GET THE APP

..

Journal of Computer Science & Systems Biology

ISSN: 0974-7230

Open Access

Volume 11, Issue 3 (2018)

Short Communication Pages: 233 - 234

Holistic Analysis and Management of Distributed Social Systems

Peter Sapaty

Share this article
Research Article Pages: 190 - 194

Sentiment Analysis of Pharmaceutical Products Evaluation Based on Customer Review Mining

Mahboob K and Ali F

With the emergent of advanced technologies, several methods of extracting huge amount of information have been adopted for many applications and information processing. One of which is mining opinion (or sentiment analysis) that is useful in natural language processing, text mining, and speech recognition, etc., which is widely functional in different information industries. The Online Social Media has created new multiple avenues for sharing of different kind of information among folks for social awareness and sharing views among them. The research based in the context of customer review mining on online various pharmaceutical products evaluation with respect to the frequency of a particular medicine usage, customer personal satisfaction, influential marketing products strategy, online pharmaceutical suggestions and prescriptions, and the impact of medicines on health, etc. The research focus on sentiment analysis of multiple customer reviews on different medicines to evaluate the quality and satisfaction of that product. Further, sentiment approach has been assumed that can help pharmaceutical enterprises in improving and maintaining the quality of product services based on the review of customer. The research aims to use lexiconbased approach for sentiment classification according to positive, negative or neutral type of polarity but to a limited extent. The accuracy and reliability of results is a challenge when parsing complex sentences and words due to insufficient undistinguishable data.

Research Article Pages: 195 - 199

Implementation of a Reproducible, Accessible and Transparent RNA-seq Bioinformatics Pipeline within the Galaxy Platform

Thahmina Ali, Baekdoo Kim, Carlos Lijeron, Changsu Dong, Claudia Wultsch and Konstantinos Krampis

The technology of RNA sequencing (RNA-seq) has not only proven powerful in transcriptome studies but has become a key approach in translational medicine. In this work, we present a reusable and reproducible bioinformatics pipeline for processing and analyzing RNA-seq data, implemented as an automated workflow within the open-source, web-based Galaxy web platform. With this workflow, researchers with little to no training in computer programming or bioinformatics experience can perform routine, high quality RNA-seq analysis, and generate intuitive results. We evaluated our implementation approach of the RNA-Seq pipeline using cancer transcriptome data, demonstrating that it is well positioned for clinical applications providing a set of advantages over existing methods.

Review Article Pages: 200 - 216

They See you and yet you Don’t See them: Privacy in the Multilayered National Surveillance State Realm: A Dystopian Digital Society?

Hugo Luz dos Santos

The concept of digital society represents a digital and pervasive ambient created by the convergence of the technologies of radio transmission and broadcasting (as an identification by radiofrequency (RFID), agents of software, sensor networks, processing of data by personal mobile devices, which provides, in cyberspace, the integration and the interaction of the devices named as «intelligent». This new reality, deeply enshrined in the very concept of «digital society», portrays an ambient (digital and intelligent) in which people are surrounded by intuitive interfaces embedded in every corner (even the most inhospitable ones) of a city (ranging from London to New York) or country, giving rise to the well-known «National surveillance state».

Make no mistake: Massive tons of our personal data are being captured, stored, processed and disclosed to unidentified third parties as we speak. The real problem lies in the ulterior usage of that vast array of personal data and, foremost, to what ends. Concretely, in cases of data breaches. This paper avowedly asserts that in such cases consumers (pursuant a data breach) have a natural right to seek redress and compensation from courts based on the damage of loss of chance of exclusive control of one´s personal data.

Short Communication Pages: 216 - 218

Biometric Jewelry to Rule Digital Life

Christina MD, Jayasurya S and Sunitha C

Modernized world has landed each and every creature of the world in a very securable environment which has paved a long way for the significance of keeping every individual in a secured place. One such modernization in providing the security is done by bio metrics. Trying to use bio metrics, a company called Token; is specialized for providing bio metric security. As an initiative to the bio metric security the company has launched a bio metric ring called Token ring which is forth coming bio metric jewelry to rule the digital life. This Token ring provides access to everything starting from the credit cards, used as door lockers and manages the passwords. It is a two factor jewelry that has fingerprint sensor which is the foremost feature that makes the ring a smart ring.

Research Article Pages: 219 - 223

The Use of Honeynets to Detect Exploited Systems Across the Wireless Networks

Mahmood I

Any to internet is target of hackers and intruders. Every organization/institution system connected uses some kind of network security software to protect its data from unauthorized use. Software’s used by organization/institution are antivirus firewall etc. There are many types of services that are run on organization/institution networks and it is important to detect intrusion. Due to large bandwidth, monitoring is very hard and impossible. In developing, where the cyber-crimes are very easy to commit and there are not very strong lows Honeynet scheme, is use to help system administrator in detecting intrusion or malicious content. Honey net is so proposed solution because it helps in understanding the intention and ways attacker use to compromise security systems. In this paper a basic honeynet framework is proposed.

Research Article Pages: 224 - 228

An Efficient Approach to Preserve the Network Connectivity of WSN by Cautiously Removing the Crossing Edges Using COLS

Pallavi R, Srinivas BC and Banu Prakash GC

In the present scenario, Wireless Sensor Network (WSN) is widely used in applications such as Disaster Relief operations, Biodiversity mapping, Intelligent Buildings or Bridges, Machine Surveillance and Preventive maintenance, Precision Agriculture, Medicine and Health care etc. which has led to the deployment of enormous sensor nodes leading to the complexity of the network. Extensive research work has been carried out for monitoring these sensor devices for connectivity, coverage, load balancing, network structure etc. Study on these complex networks is a challenging task. Such networks can be modelled with the help of a graph, which exhibits the properties of a nonplanar graph. In this paper, we would like to propose an algorithm “Coordinate theory On Line Segment” (COLS) to reduce a nonplanar graph to a planar graph by removing the crossing edges carefully. The proposed algorithm preserves the topological structure without compromising Quality of Service of the original.

Research Article Pages: 229 - 232

Binary Transition Pattern (BTP) for Erythropoietic DNA Methylation Data

Najyah Garoot and Byung Guk Kim

Objective: Despite whole-genome data analysis for understanding the implications of differential DNA methylation patterns and the nature of their correlation with gene expression (GE) regulation, the observations remain controversial.

Methods: Unlike the usual methods of selecting differentially methylated regions (DMR) by hypothesis statistical testing, we clustered CpG sites by their actual log2FC over time. Each cluster is represented by a 5-digit binary code.

Results: We identified novel stage-specific TFBS during erythropoiesis. Our stage-specific differential methylation clusters have the ability to determine TFBS of co-regulators such as GATA1 and PU.1 at hypermethylated CpG loci.

Conclusion: Hypomethylated CpG loci clusters that are associated with GE upregulation are independent of hypermethylated sites associated with downregulation. The analy-sis confirms that DNA methylation has unidirectional correlation with GE.

Google Scholar citation report
Citations: 2279

Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report

Journal of Computer Science & Systems Biology peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward