Search results for "False positive paradox"
showing 10 items of 19 documents
Transferability of PCR-based diagnostic protocols: An international collaborative case study assessing protocols targeting the quarantine pine pathog…
2019
Producción Científica
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
The diagnostic performance of renal function-adjusted D-dimer testing in individuals suspected of having venous thromboembolism
2019
Renal impairment, a source of chronic hypercoagulability[1][1] and inflammation,[2][2] is known to reduce the specificity of the D-dimer test in the diagnosis of venous thromboembolism (VTE).[3][3] This leads to many false positives in such patients and consequently to additional costs, as well as
Approximated overlap error for the evaluation of feature descriptors on 3D scenes
2013
This paper presents a new framework to evaluate feature descriptors on 3D datasets. The proposed method employs the approximated overlap error in order to conform with the reference planar evaluation case of the Oxford dataset based on the overlap error. The method takes into account not only the keypoint centre but also the feature shape and it does not require complex data setups, depth maps or an accurate camera calibration. Only a ground-truth fundamental matrix should be computed, so that the dataset can be freely extended by adding further images. The proposed approach is robust to false positives occurring in the evaluation process, which do not introduce any relevant changes in the …
Reducing False Node Failure Predictions in HPC
2019
Future HPC applications must be able to scale to thousands of compute nodes, while running for several days. The increased runtime and node count inconveniently raises the probability of hardware failures that may interrupt computations. Scientists must therefore protect their simulations against hardware failures. This is typically done using frequent checkpoint& restart, which may have significant overheads. Consequently, the frequency in which checkpoints are taken should be minimized. Predicting hardware failures ahead of time is a promising approach to address this problem, but has remaining issues like false alarms at large scales. In this paper, we introduce the probability of unnece…
Exudate-based diabetic macular edema detection in fundus images using publicly available datasets
2010
International audience; Diabetic macular edema (DME) is a common vision threatening complication of diabetic retinopathy. In a large scale screening environment DME can be assessed by detecting exudates (a type of bright lesions) in fundus images. In this work, we introduce a new methodology for diagnosis of DME using a novel set of features based on colour, wavelet decomposition and automatic lesion segmentation. These features are employed to train a classifier able to automatically diagnose DME through the presence of exudation. We present a new publicly available dataset with ground-truth data containing 169 patients from various ethnic groups and levels of DME. This and other two publi…
On the power and the systematic biases of the detection of chromosomal inversions by paired-end genome sequencing
2013
One of the most used techniques to study structural variation at a genome level is paired-end mapping (PEM). PEM has the advantage of being able to detect balanced events, such as inversions and translocations. However, inversions are still quite difficult to predict reliably, especially from high-throughput sequencing data. We simulated realistic PEM experiments with different combinations of read and library fragment lengths, including sequencing errors and meaningful base-qualities, to quantify and track down the origin of false positives and negatives along sequencing, mapping, and downstream analysis. We show that PEM is very appropriate to detect a wide range of inversions, even with …
Interest of exome sequencing trio-like strategy based on pooled parental DNA for diagnosis and translational research in rare diseases.
2021
Abstract Background Exome sequencing (ES) has become the most powerful and cost‐effective molecular tool for deciphering rare diseases with a diagnostic yield approaching 30%–40% in solo‐ES and 50% in trio‐ES. We applied an innovative parental DNA pooling method to reduce the parental sequencing cost while maintaining the diagnostic yield of trio‐ES. Methods We pooled six (Agilent‐CRE‐v2–100X) or five parental DNA (TWIST‐HCE–70X) aiming to detect allelic balance around 8–10% for heterozygous status. The strategies were applied as second‐tier (74 individuals after negative solo‐ES) and first‐tier approaches (324 individuals without previous ES). Results The allelic balance of parental‐pool v…
A Personal LPWAN Remote Monitoring System
2021
Firefighters are equipped with an immobility detector device also called the Personal Alert Safety System (PASS) that is integrated into the user's Self-Contained Breathing Apparatus (SCBA). If a firefighter remains motionless for a certain period of time, a loud audible alert is triggered to notify the Firefighter Assist and Search Team (FAST) deployed in the area of intervention that the wearer of the PASS device is in trouble and in need of rescue. However, this device is not reliable enough since it triggers frequently false positives which lead to developing a tolerance for sounding alarms among the crew. As a consequence, they do not seem to be concerned about it as they should and th…
Detecting multiple copies in tampered images
2010
Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a method to detect these image alterations, using a SIFT-based approach. First we describe a state of the art SIFT-point matching method, which inspired our algorithm, then we compare it with our SIFT-based approach, which consists of three parts: keypoint clustering, cluster matching, and texture analysis. The goal is to find copies of the same object, i.e. clusters of points, rather than points that match. Cluster matching proves to give better results than single point matching, since it returns a complete and co…