Search results for "DATA MINING"
showing 10 items of 907 documents
Supporting Impact Analysis by Program Dependence Graph Based Forward Slicing
2007
Since software must evolve to meet the typically changing requirements, source code modifications can not be avoided. Impact analysis is one of the central and relatively demanding tasks of software maintenance. It is constantly needed while aiming at ensuring the correctness of the made modifications. Due to its importance and challenging nature automated support techniques are required. Theoretically, forward slicing is a very suitable technique for that purpose. Therefore, we have implemented a program dependence graph (PDG) based tool, called GRACE, for it. For example, due to the typical rewritings of Visual Basic programs there is a great need to support their impact analysis. However…
Visualizing Confidence in Cluster-based Ensemble Weather Forecast Analyses
2020
In meteorology, cluster analysis is frequently used to determine representative trends in ensemble weather predictions in a selected spatio-temporal region, e.g., to reduce a set of ensemble members to simplify and improve their analysis. Identified clusters (i.e., groups of similar members), however, can be very sensitive to small changes of the selected region, so that clustering results can be misleading and bias subsequent analyses. In this article, we — a team of visualization scientists and meteorologists-deliver visual analytics solutions to analyze the sensitivity of clustering results with respect to changes of a selected region. We propose an interactive visual interface that enab…
Discovering the Discriminating Power in Patient Test Features Using Visual Analytics: A Case Study in Parkinson’s Disease
2016
Part 11: New Methods and Tools for Big Data Wokshop (MT4BD); International audience; This paper presents a novel methodology for selecting the most representative features for identifying the presence of the Parkinson’s Disease (PD). The proposed methodology is based on interactive visual analytic based on multi-objective optimisation. The implemented tool processes and visualises the information extracted via performing a typical line-tracking test using a tablet device. Such output information includes several modalities, such as position, velocity, dynamics, etc. Preliminary results depict that the implemented visual analytics technique has a very high potential in discriminating the PD …
CheS-Mapper 2.0 for visual validation of (Q)SAR models
2014
Abstract Background Sound statistical validation is important to evaluate and compare the overall performance of (Q)SAR models. However, classical validation does not support the user in better understanding the properties of the model or the underlying data. Even though, a number of visualization tools for analyzing (Q)SAR information in small molecule datasets exist, integrated visualization methods that allow the investigation of model validation results are still lacking. Results We propose visual validation, as an approach for the graphical inspection of (Q)SAR model validation results. The approach applies the 3D viewer CheS-Mapper, an open-source application for the exploration of sm…
Practical Volcano-Independent Recognition of Seismic Events: VULCAN.ears Project
2021
Recognizing the mechanisms underlying seismic activity and tracking temporal and spatial patterns of earthquakes represent primary inputs to monitor active volcanoes and forecast eruptions. To quantify this seismicity, catalogs are established to summarize the history of the observed types and number of volcano-seismic events. In volcano observatories the detection and posterior classification or labeling of the events is manually performed by technicians, often suffering a lack of unified criteria and eventually resulting in poorly reliable labeled databases. State-of-the-art automatic Volcano-Seismic Recognition (VSR) systems allow real-time monitoring and consistent catalogs. VSR systems…
WWOX-related encephalopathies: delineation of the phenotypical spectrum and emerging genotype-phenotype correlation
2014
International audience; BACKGROUND:Homozygous mutations in WWOX were reported in eight individuals of two families with autosomal recessive spinocerebellar ataxia type 12 and in two siblings with infantile epileptic encephalopathy (IEE), including one who deceased prior to DNA sampling.METHODS:By combining array comparative genomic hybridisation, targeted Sanger sequencing and next generation sequencing, we identified five further patients from four families with IEE due to biallelic alterations of WWOX.RESULTS:We identified eight deleterious WWOX alleles consisting in four deletions, a four base-pair frameshifting deletion, one missense and two nonsense mutations. Genotype-phenotype correl…
An Evaluation Matrix to Compare Computer Hydrological Models for Flood Predictions
2020
In order to predict and control the impacts of floods in torrents, it is important to verify the simulation accuracy of the most used hydrological models. The performance verification is particularly needed for applications in watersheds with peculiar climatic and geomorphological characteristics, such as the Mediterranean torrents. Moreover, in addition to the accuracy, other factors affect the choice of software by stakeholders (users, modellers, researchers, etc.). This study introduces a &ldquo
Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Netw…
2020
This proceedings book presents the latest research findings, and theoretical and practical perspectives on innovative methods and development techniques related to the emerging areas of Web computing, intelligent systems and Internet computing. The Web has become an important source of information, and techniques and methodologies that extract quality information are of paramount importance for many Web and Internet applications. Data mining and knowledge discovery play a key role in many of today’s major Web applications, such as e-commerce and computer security. Moreover, Web services provide a new platform for enabling service-oriented systems. The emergence of large-scale distributed co…
Detection of Internet robots using a Bayesian approach
2015
A large part of Web traffic on e-commerce sites is generated not by human users but by Internet robots: search engine crawlers, shopping bots, hacking bots, etc. In practice, not all robots, especially the malicious ones, disclose their identities to a Web server and thus there is a need to develop methods for their detection and identification. This paper proposes the application of a Bayesian approach to robot detection based on characteristics of user sessions. The method is applied to the Web traffic from a real e-commerce site. Results show that the classification model based on the cluster analysis with the Ward's method and the weighted Euclidean metric is very effective in robot det…
Anomaly Detection from Network Logs Using Diffusion Maps
2011
The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset. peerReviewed