Search results for " Computer Science"

showing 10 items of 3983 documents

Statistical analysis of engraving traces on a 3D digital model of prehistoric stone stelae

2016

International audience; Studying cultural heritage artefacts, using 3D digital models, is gaining interest. It not only allows applications in documentation and visualisation, but also permits further contact-less examination. In this paper, we are presenting a statistical analysis of stone engravings based on features that were semi-automatically extracted from 3D acquisition data. Our objects of study are two Neolithic stone stelae and a faithful replica that was created in the course of an archaeological study. We use common statistical methods and investigate the populations of depth and diameter of the engraving traces, as well as their correlation. We observe that the erosion of the t…

ArcheologyEngineering[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistoryMaterials Science (miscellaneous)Neolithic stone stelae02 engineering and technologyConservationEngravingPrehistoryChisel marks[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering0601 history and archaeologyStatistical analysisSpectroscopy060102 archaeology3D mesh databusiness.industryReplica020207 software engineering06 humanities and the artsArchaeologyCultural heritageDescriptive statisticsChemistry (miscellaneous)[ SHS.ARCHEO ] Humanities and Social Sciences/Archaeology and Prehistoryvisual_artStone engravingsvisual_art.visual_art_mediumbusinessGeneral Economics Econometrics and FinanceRegression analysis
researchProduct

Digitization and Preservation of Cultural Heritage Products

2017

Cultural heritage encompasses various aspects of a nation's history. Cultural heritage artifacts are considered as priceless items that need special care. Since the wide adoption of new digital technologies, documenting and storing cultural heritage assets became more affordable and reliable. These records are then used in several applications. Researchers saw the opportunity to use digital heritage recordings for long-term preservation. They are considering cultural heritage artifacts as products, and the history behind them as a product lifecycle. In this paper, we present the research progress in cultural heritage digital processing and preservation, highlighting the most impactful advan…

Architectural engineeringEngineering[ INFO ] Computer Science [cs]02 engineering and technologyPlmPLM01 natural sciences3D modelingProduct lifecycle0202 electrical engineering electronic engineering information engineeringDigital preservation[INFO]Computer Science [cs]CEPROQHA projectDigitizationbusiness.industryComputingMethodologies_MISCELLANEOUS010401 analytical chemistry020207 software engineering0104 chemical sciencesSemantic enrichmentCultural heritageDigital preservationCultural heritageDigital heritageSpecial carebusiness
researchProduct

Mapping child maltreatment risk: a 12-year spatio-temporal analysis of neighborhood influences.

2017

Abstract Background ‘Place’ matters in understanding prevalence variations and inequalities in child maltreatment risk. However, most studies examining ecological variations in child maltreatment risk fail to take into account the implications of the spatial and temporal dimensions of neighborhoods. In this study, we conduct a high-resolution small-area study to analyze the influence of neighborhood characteristics on the spatio-temporal epidemiology of child maltreatment risk. Methods We conducted a 12-year (2004–2015) small-area Bayesian spatio-temporal epidemiological study with all families with child maltreatment protection measures in the city of Valencia, Spain. As neighborhood units…

Area-specific risk estimationTime FactorsGeneral Computer ScienceHealth geographyPoison controlNeighborhood influenceslcsh:Computer applications to medicine. Medical informaticsSuicide preventionOccupational safety and health03 medical and health sciences0302 clinical medicineSpatio-Temporal AnalysisResidence CharacteristicsRisk FactorsEnvironmental healthInjury preventionHumans0501 psychology and cognitive sciences030212 general & internal medicineChild AbuseChildSocioeconomic statusChild maltreatmentResearch05 social sciencesPublic Health Environmental and Occupational HealthAbsolute risk reductionHuman factors and ergonomicsSmall-area studyGeneral Business Management and AccountingSocial ClassSocioeconomic FactorsSpainlcsh:R858-859.7Disease mappingSpatial inequalityBayesian spatio-temporal modelingPsychology050104 developmental & child psychologyInternational journal of health geographics
researchProduct

Argumentative reasoning and taxonomic analysis for the identification of medical errors

2015

Telemedicine consists of the use of information and communication technologies (ICTs) in the practice of medicine. The massive digitalisation of the society is changing the behaviour of ordinary people even in medical sectors. The impact of digitisation is also having impacts on teleexpertise, where a medical professional can remotely ask some advices through the use of ICTs to provide treatment to a patient in critical conditions in remote environment. However, sometimes the outcome of such advice obtained remotely can lead to medical errors. In these situations, it is important to determine whether the causes of the errors could have been avoidable or not for the purposes of establishing …

Argumentative[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationKnowledge managementComputer scienceMedical procedureMédecine humaine et pathologieArgumentation frameworkArgumentation theoryArtificial Intelligence[ SDV.MHEP ] Life Sciences [q-bio]/Human health and pathologyArgumentationMedical errorsElectrical and Electronic EngineeringLegal procedureTaxonomybusiness.industryModélisation et simulation16. Peace & justice[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationGroup decision-makingIdentification (information)Control and Systems EngineeringInformation and Communications TechnologyKnowledge tracingTeleexpertisebusiness[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct

