2009 Annual Review of Information Science and Technology  
An empirical study of data fusion (Baber, Shirley, Gao, & Feher, 2006) showed that active molecules are more tightly clustered than are inactive molecules (as would be expected if the Similar Property  ...  The first such study was by Bradshaw and Sayle, assessing the significance of fingerprint-based similarities using an approach based on those that have been developed to assess the significance of protein  ... 
doi:10.1002/aris.2009.1440430108 fatcat:3spez43we5bthe7nfzy45c3kka
« Previous Showing results 1 — 15 out of 1,536 results