Search results for "False positive paradox"

showing 10 items of 19 documents

Transferability of PCR-based diagnostic protocols: An international collaborative case study assessing protocols targeting the quarantine pine pathog…

2019

Producción Científica

0301 basic medicineAgricultural BiotechnologyPerformanceInternational Cooperation1ST REPORTlcsh:Medicinediagnostica PCR protocolli PCR trasferibilità patologia forestale patogeni fungini fusarium circinatum malattie emergenti / PCR diagnostics protocol transferability emerging tree diseases fungal forest pathogensPolymerase Chain ReactionPine pitch cankerlaw.invention0302 clinical medicineFusariumlawChancro resinoso del pinoFalse positive paradoxDNA Fungallcsh:SciencePathogenPolymerase chain reactionPinus radiataEnfermedades fúngicas - DiagnósticoMultidisciplinaryAgricultural SciencesCausal agentPathogenic fungusPitch Canker disease3. Good healthOther Agricultural SciencesTests PCRGibberella-CircinataFusariumPolymerase-Chain-ReactionDNA PlantPlantationsBOTANICATransferabilityFusarium circinatumBiologyPitch cankerno key wordsReal-Time Polymerase Chain ReactionSensitivity and SpecificityArticleREAL-TIME PCR; POLYMERASE-CHAIN-REACTION; PITCH CANKER DISEASE; CAUSAL AGENT; GIBBERELLA-CIRCINATA; 1ST REPORT; QUANTIFICATION; SUSCEPTIBILITY; PLANTATIONS; PERFORMANCE03 medical and health sciencesGibberella circinataQuantificationQuarantineDiagnóstico de enfermedad fungicaFalse Positive ReactionsFungal infections - DiagnosisMolecular BiologyPlant DiseasesInvasive speciesbusiness.industrylcsh:RReproducibility of ResultsPinusbiology.organism_classificationPCR-based testsBiotechnology030104 developmental biology3106 Ciencia ForestalSusceptibilitylcsh:QReal-Time PCRbusinessPCR-based techniques030217 neurology & neurosurgeryScientific Reports
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

The diagnostic performance of renal function-adjusted D-dimer testing in individuals suspected of having venous thromboembolism

2019

Renal impairment, a source of chronic hypercoagulability[1][1] and inflammation,[2][2] is known to reduce the specificity of the D-dimer test in the diagnosis of venous thromboembolism (VTE).[3][3] This leads to many false positives in such patients and consequently to additional costs, as well as

AdultMalemedicine.medical_specialtyComputed Tomography AngiographyRenal functionSensitivity and SpecificityFibrin Fibrinogen Degradation Products03 medical and health sciences0302 clinical medicineText miningInternal medicineD-dimermedicineFalse positive paradoxHumansFalse Positive ReactionsProspective StudiesRenal InsufficiencyProspective cohort studyOnline Only ArticlesComputed tomography angiographyAgedProbabilityVenous Thrombosismedicine.diagnostic_testbusiness.industryHematologyVenous ThromboembolismMiddle AgedCardiologyFemalebusinessPulmonary EmbolismVenous thromboembolismAlgorithms030215 immunologyGlomerular Filtration RateHaematologica-the Hematology Journal
researchProduct

Approximated overlap error for the evaluation of feature descriptors on 3D scenes

2013

This paper presents a new framework to evaluate feature descriptors on 3D datasets. The proposed method employs the approximated overlap error in order to conform with the reference planar evaluation case of the Oxford dataset based on the overlap error. The method takes into account not only the keypoint centre but also the feature shape and it does not require complex data setups, depth maps or an accurate camera calibration. Only a ground-truth fundamental matrix should be computed, so that the dataset can be freely extended by adding further images. The proposed approach is robust to false positives occurring in the evaluation process, which do not introduce any relevant changes in the …

Complex data typeSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryComputer scienceGLOHEpipolar geometryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformPattern recognitionLIOPMROGHkeypoint descriptorSIFTepipolar geometryFalse positive paradoxComputer visionArtificial intelligencebusinessFundamental matrix (computer vision)descriptor evaluationCamera resectioning
researchProduct

Reducing False Node Failure Predictions in HPC

2019

Future HPC applications must be able to scale to thousands of compute nodes, while running for several days. The increased runtime and node count inconveniently raises the probability of hardware failures that may interrupt computations. Scientists must therefore protect their simulations against hardware failures. This is typically done using frequent checkpoint& restart, which may have significant overheads. Consequently, the frequency in which checkpoints are taken should be minimized. Predicting hardware failures ahead of time is a promising approach to address this problem, but has remaining issues like false alarms at large scales. In this paper, we introduce the probability of unnece…

Computer scienceNode (networking)Metric (mathematics)False positive paradoxFault toleranceFalse positive rateResilience (network)Cluster (spacecraft)Reliability engineering2019 IEEE 26th International Conference on High Performance Computing, Data, and Analytics (HiPC)
researchProduct

Exudate-based diabetic macular edema detection in fundus images using publicly available datasets

2010

International audience; Diabetic macular edema (DME) is a common vision threatening complication of diabetic retinopathy. In a large scale screening environment DME can be assessed by detecting exudates (a type of bright lesions) in fundus images. In this work, we introduce a new methodology for diagnosis of DME using a novel set of features based on colour, wavelet decomposition and automatic lesion segmentation. These features are employed to train a classifier able to automatically diagnose DME through the presence of exudation. We present a new publicly available dataset with ground-truth data containing 169 patients from various ethnic groups and levels of DME. This and other two publi…

Databases Factualgenetic structuresFeature extractionDiabetic macular edemaHealth Informatics02 engineering and technologySensitivity and SpecificityMacular Edema030218 nuclear medicine & medical imagingPattern Recognition Automated03 medical and health sciences0302 clinical medicineWavelet decompositionWaveletImage Interpretation Computer-Assisted[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringFalse positive paradoxMedicineHumansRadiology Nuclear Medicine and imagingComputer visionGround truthDiabetic RetinopathyRadiological and Ultrasound Technologybusiness.industryReproducibility of ResultsDiabetic retinopathyExudates and Transudatesmedicine.diseaseImage EnhancementComputer Graphics and Computer-Aided Designeye diseases[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessClassifier (UML)AlgorithmsRetinoscopy
researchProduct

On the power and the systematic biases of the detection of chromosomal inversions by paired-end genome sequencing

2013

One of the most used techniques to study structural variation at a genome level is paired-end mapping (PEM). PEM has the advantage of being able to detect balanced events, such as inversions and translocations. However, inversions are still quite difficult to predict reliably, especially from high-throughput sequencing data. We simulated realistic PEM experiments with different combinations of read and library fragment lengths, including sequencing errors and meaningful base-qualities, to quantify and track down the origin of false positives and negatives along sequencing, mapping, and downstream analysis. We show that PEM is very appropriate to detect a wide range of inversions, even with …

Evolutionary GeneticsChromosome Structure and Functionlcsh:MedicineComputational biologyBiologyGenomeDNA sequencingStructural variation03 medical and health sciences0302 clinical medicineGenetic MutationGeneticsFalse positive paradoxHumansComputer SimulationFalse Positive ReactionsGenomic libraryGenome Sequencinglcsh:ScienceBiologyGenome EvolutionFalse Negative Reactions030304 developmental biologyChromosomal inversionSegmental duplicationGeneticsEvolutionary Biology0303 health sciencesMultidisciplinaryChromosome Biologylcsh:RBreakpointMutation TypesComputational BiologyChromosome MappingGenomic EvolutionGenomicsSequence Analysis DNAComparative GenomicsChromosomes Human Pair 1Chromosome Inversionlcsh:QStructural GenomicsSequence AnalysisAlgorithms030217 neurology & neurosurgeryResearch Article
researchProduct

Interest of exome sequencing trio-like strategy based on pooled parental DNA for diagnosis and translational research in rare diseases.

2021

Abstract Background Exome sequencing (ES) has become the most powerful and cost‐effective molecular tool for deciphering rare diseases with a diagnostic yield approaching 30%–40% in solo‐ES and 50% in trio‐ES. We applied an innovative parental DNA pooling method to reduce the parental sequencing cost while maintaining the diagnostic yield of trio‐ES. Methods We pooled six (Agilent‐CRE‐v2–100X) or five parental DNA (TWIST‐HCE–70X) aiming to detect allelic balance around 8–10% for heterozygous status. The strategies were applied as second‐tier (74 individuals after negative solo‐ES) and first‐tier approaches (324 individuals without previous ES). Results The allelic balance of parental‐pool v…

Genetic MarkersCost effectivenessTranslational researchBiologyQH426-470Sensitivity and SpecificityWorkflowTranslational Research Biomedicalchemistry.chemical_compoundsymbols.namesakeExome SequencingFalse positive paradoxGeneticsHumansDna poolingGenetic Predisposition to DiseaseGenetic TestingAlleleMolecular BiologyGenetics (clinical)Exome sequencingtrio‐like strategy; parental‐pool strategyGeneticsSanger sequencingcost effectivenessReproducibility of Resultsrare diseasesSequence Analysis DNAOriginal ArticleschemistryResearch DesignsymbolsOriginal ArticleDNAGenome-Wide Association StudyMolecular geneticsgenomic medicine
researchProduct

A Personal LPWAN Remote Monitoring System

2021

Firefighters are equipped with an immobility detector device also called the Personal Alert Safety System (PASS) that is integrated into the user's Self-Contained Breathing Apparatus (SCBA). If a firefighter remains motionless for a certain period of time, a loud audible alert is triggered to notify the Firefighter Assist and Search Team (FAST) deployed in the area of intervention that the wearer of the PASS device is in trouble and in need of rescue. However, this device is not reliable enough since it triggers frequently false positives which lead to developing a tolerance for sounding alarms among the crew. As a consequence, they do not seem to be concerned about it as they should and th…

LPWANEmergency responseComputer scienceCrewFalse positive paradoxLocation awarenessMonitoring systemcomputer.software_genreComputer securitySet (psychology)Wireless sensor networkcomputer2021 International Wireless Communications and Mobile Computing (IWCMC)
researchProduct

Detecting multiple copies in tampered images

2010

Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a method to detect these image alterations, using a SIFT-based approach. First we describe a state of the art SIFT-point matching method, which inspired our algorithm, then we compare it with our SIFT-based approach, which consists of three parts: keypoint clustering, cluster matching, and texture analysis. The goal is to find copies of the same object, i.e. clusters of points, rather than points that match. Cluster matching proves to give better results than single point matching, since it returns a complete and co…

Matching (statistics)business.industryImage forensicTemplate matchingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformPattern recognitionObject (computer science)ClusteringImage (mathematics)Image textureSIFTFalse positive paradoxComputer visionArtificial intelligencebusinessCluster analysisMathematics2010 IEEE International Conference on Image Processing
researchProduct