Search results for " Computer Science"
showing 10 items of 3983 documents
Statistical analysis of engraving traces on a 3D digital model of prehistoric stone stelae
2016
International audience; Studying cultural heritage artefacts, using 3D digital models, is gaining interest. It not only allows applications in documentation and visualisation, but also permits further contact-less examination. In this paper, we are presenting a statistical analysis of stone engravings based on features that were semi-automatically extracted from 3D acquisition data. Our objects of study are two Neolithic stone stelae and a faithful replica that was created in the course of an archaeological study. We use common statistical methods and investigate the populations of depth and diameter of the engraving traces, as well as their correlation. We observe that the erosion of the t…
Digitization and Preservation of Cultural Heritage Products
2017
Cultural heritage encompasses various aspects of a nation's history. Cultural heritage artifacts are considered as priceless items that need special care. Since the wide adoption of new digital technologies, documenting and storing cultural heritage assets became more affordable and reliable. These records are then used in several applications. Researchers saw the opportunity to use digital heritage recordings for long-term preservation. They are considering cultural heritage artifacts as products, and the history behind them as a product lifecycle. In this paper, we present the research progress in cultural heritage digital processing and preservation, highlighting the most impactful advan…
Mapping child maltreatment risk: a 12-year spatio-temporal analysis of neighborhood influences.
2017
Abstract Background ‘Place’ matters in understanding prevalence variations and inequalities in child maltreatment risk. However, most studies examining ecological variations in child maltreatment risk fail to take into account the implications of the spatial and temporal dimensions of neighborhoods. In this study, we conduct a high-resolution small-area study to analyze the influence of neighborhood characteristics on the spatio-temporal epidemiology of child maltreatment risk. Methods We conducted a 12-year (2004–2015) small-area Bayesian spatio-temporal epidemiological study with all families with child maltreatment protection measures in the city of Valencia, Spain. As neighborhood units…
Argumentative reasoning and taxonomic analysis for the identification of medical errors
2015
Telemedicine consists of the use of information and communication technologies (ICTs) in the practice of medicine. The massive digitalisation of the society is changing the behaviour of ordinary people even in medical sectors. The impact of digitisation is also having impacts on teleexpertise, where a medical professional can remotely ask some advices through the use of ICTs to provide treatment to a patient in critical conditions in remote environment. However, sometimes the outcome of such advice obtained remotely can lead to medical errors. In these situations, it is important to determine whether the causes of the errors could have been avoidable or not for the purposes of establishing …
Modeling Chickenpox Dynamics with a Discrete Time Bayesian Stochastic Compartmental Model
2018
[EN] We present a Bayesian stochastic susceptible-exposed-infectious-recovered model in discrete time to understand chickenpox transmission in the Valencian Community, Spain. During the last decades, different strategies have been introduced in the routine immunization program in order to reduce the impact of this disease, which remains a public health's great concern. Under this scenario, a model capable of explaining closely the dynamics of chickenpox under the different vaccination strategies is of utter importance to assess their effectiveness. The proposed model takes into account both heterogeneous mixing of individuals in the population and the inherent stochasticity in the transmiss…
Demand Sharing Inaccuracies in Supply Chains: A Simulation Study
2018
We investigate two main sources of information inaccuracies (i.e., errors and delays) in demand information sharing along the supply chain (SC). Firstly, we perform a systematic literature review on inaccuracy in demand information sharing and its impact on supply chain dynamics. Secondly, we model several SC settings using system dynamics and assess the impact of such information inaccuracies on SC performance. More specifically, we study the impact of four factors (i.e., demand error, demand delay, demand variability, and average lead times) using three SC dynamic performance indicators (i.e., bullwhip effect, inventory variability, and average inventory). The results suggest that demand …
Towards more relevance-oriented data mining research
2008
Data mining (DM) research has successfully developed advanced DM techniques and algorithms over the last few decades, and many organisations have great expectations to take more benefit of their data warehouses in decision making. Currently, the strong focus of most DM-researchers is still only on technology-oriented topics. Commonly the DM research has several stakeholders, the major of which can be divided into internal and external ones each having their own point of view, and which are at least partly conflicting. The most important internal groups of stakeholders are the DM research community and academics in other disciplines. The most important external stakeholder groups are manager…
A very brief history of soft computing: Fuzzy Sets, artificial Neural Networks and Evolutionary Computation
2013
This paper gives a brief presentation of history of Soft Computing considered as a mix of three scientific disciplines that arose in the mid of the 20th century: Fuzzy Sets and Systems, Neural Networks, and Evolutionary Computation. The paper shows the genesis and the historical development of the three disciplines and also their meeting in a coalition in the 1990s.
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
Conception d'architectures compactes pour la détection spatiotemporelle d'actions en temps réel
2022
This thesis tackles the spatiotemporal action detection problem from an online, efficient, and real-time processing point of view. In the last decade, the explosive growth of video content has driven a broad range of application demands for automating human action understanding. Aside from accurate detection, vast sensing scenarios in the real-world also mandate incremental, instantaneous processing of scenes under restricted computational budgets. However, current research and related detection frameworks are incapable of simultaneously fulfilling the above criteria. The main challenge lies in their heavy architectural designs and detection pipelines to extract pertinent spatial and tempor…