Search results for " Computer Science"

showing 10 items of 3983 documents

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Detection of developmental dyslexia with machine learning using eye movement data

2021

Dyslexia is a common neurocognitive learning disorder that can seriously hinder individuals’ aspirations if not detected and treated early. Instead of costly diagnostic assessment made by experts, in the near future dyslexia might be identified with ease by automated analysis of eye movements during reading provided by embedded eye tracking technology. However, the diagnostic machine learning methods need to be optimized first. Previous studies with machine learning have been quite successful in identifying dyslexic readers, however, using contrasting groups with large performance differences between diagnosed and good readers. A practical challenge is to identify also individuals with bord…

Computer engineering. Computer hardwareSupport Vector MachineComputer sciencemedia_common.quotation_subject02 engineering and technologyMachine learningcomputer.software_genre050105 experimental psychologyDyslexiaTK7885-7895FluencysilmänliikkeetoppimisvaikeudetReading (process)dyslexia0202 electrical engineering electronic engineering information engineeringmedicinedysleksia0501 psychology and cognitive sciencessupport vector machinemedia_commonRandom ForestRecallbusiness.industry05 social sciencesDyslexiaEye movementGeneral MedicineQA75.5-76.95diagnostiikkamedicine.diseaseRandom forestkoneoppiminenElectronic computers. Computer scienceLearning disabilityEye tracking020201 artificial intelligence & image processingArtificial intelligencemedicine.symptombusinesscomputerrandom forestArray
researchProduct

Complex networks : application for texture characterization and classification

2008

This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.

Computer engineering. Computer hardwareTexture compressionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComplex networksImage processingTexture (geology)TK7885-7895Image textureImage processingAnàlisi de texturaProcesamiento de imágenestexture analysisClustering coefficientAnálisis de texturaRedes complejasPixelbusiness.industryNode (networking)Pattern recognitionProcessament d'imatgescomplex networksQA75.5-76.95Xarxes complexesComplex networkTexture analysisElectronic computers. Computer scienceComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Validating retinal fundus image analysis algorithms: issues and a proposal.

2013

This paper concerns the validation of automatic retinal image analysis (ARIA) algorithms. For reasons of space and consistency, we concentrate on the validation of algorithms processing color fundus camera images, currently the largest section of the ARIA literature. We sketch the context (imaging instruments and target tasks) of ARIA validation, summarizing the main image analysis and validation techniques. We then present a list of recommendations focusing on the creation of large repositories of test data created by international consortia, easily accessible via moderated Web sites, including multicenter annotations by multiple experts, specific to clinical tasks, and capable of running …

Computer programFundus OculiCost effectivenessbusiness.industryComputer scienceReproducibility of ResultsContext (language use)Image processingArticlesG400 Computer ScienceReference StandardsSketchOphthalmoscopyConsistency (database systems)SoftwareRetinal DiseasesImage Processing Computer-AssistedHumansbusinessAlgorithmAlgorithmsSoftwareTest data
researchProduct

How does serendipity affect diversity in recommender systems? A serendipity-oriented greedy algorithm

2018

Most recommender systems suggest items that are popular among all users and similar to items a user usually consumes. As a result, the user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected i.e., serendipitous items. In this paper, we propose a serendipity-oriented, reranking algorithm called a serendipity-oriented greedy (SOG) algorithm, which improves serendipity of recommendations through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm, we employed the only publicly available datase…

Computer science02 engineering and technologyRecommender systemDiversification (marketing strategy)Machine learningcomputer.software_genreTheoretical Computer SciencenoveltySingular value decompositionalgoritmit0202 electrical engineering electronic engineering information engineeringFeature (machine learning)serendipity-2018Greedy algorithmlearning to rankNumerical AnalysisSerendipitybusiness.industrysuosittelujärjestelmät020206 networking & telecommunicationsserendipityPopularityunexpectednessComputer Science ApplicationsComputational MathematicsComputational Theory and MathematicsRanking020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerarviointiSoftware
researchProduct

Large-scale random features for kernel regression

2015

Kernel methods constitute a family of powerful machine learning algorithms, which have found wide use in remote sensing and geosciences. However, kernel methods are still not widely adopted because of the high computational cost when dealing with large scale problems, such as the inversion of radiative transfer models. This paper introduces the method of random kitchen sinks (RKS) for fast statistical retrieval of bio-geo-physical parameters. The RKS method allows to approximate a kernel matrix with a set of random bases sampled from the Fourier domain. We extend their use to other bases, such as wavelets, stumps, and Walsh expansions. We show that kernel regression is now possible for data…