Modeling Chickenpox Dynamics with a Discrete Time Bayesian Stochastic Compartmental Model

2018

[EN] We present a Bayesian stochastic susceptible-exposed-infectious-recovered model in discrete time to understand chickenpox transmission in the Valencian Community, Spain. During the last decades, different strategies have been introduced in the routine immunization program in order to reduce the impact of this disease, which remains a public health's great concern. Under this scenario, a model capable of explaining closely the dynamics of chickenpox under the different vaccination strategies is of utter importance to assess their effectiveness. The proposed model takes into account both heterogeneous mixing of individuals in the population and the inherent stochasticity in the transmiss…

Article SubjectGeneral Computer ScienceComputer scienceComputationBayesian probabilityPosterior probabilityPopulation01 natural scienceslcsh:QA75.5-76.95010305 fluids & plasmas010104 statistics & probabilityMixing (mathematics)0103 physical sciencesmedicineEconometrics0101 mathematicseducationeducation.field_of_studyMultidisciplinaryChickenpoxPrediction intervalmedicine.diseaseVaccinationDiscrete time and continuous timePosterior predictive distributionlcsh:Electronic computers. Computer scienceMATEMATICA APLICADA
researchProduct

Demand Sharing Inaccuracies in Supply Chains: A Simulation Study

2018

We investigate two main sources of information inaccuracies (i.e., errors and delays) in demand information sharing along the supply chain (SC). Firstly, we perform a systematic literature review on inaccuracy in demand information sharing and its impact on supply chain dynamics. Secondly, we model several SC settings using system dynamics and assess the impact of such information inaccuracies on SC performance. More specifically, we study the impact of four factors (i.e., demand error, demand delay, demand variability, and average lead times) using three SC dynamic performance indicators (i.e., bullwhip effect, inventory variability, and average inventory). The results suggest that demand …

Article SubjectGeneral Computer ScienceIMPACTComputer scienceSupply chain0211 other engineering and technologiesINFORMATION DISTORTIONINVENTORYDELAYS02 engineering and technologyERRORSlcsh:QA75.5-76.95Bullwhip effect0202 electrical engineering electronic engineering information engineeringEconometricsPERSPECTIVE021103 operations researchMultidisciplinaryInformation sharingContrast (statistics)BULLWHIPPOLICYSettore ING-IND/35 - Ingegneria Economico-GestionaleINCENTIVESLow demandMODEL020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencePerformance indicatorComplexity
researchProduct

Towards more relevance-oriented data mining research

2008

Data mining (DM) research has successfully developed advanced DM techniques and algorithms over the last few decades, and many organisations have great expectations to take more benefit of their data warehouses in decision making. Currently, the strong focus of most DM-researchers is still only on technology-oriented topics. Commonly the DM research has several stakeholders, the major of which can be divided into internal and external ones each having their own point of view, and which are at least partly conflicting. The most important internal groups of stakeholders are the DM research community and academics in other disciplines. The most important external stakeholder groups are manager…

Artificial IntelligenceResearch communityInformation systemStakeholderRelevance (information retrieval)Computer Vision and Pattern RecognitionData miningSociologycomputer.software_genreData sciencecomputerData warehouseTheoretical Computer Science
researchProduct

A very brief history of soft computing: Fuzzy Sets, artificial Neural Networks and Evolutionary Computation

2013

This paper gives a brief presentation of history of Soft Computing considered as a mix of three scientific disciplines that arose in the mid of the 20th century: Fuzzy Sets and Systems, Neural Networks, and Evolutionary Computation. The paper shows the genesis and the historical development of the three disciplines and also their meeting in a coalition in the 1990s.

Artificial developmentSoft computingTheoretical computer scienceNeuro-fuzzySettore INF/01 - InformaticaComputer scienceNatural computingbusiness.industryComputational intelligenceFuzzy Sets Theory FuzzinessEvolutionary acquisition of neural topologiesHuman-based evolutionary computationComputingMethodologies_GENERALArtificial intelligencebusinessIntelligent control
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Conception d'architectures compactes pour la détection spatiotemporelle d'actions en temps réel

2022

This thesis tackles the spatiotemporal action detection problem from an online, efficient, and real-time processing point of view. In the last decade, the explosive growth of video content has driven a broad range of application demands for automating human action understanding. Aside from accurate detection, vast sensing scenarios in the real-world also mandate incremental, instantaneous processing of scenes under restricted computational budgets. However, current research and related detection frameworks are incapable of simultaneously fulfilling the above criteria. The main challenge lies in their heavy architectural designs and detection pipelines to extract pertinent spatial and tempor…

Artificial intelligenceApprentissage profond[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingDeep learningDétection d'actionsIntelligence artificielleAction detection
researchProduct