Search results for "Datasets"

showing 5 items of 45 documents

Quantitative Prediction of the Landscape of T Cell Epitope Immunogenicity in Sequence Space

2019

Immunodominant T cell epitopes preferentially targeted in multiple individuals are the critical element of successful vaccines and targeted immunotherapies. However, the underlying principles of this "convergence" of adaptive immunity among different individuals remain poorly understood. To quantitatively describe epitope immunogenicity, here we propose a supervised machine learning framework generating probabilistic estimates of immunogenicity, termed "immunogenicity scores," based on the numerical features computed through sequence-based simulation approximating the molecular scanning process of peptides presented onto major histocompatibility complex (MHC) by the human T cell receptor (T…

lcsh:Immunologic diseases. AllergyT cellT-LymphocytesImmunologyReceptors Antigen T-CellDatasets as TopicEpitopes T-Lymphocytechemical and pharmacologic phenomenaComputational biologyBiologyAdaptive ImmunityimmunogenicityMajor histocompatibility complexEpitopeMajor Histocompatibility ComplexmedicineImmunology and AllergyHumansComputer SimulationAntigen PresentationImmunodominant EpitopesRepertoireImmunogenicityT-cell receptorComputational BiologyAcquired immune systemmedicine.anatomical_structuremachine learningescape mutationbiology.proteinThermodynamicsT cell receptor repertoireSequence space (evolution)lcsh:RC581-607T cell epitopeFrontiers in Immunology
researchProduct

Indeksy i bazy danych jako źródła w studiach nad bezpieczeństwem. Stan badań

2021

Artykuł przedstawia metaanalizę w zakresie użyteczności narzędzi poznawczych w studiach nad bezpieczeństwem narodowym i międzynarodowym, jakimi są indeksy, rankingi i bazy danych. Ich użycie w studiach społecznych sięga czasów behawioralizmu oraz projektów takich jak Korelaty Wojny (Correlates of War, CoW), czy coroczne raporty takich instytucji jak PRIO, SIPRI, czy IISS. Rozwój organizacji międzynarodowych i narzędzi analitycznych zwiększył możliwości pozyskiwania danych ilościowych i jakościowych na temat zbrojeń, konfliktów, wojen, a także poczucia bezpieczeństwa, percepcji zagrożeń, jakości życia, czy zdrowia etc. W tekście analizuję kilkadziesiąt indeksów, rankingów i baz danych (datas…

safetyterroryzmwojnadatasetsconflictsecuritywarterrorismkonfliktbazy danychbezpieczeństwoRocznik Bezpieczeństwa Międzynarodowego
researchProduct

Scalable implementation of dependence clustering in Apache Spark

2017

This article proposes a scalable version of the Dependence Clustering algorithm which belongs to the class of spectral clustering methods. The method is implemented in Apache Spark using GraphX API primitives. Moreover, a fast approximate diffusion procedure that enables algorithms of spectral clustering type in Spark environment is introduced. In addition, the proposed algorithm is benchmarked against Spectral clustering. Results of applying the method to real-life data allow concluding that the implementation scales well, yet demonstrating good performance for densely connected graphs. peerReviewed

ta113ta213Apache SparkComputer sciencedatasetsCorrelation clusteringdata miningcomputer.software_genrealgorithmsSpectral clusteringComputational sciencedependence clusteringData stream clusteringCURE data clustering algorithmScalabilitySpark (mathematics)algoritmitCanopy clustering algorithmData miningtiedonlouhintaCluster analysisclustering algorithmscomputerdata processingtietojenkäsittely
researchProduct

The influence of dataset size on the performance of cell outage detection approach in LTE-A networks

2015

The configuration and maintenance of constantly evolving mobile cellular networks are getting more and more complex and hence expensive. Self-Organizing Networks (SON) concept is an umbrella term for the set of automated solutions for network operations proposed by 3rd Generation Partnership Project (3GPP) group. Automated cell outage detection is one of the components of SON functionality. In early studies our research group developed data-driven approach for the detection of malfunctioning cells. In this paper we investigate the performance of the proposed solution as a function of the density of active users and the size of observation interval. The evaluation is conducted in Long Term E…

ta113ta213Computer sciencebusiness.industrydatasetsReal-time computingLTE-A networkssizeMaintenance engineeringNetwork operations centerTerm (time)LTE AdvancedHandoverCellular networkMobile telephonybusinessRandom accessComputer network
researchProduct

CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications

2022

The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…

tekninen rikostutkintasovellukset (soveltaminen)datasetsobject detectiontekoälyprivacykameratcomputer visiontietosuojamachine learningkoneoppiminencamerasyksityisyyskameravalvontavideo surveillancekonenäköCCTVmappingkasvontunnistus (tietotekniikka)2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
researchProduct