Computer science1900 General Earth and Planetary Sciencescomputer.software_genreKernel (linear algebra)10122 Institute of GeographyKernel methodWavelet1706 Computer Science ApplicationsRadiative transferLife ScienceKernel regressionData mining910 Geography & travelcomputer2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Representation of NURBS surfaces by Controlled Iterated Functions System automata

2019

Iterated Function Systems (IFS) are a standard tool to generate fractal shapes. In a more general way, they can represent most of standard surfaces like Bézier or B-Spline surfaces known as self-similar surfaces. Controlled Iterated Function Systems (CIFS) are an extension of IFS based on automata. CIFS are basically multi-states IFS, they can handle all IFS shapes but can also manage multi self-similar shapes. For example CIFS can describe subdivision surfaces around extraordinary vertices whereas IFS cannot. Having a common CIFS formalism facilitates the development of generic methods to manage interactions (junctions, differences...) between objects of different natures.This work focuses…

Computer scienceBasis functionBézier curve02 engineering and technology[INFO] Computer Science [cs]Computer Science::Computational Geometry01 natural scienceslcsh:QA75.5-76.95Iterated function system0202 electrical engineering electronic engineering information engineeringSubdivision surface[INFO]Computer Science [cs]0101 mathematicsComputingMilieux_MISCELLANEOUSSubdivisionFinite-state machinebusiness.industry010102 general mathematicsGeneral Engineering020207 software engineeringComputer Graphics and Computer-Aided Design[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]AutomatonHuman-Computer InteractionAlgebraComputer Science::GraphicsIterated functionlcsh:Electronic computers. Computer sciencebusinessComputers & Graphics: X
researchProduct

Design and calibration of an omni-RGB+D camera

2016

International audience; In this paper, we present the design of a new camera combining both predator-like and prey-like vision features. This setup provides both a spherical RGB-view and a directional depth-view of the environment. The model and calibration of the full setup are described. A few examples will be given to demonstrate the interest and the versatility of such camera for robotics and video surveillance at the oral presentation.

Computer scienceCamera matrixComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]01 natural sciencesfisheye03 medical and health sciences0302 clinical medicineCamera auto-calibrationComputer graphics (images)0103 physical sciencesdioptricComputer visionSmart camera010306 general physicsunified modelStereo camerasbusiness.industry[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]stereo visionStereopsisArtificial intelligencebusiness030217 neurology & neurosurgeryComputer stereo visionStereo cameraCamera resectioning
researchProduct

Unmanned Aerial Vehicle-Based Non Destructive Diagnostics

2018

The paper proposes a cloud platform for analyzing the radiometric infrared videos uploaded by drones which patrol large photovoltaic plants. Thanks to artificial vision algorithms, it does not require any human support to select and associate the framed PV modules to the corresponding ones in the topology of the photovoltaic plant. The algorithm implements an innovative diagnostic protocol, which evaluates the thermal state of the photovoltaic module, whichever the environmental conditions are. The data automatically computed and collected in a multimedia database provide the O&M technicians with significant information to monitor the ageing of each module of the photovoltaic plant. The pro…

Computer scienceComputer Networks and CommunicationsMultimedia databaseReal-time computingEnergy Engineering and Power TechnologyCloud computingPV modulesdigital image processingIndustrial and Manufacturing EngineeringUploadSoftwareComputer aided diagnostics; digital image processing; drone based monitoring; PV cells; PV modules; thermography; Artificial Intelligence; Computer Networks and Communications; Computer Science Applications1707 Computer Vision and Pattern Recognition; Energy Engineering and Power Technology; Renewable Energy Sustainability and the Environment; Industrial and Manufacturing Engineering; InstrumentationPV moduleArtificial IntelligenceComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSInstrumentation (computer programming)Renewable EnergyProtocol (object-oriented programming)InstrumentationSustainability and the Environmentbusiness.industryPV cellsRenewable Energy Sustainability and the EnvironmentPV cellPhotovoltaic systemComputer Science Applications1707 Computer Vision and Pattern RecognitionDronedrone based monitoringthermographySettore ING-IND/31 - ElettrotecnicaComputer Networks and CommunicationComputer aided diagnosticsbusinesscomputer aided diagnostic
researchProduct