Search results for "Artificial Intelligence"

showing 10 items of 6122 documents

Eye position tunes the contribution of allocentric and egocentric information to target localization in human goal-directed arm movements.

1997

Subjects were required to point to the distant vertex of the closed and the open configurations of the Muller-Lyer illusion using either their right hand (experiment 1) or their left hand (experiment 2). In both experiments the Muller-Lyer figures were horizontally presented either in the left or in the right hemispace and movements were executed using either foveal or peripheral vision of the target. According to the illusion effect, subjects undershot and overshot the vertex location of the closed and the open configuration, respectively. The illusion effect decreased when the target was fixated and when the stimulus was positioned in the right hemispace. These results confirm the hypothe…

Adultright cerebral hemisphereEye Movementsmedia_common.quotation_subjectArm; psychomotor performance; illusions; dominance cerebral; video recording; eye movements; adult; humansIllusionVideo RecordingPoison controlStimulus (physiology)dominanceSettore BIO/09FovealPerceptionHumansComputer visioneye positionDominance Cerebralpointing kinematicsmedia_commonCommunicationbusiness.industryGeneral NeuroscienceMüller-Lyer illusionBody movementIllusionsPeripheral visionArmcerebralegocentric and allocentric frame of referenceArtificial intelligenceMuller-Lyer illusionPsychologybusinessPsychomotor PerformanceNeuroscience letters
researchProduct

A Graph-Grammar Approach to Represent Causal, Temporal and Other Contexts in an Oncological Patient Record

1996

AbstractThe data of a patient undergoing complex diagnostic and therapeutic procedures do not only form a simple chronology of events, but are closely related in many ways. Such data contexts include causal or temporal relationships, they express inconsistencies and revision processes, or describe patient-specific heuristics. The knowledge of data contexts supports the retrospective understanding of the medical decision-making process and is a valuable base for further treatment. Conventional data models usually neglect the problem of context knowledge, or simply use free text which is not processed by the program. In connection with the development of the knowledge-based system THEMPO (The…

Advanced and Specialized NursingGrammarbusiness.industrymedia_common.quotation_subjectHealth InformaticsPatient recordcomputer.software_genreGraphical toolsData modelingNeglectHealth Information ManagementPediatric oncologyMedicineGraph (abstract data type)Artificial intelligencebusinessHeuristicscomputerNatural language processingmedia_commonMethods of Information in Medicine
researchProduct

Quantifying stenosis in renal arteriograms: a fuzzy syntactic analysis.

1999

AbstractThe introduction of fuzzy logic improves a system for the automatic quantification of renal artery lesions seen in digital subtraction angiograms. A two-step approach has been followed. An earlier system based on non-fuzzy syntactic analysis provided a clear symbolic description of the stenotic lesions. Although this system worked correctly, it did not take into account the variability and uncertainty inherent to image processing and to knowledge on the reference diameter. This system has been improved by the introduction of fuzzy logic in the representation of the reference diameter. It provides a description of the stenosis in terms of fuzzy quantities. To illustrate the benefits …

Advanced and Specialized NursingParsingbusiness.industrySubtractionAngiography Digital SubtractionHealth InformaticsPattern recognitionImage processingRenal Artery Obstructioncomputer.software_genremedicine.diseaseSymbolic descriptionFuzzy logicStenosisDigital imageRenal ArteryFuzzy LogicHealth Information ManagementmedicineHumansRadiographic Image Interpretation Computer-AssistedArtificial intelligenceRepresentation (mathematics)businesscomputer
researchProduct

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

Thompson Sampling Guided Stochastic Searching on the Line for Non-stationary Adversarial Learning

2015

This paper reports the first known solution to the N-Door puzzle when the environment is both non-stationary and deceptive (adversarial learning). The Multi-Armed-Bandit (MAB) problem is the iconic representation of the exploration versus exploitation dilemma. In brief, a gambler repeatedly selects and play, one out of N possible slot machines or arms and either receives a reward or a penalty. The objective of the gambler is then to locate the most rewarding arm to play, while in the process maximize his winnings. In this paper we investigate a challenging variant of the MAB problem, namely the non-stationary N-Door puzzle. Here, instead of directly observing the reward, the gambler is only…

Adversarial systemComputer scienceProperty (programming)business.industryProcess (computing)Reinforcement learningArtificial intelligencebusinessRepresentation (mathematics)Bayesian inferenceMulti-armed banditThompson sampling2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA)
researchProduct

The PolarLITIS Dataset: Road Scenes Under Fog

2022

Road scene analysis is a fundamental task for both autonomous vehicles and ADAS systems. Nowadays, one can find autonomous vehicles that are able to properly detect objects in the scene in good weather conditions; however, some improvements still need to be done when the visibility is altered. People claim that using some non-conventional sensors such as, infra-red or Lidar, combined with classical vision, enhances road scene analysis in optimal weather conditions. In this work, we present the improvements achieved using polarimetric imaging in the complex situation of some adverse weather conditions. This rich modality is known for its ability to describe an object not only by its intensit…

Adverse weatherModality (human–computer interaction)Reflection (computer programming)business.industryComputer scienceMechanical EngineeringComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPolarimetryObject (computer science)Computer Science ApplicationsTask (project management)LidarAutomotive EngineeringComputer visionArtificial intelligencebusinessVisibilityIEEE Transactions on Intelligent Transportation Systems
researchProduct

Scratches Removal in Digitised Aerial Photos Concerning Sicilian Territory

2007

In this paper we propose a fast and effective method to detect and restore scratches in aerial photos from a photographic archive concerning Sicilian territory. Scratch removal is a typical problem for old movie films but similar defects can be seen in still images. Our solution is based on a semiautomatic detection process and an unsupervised restoration algorithm. Results are comparable with those obtained with commercial restoration tools.

Aerial photosbusiness.industryComputer scienceProcess (computing)Digital photographyObject detectionlanguage.human_languageImage restorationScratchComputer graphics (images)languageEffective methodComputer visionArtificial intelligencebusinesscomputerSicilianImage restorationcomputer.programming_language2007 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services
researchProduct

A robust aerial image registration method using Gaussian mixture models

2014

Aerial image registration is one of the bases in many aerospace applications, such as aerial reconnaissance and aerial mapping. In this paper, we propose a novel aerial image registration algorithm which is based on Gaussian mixture models. First of all, considering the characters of the aerial images, the work uses a shape feature detector which computes the boundaries of regions with nearly the same gray-value to extract invariant feature. Then, a Gaussian mixture models (GMM) based image registration model is built and solved to estimate the transformation matrix between two aerial images. Furthermore, the proposed method is applied on real aerial images, and the results demonstrate the …

Aerial surveyComputer sciencebusiness.industryFeature detectorCognitive NeuroscienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationComputerApplications_COMPUTERSINOTHERSYSTEMSPattern recognitionComputer Science Applications1707 Computer Vision and Pattern RecognitionMixture modelAerial images; Feature detector; Gaussian mixture models; Image registration; Computer Science Applications1707 Computer Vision and Pattern Recognition; Cognitive Neuroscience; Artificial IntelligenceComputer Science ApplicationsComputer Science::RoboticsComputer Science::Systems and ControlArtificial IntelligenceComputer Science::Computer Vision and Pattern RecognitionAerial imagesComputer visionAerial reconnaissanceArtificial intelligenceGaussian mixture modelsbusinessAerial imageImage registration
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct