Search results for "Algorithms"
showing 10 items of 1716 documents
A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection
2011
Chapter from the book: Computational Collective Intelligence. Technologies and Applications. Also available from the publisher at SpringerLink: http://dx.doi.org/10.1007/978-3-642-23935-9_7 Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several efficient techniques for generating frequent itemsets with a minimum support (frequency) have been proposed, the number of itemsets produced is in many cases too large for effective usage in real-life applications. Indeed, the problem of deriving frequent itemsets that are both compact an…
Anomaly Detection in Traffic Surveillance Videos Using Deep Learning
2022
In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and recognition of abnormal activity in a real-world environment is a big challenge, as there can be many types of alarming and abnormal activities, such as theft, violence, and accidents. This research deals with accidents in traffic videos. In the modern world, video traffic surveillance cameras (VTSS) are used for traffic surveillance and monitoring. As the population is increasing drastically, the likelihood of accidents is also increasing. The VTSS is used to detect abno…
Study of the column efficiency using gradient elution based on Van Deemter plots.
2018
Performance of chromatographic columns is of major importance in the development of more efficient separation methods. So far, a common practice is to study the column behavior in isocratic elution by modifying the flow rate and fitting the theoretical plate height values versus the mobile phase linear velocity, according to the Van Deemter equation. In this work, an approach is presented to extend the measurement of efficiency to linear gradient elution, where the mean retention factor is kept constant at each assayed flow. This avoids a possible source of uncertainty due to the change in the distribution equilibria profile, and makes the mean interactions with the stationary phase in grad…
Evaluation of the effect of chance correlations on variable selection using Partial Least Squares -Discriminant Analysis
2013
Variable subset selection is often mandatory in high throughput metabolomics and proteomics. However, depending on the variable to sample ratio there is a significant susceptibility of variable selection towards chance correlations. The evaluation of the predictive capabilities of PLSDA models estimated by cross-validation after feature selection provides overly optimistic results if the selection is performed on the entire set and no external validation set is available. In this work, a simulation of the statistical null hypothesis is proposed to test whether the discrimination capability of a PLSDA model after variable selection estimated by cross-validation is statistically higher than t…
First Retrievals of ASCAT-IB VOD (Vegetation Optical Depth) at Global Scale
2021
Global and long-term vegetation optical depth (VOD) dataset are very useful to monitor the dynamics of the vegetation features, climate and environmental changes. In this study, the radar-based global ASCAT (Advanced SCATterometer) IB (INRAE-BORDEAUX) VOD was retrieved using a model which was recently calibrated over Africa. In order to assess the performance of IB VOD, the Saatchi biomass and three other VOD datasets (ASCAT V16, AMSR2 LPRM V5 and VODCA LPRM V6) derived from C-band observations were used in the comparison. The preliminary results show that IB VOD has a promising ability to predict biomass $(\mathrm{R}=0.74,\ \text{RMSE} =44.82\ \text{Mg}\ \text{ha}^{-1})$ , which is better …
Distributed Leader Election and Computation of Local Identifiers for Programmable Matter
2019
International audience; The context of this paper is programmable matter, which consists of a set of computational elements, called particles, in an infinite graph. The considered infinite graphs are the square, triangular and king grids. Each particle occupies one vertex, can communicate with the adjacent particles, has the same clockwise direction and knows the local positions of neighborhood particles. Under these assumptions, we describe a new leader election algorithm affecting a variable to the particles, called the k-local identifier, in such a way that particles at close distance have each a different k-local identifier. For all the presented algorithms, the particles only need a O(…
Decremental 2- and 3-connectivity on planar graphs
1996
We study the problem of maintaining the 2-edge-, 2-vertex-, and 3-edge-connected components of a dynamic planar graph subject to edge deletions. The 2-edge-connected components can be maintained in a total ofO(n logn) time under any sequence of at mostO(n) deletions. This givesO(logn) amortized time per deletion. The 2-vertex- and 3-edge-connected components can be maintained in a total ofO(n log2n) time. This givesO(log2n) amortized time per deletion. The space required by all our data structures isO(n). All our time bounds improve previous bounds.
Convolutional architectures for virtual screening
2020
Abstract Background A Virtual Screening algorithm has to adapt to the different stages of this process. Early screening needs to ensure that all bioactive compounds are ranked in the first positions despite of the number of false positives, while a second screening round is aimed at increasing the prediction accuracy. Results A novel CNN architecture is presented to this aim, which predicts bioactivity of candidate compounds on CDK1 using a combination of molecular fingerprints as their vector representation, and has been trained suitably to achieve good results as regards both enrichment factor and accuracy in different screening modes (98.55% accuracy in active-only selection, and 98.88% …
Applying pattern recognition methods plus quantum and physico-chemical molecular descriptors to analyze the anabolic activity of structurally diverse…
2008
The great cost associated with the development of new anabolic-androgenic steroid (AASs) makes necessary the development of computational methods that shorten the drug discovery pipeline. Toward this end, quantum, and physicochemical molecular descriptors, plus linear discriminant analysis (LDA) were used to analyze the anabolic/androgenic activity of structurally diverse steroids and to discover novel AASs, as well as also to give a structural interpretation of their anabolic-androgenic ratio (AAR). The obtained models are able to correctly classify 91.67% (86.27%) of the AASs in the training (test) sets, respectively. The results of predictions on the 10% full-out cross-validation test al…
2014 ESC Guidelines on the diagnosis and management of acute pulmonary embolism
2014
ACS : acute coronary syndrome AMPLIFY : Apixaban for the Initial Management of Pulmonary Embolism and Deep-Vein Thrombosis as First-line Therapy aPTT : activated partial thromboplastin time b.i.d. : bis in diem (twice daily) b.p.m. : beats per minute BNP : brain natriuretic peptide BP : blood pressure CI : confidence interval CO : cardiac output COPD : chronic obstructive pulmonary disease CPG : Committee for Practice Guidelines CRNM : clinically relevant non-major CT : computed tomographic/tomogram CTEPH : chronic thromboembolic pulmonary hypertension CUS : compression venous ultrasonography DSA : digital subtraction angiography DVT : deep vein thrombosis ELISA : enzyme-linked immunosorben…