Search results for "Data type"

showing 10 items of 1183 documents

Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox

2017

International audience; In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization problem is encountered in e.g 3D conformation optimisation for protein structure prediction, or largest core genes subset discovery based on best supported phylogenetic tree for a set of species. In order to solve this problem, we propose a toolbox that can be easily launched usin…

FOS: Computer and information sciences0301 basic medicineTheoretical computer scienceOptimization problemComputer Science - Artificial IntelligenceComputer science[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Quantitative Biology - Quantitative MethodsSet (abstract data type)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]State spaceMetaheuristicQuantitative Methods (q-bio.QM)Protein structure prediction[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationToolboxCore (game theory)Artificial Intelligence (cs.AI)030104 developmental biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]FOS: Biological sciences[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Word (computer architecture)
researchProduct

Popularity of patterns over $d$-equivalence classes of words and permutations

2020

Abstract Two same length words are d-equivalent if they have same descent set and same underlying alphabet. In particular, two same length permutations are d-equivalent if they have same descent set. The popularity of a pattern in a set of words is the overall number of copies of the pattern within the words of the set. We show the far-from-trivial fact that two patterns are d-equivalent if and only if they are equipopular over any d-equivalence class, and this equipopularity does not follow obviously from a trivial equidistribution.

FOS: Computer and information sciencesClass (set theory)General Computer ScienceDiscrete Mathematics (cs.DM)010102 general mathematics0102 computer and information sciences01 natural sciencesPopularityTheoretical Computer ScienceCombinatoricsSet (abstract data type)010201 computation theory & mathematicsIf and only if[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: MathematicsMathematics - CombinatoricsCombinatorics (math.CO)0101 mathematicsAlphabetComputingMilieux_MISCELLANEOUSComputer Science::Formal Languages and Automata TheoryMathematicsDescent (mathematics)Computer Science - Discrete Mathematics
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Functions definable by numerical set-expressions

2011

A "numerical set-expression" is a term specifying a cascade of arithmetic and logical operations to be performed on sets of non-negative integers. If these operations are confined to the usual Boolean operations together with the result of lifting addition to the level of sets, we speak of "additive circuits". If they are confined to the usual Boolean operations together with the result of lifting addition and multiplication to the level of sets, we speak of "arithmetic circuits". In this paper, we investigate the definability of sets and functions by means of additive and arithmetic circuits, occasionally augmented with additional operations.

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceLogic0102 computer and information sciences01 natural sciencesTheoretical Computer Scienceexpressive powerSet (abstract data type)integer expressionArts and Humanities (miscellaneous)Saturation arithmeticBoolean expression0101 mathematicsElectronic circuitMathematics010102 general mathematicsTerm (logic)Logic in Computer Science (cs.LO)AlgebraArithmetic circuitdefinability010201 computation theory & mathematicsHardware and ArchitectureCascadeAlgebraic operationMultiplicationF.1.1SoftwareJournal of Logic and Computation
researchProduct

A General Framework for Complex Network-Based Image Segmentation

2019

International audience; With the recent advances in complex networks theory, graph-based techniques for image segmentation has attracted great attention recently. In order to segment the image into meaningful connected components, this paper proposes an image segmentation general framework using complex networks based community detection algorithms. If we consider regions as communities, using community detection algorithms directly can lead to an over-segmented image. To address this problem, we start by splitting the image into small regions using an initial segmentation. The obtained regions are used for building the complex network. To produce meaningful connected components and detect …

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Networks and CommunicationsComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMachine Learning (stat.ML)02 engineering and technologyMachine Learning (cs.LG)Statistics - Machine Learning0202 electrical engineering electronic engineering information engineeringMedia TechnologySegmentationConnected componentbusiness.industrySimilarity matrix[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringPattern recognitionImage segmentationComplex networkHardware and ArchitectureComputer Science::Computer Vision and Pattern RecognitionGraph (abstract data type)020201 artificial intelligence & image processingArtificial intelligencebusinessSoftware
researchProduct

Deep Learning Based Cardiac MRI Segmentation: Do We Need Experts?

2021

Deep learning methods are the de facto solutions to a multitude of medical image analysis tasks. Cardiac MRI segmentation is one such application, which, like many others, requires a large number of annotated data so that a trained network can generalize well. Unfortunately, the process of having a large number of manually curated images by medical experts is both slow and utterly expensive. In this paper, we set out to explore whether expert knowledge is a strict requirement for the creation of annotated data sets on which machine learning can successfully be trained. To do so, we gauged the performance of three segmentation models, namely U-Net, Attention U-Net, and ENet, trained with dif…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer scienceProcess (engineering)GeneralizationIndustrial engineering. Management engineeringComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern Recognitionheartannotated data setT55.4-60.8Machine learningcomputer.software_genre030218 nuclear medicine & medical imagingTheoretical Computer ScienceMachine Learning (cs.LG)Set (abstract data type)03 medical and health sciences0302 clinical medicineFOS: Electrical engineering electronic engineering information engineeringSegmentationNumerical AnalysisArtificial neural networkbusiness.industryDeep learningsegmentationImage and Video Processing (eess.IV)deep learningQA75.5-76.95Electrical Engineering and Systems Science - Image and Video ProcessingComputational MathematicsHausdorff distanceComputational Theory and MathematicsIndex (publishing)Electronic computers. Computer scienceArtificial intelligencebusinesscomputer030217 neurology & neurosurgeryMRI
researchProduct

