Search results for "Abstract data type"
showing 10 items of 1140 documents
A finite element-based machine learning approach for modeling the mechanical behavior of the breast tissues under compression in real-time
2017
[EN] This work presents a data-driven method to simulate, in real-time, the biomechanical behavior of the breast tissues in some image-guided interventions such as biopsies or radiotherapy dose delivery as well as to speed up multimodal registration algorithms. Ten real breasts were used for this work. Their deformation due to the displacement of two compression plates was simulated off-line using the finite element (FE) method. Three machine learning models were trained with the data from those simulations. Then, they were used to predict in real-time the deformation of the breast tissues during the compression. The models were a decision tree and two tree-based ensemble methods (extremely…
Transient seizure onset network for localization of epileptogenic zone: effective connectivity and graph theory-based analyses of ECoG data in tempor…
2018
Objective: Abnormal and dynamic epileptogenic networks cause difficulties for clinical epileptologists in the localization of the seizure onset zone (SOZ) and the epileptogenic zone (EZ) in preoperative assessments of patients with refractory epilepsy. The aim of this study is to investigate the characteristics of time-varying effective connectivity networks in various non-seizure and seizure periods, and to propose a quantitative approach for accurate localization of SOZ and EZ. Methods: We used electrocorticogram recordings in the temporal lobe and hippocampus from seven patients with temporal lobe epilepsy to characterize the effective connectivity dynamics at a high temporal resolution …
Neuromuscular responses to different resistance loading protocols using pneumatic and weight stack devices
2013
The purpose of this study was to examine single repetition characteristics and acute neuromuscular responses to typical hypertrophic (HL), maximal strength (MSL), and power (PL) loadings performed with two of the most common resistance modes; pneumatic and weight stack. Acute responses were assessed by measuring maximal voluntary contraction (MVC), corresponding quadriceps-EMG and resting and superimposed twitch torques. Activation level was calculated from the twitch torques. Decreases in MVC were greater during HL and MSL than during PL. During HL, resting twitch force decreased 8% (P < 0.05) more on the weight stack than on the pneumatic device. Furthermore, loading using the weight stac…
A Graph-Grammar Approach to Represent Causal, Temporal and Other Contexts in an Oncological Patient Record
1996
AbstractThe data of a patient undergoing complex diagnostic and therapeutic procedures do not only form a simple chronology of events, but are closely related in many ways. Such data contexts include causal or temporal relationships, they express inconsistencies and revision processes, or describe patient-specific heuristics. The knowledge of data contexts supports the retrospective understanding of the medical decision-making process and is a valuable base for further treatment. Conventional data models usually neglect the problem of context knowledge, or simply use free text which is not processed by the program. In connection with the development of the knowledge-based system THEMPO (The…
Reference Standards for Software Evaluation
1990
AbstractThe field of automated ECG analysis was one of the earliest topics in Medical Informatics and may be regarded as a model both for computer-assisted medical diagnosis and for evaluating medical diagnostic programs. The CSE project has set reference standards of two kinds: In a broad sense, a standard how to perform a comprehensive evaluation study, in a narrow sense, standards as specific references for evaluating computer ECG programs. The evaluation methodology used within the CSE project is described as a basis for presentation of results which are published elsewhere in this issue.
A Novel Deep Learning Stack for APT Detection
2019
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…
Computing the ℤ2-Cocharacter of 3 × 3 Matrices of Odd Degree
2013
Let F be a field of characteristic 0 and A = M 2, 1(F) the algebra of 3 × 3 matrices over F endowed with the only non trivial ℤ2-grading. Aver'yanov in [1] determined a set of generators for the T 2-ideal of graded identities of A. Here we study the identities in variables of homogeneous degree 1 via the representation theory of the symmetric group, and we determine the decomposition of the corresponding character into irreducibles.
On P-compatible hybrid identities and hyperidentities
1994
P-compatible identities are built up from terms with a special structure. We investigate a variety defined by a set ofP-compatible hybrid identities and answer the question whether a variety defined by a set ofP-compatible hyperidentities can be solid.
Applied Linear Algebra: Electrical Networks
2016
This chapter shows how mathematical theory is not an abstract subject which has no connection with the real world. On the contrary, this entire book is written by stating that mathematics in general, and algebra in this case, is an integrating part of every day real life and that the professional life of computational scientists and engineers requires a solid mathematical background. In order to show how the contents of the previous chapters have an immediate technical application, the last chapter of this book describes a core engineering subject, i.e. electrical networks, as an algebraic exercise. Furthermore, this chapter shows how the combination of the algebraic topics give a natural r…
Conditional measures and their applications to fuzzy sets
1991
Abstract Given a ⊥-decomposable measure with respect to a continuous t-conorm, as introduced by the author in an earlier paper (see Section 1), we can construct ⊥-conditional measures as implications. These fulfil a ‘generalized product law’ replacing the product in the classical law by any other strict t-norm ⊥ and turn out to be decomposable with respect to an operation ⊥ V depending on ⊥, ⊥ and the condition set V (Section 2). More general, conditional measures are introduced axiomatically and are shown to be ⊥-conditional measures with respect to some ⊥-decomposable measure (Section 3). ‘Bayesian-like’ models are given which are alternatives to that presented by the author in a recent p…