Mislabel Detection of Finnish Publication Ranks

2019

The paper proposes to analyze a data set of Finnish ranks of academic publication channels with Extreme Learning Machine (ELM). The purpose is to introduce and test recently proposed ELM-based mislabel detection approach with a rich set of features characterizing a publication channel. We will compare the architecture, accuracy, and, especially, the set of detected mislabels of the ELM-based approach to the corresponding reference results on the reference paper.

FOS: Computer and information sciencesComputer Science - Machine LearningComputer sciencerankinglistatMachine Learning (stat.ML)computer.software_genreMachine Learning (cs.LG)Set (abstract data type)Statistics - Machine LearningDigital Libraries (cs.DL)julkaisukanavatvirheanalyysimislabel detectionExtreme learning machineExtreme Learning Machine (ELM)publication channelsComputer Science - Digital LibrariesData setkoneoppiminendataData miningrankingsarviointicomputertieteellinen julkaisutoimintaCommunication channel
researchProduct

Finding k -dissimilar paths with minimum collective length

2018

Shortest path computation is a fundamental problem in road networks. However, in many real-world scenarios, determining solely the shortest path is not enough. In this paper, we study the problem of finding k-Dissimilar Paths with Minimum Collective Length (kDPwML), which aims at computing a set of paths from a source s to a target t such that all paths are pairwise dissimilar by at least \theta and the sum of the path lengths is minimal. We introduce an exact algorithm for the kDPwML problem, which iterates over all possible s-t paths while employing two pruning techniques to reduce the prohibitively expensive computational cost. To achieve scalability, we also define the much smaller set …

FOS: Computer and information sciencesComputer scienceDatabases (cs.DB)0102 computer and information sciences02 engineering and technology01 natural sciencesSet (abstract data type)Exact algorithmComputer Science - Databases010201 computation theory & mathematicsIterated function020204 information systemsComputer Science - Data Structures and AlgorithmsShortest path problemScalabilityPath (graph theory)0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)Pairwise comparisonPruning (decision trees)AlgorithmProceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
researchProduct

Monoids and Maximal Codes

2011

In recent years codes that are not Uniquely Decipherable (UD) are been studied partitioning them in classes that localize the ambiguities of the code. A natural question is how we can extend the notion of maximality to codes that are not UD. In this paper we give an answer to this question. To do this we introduce a partial order in the set of submonoids of a monoid showing the existence, in this poset, of maximal elements that we call full monoids. Then a set of generators of a full monoid is, by definition, a maximal code. We show how this definition extends, in a natural way, the existing definition concerning UD codes and we find a characteristic property of a monoid generated by a maxi…

FOS: Computer and information sciencesDiscrete mathematicsMonoidCode (set theory)Formal Languages and Automata Theory (cs.FL)lcsh:MathematicsComputer Science - Formal Languages and Automata TheoryAstrophysics::Cosmology and Extragalactic Astrophysicslcsh:QA1-939lcsh:QA75.5-76.95Set (abstract data type)chemistry.chemical_compoundchemistryFOS: MathematicsMathematics - CombinatoricsOrder (group theory)High Energy Physics::ExperimentCombinatorics (math.CO)lcsh:Electronic computers. Computer scienceCharacteristic propertyPartially ordered setMaximal elementMathematicsElectronic Proceedings in Theoretical Computer Science
researchProduct

Descent distribution on Catalan words avoiding a pattern of length at most three

2018

Catalan words are particular growth-restricted words over the set of non-negative integers, and they represent still another combinatorial class counted by the Catalan numbers. We study the distribution of descents on the sets of Catalan words avoiding a pattern of length at most three: for each such a pattern $p$ we provide a bivariate generating function where the coefficient of $x^ny^k$ in its series expansion is the number of length $n$ Catalan words with $k$ descents and avoiding $p$. As a byproduct, we enumerate the set of Catalan words avoiding $p$, and we provide the popularity of descents on this set. Some of the obtained enumerating sequences are not yet recorded in the On-line En…

FOS: Computer and information sciencesDistribution (number theory)Discrete Mathematics (cs.DM)0102 computer and information sciences02 engineering and technologyBivariate analysis01 natural sciencesTheoretical Computer ScienceCatalan numberSet (abstract data type)Combinatorics0202 electrical engineering electronic engineering information engineeringFOS: MathematicsDiscrete Mathematics and CombinatoricsMathematics - Combinatorics[MATH]Mathematics [math]MathematicsDescent (mathematics)Discrete mathematicsGenerating functionDescent020206 networking & telecommunicationslanguage.human_languagePopularity010201 computation theory & mathematicsPattern avoidancelanguageCatalanCombinatorial classCombinatorics (math.CO)Catalan wordComputer Science - Discrete Mathematics
researchProduct