Search results for "IDENTIFICATION"

showing 10 items of 1600 documents

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

Model Co-creation from a Modeler’s Perspective: Lessons Learned from the Collaboration Between Ethnographers and Modelers

2018

This paper reports on the authors’ ongoing collaboration on model co-creation, a process that involves not only the reconciliation of methodologies (qualitative vs. quantitative), but also of epistemologies (empirical vs empirical/rationalist) and ontologies (observable referent vs. abstracted referent). The co-creation process has taken place over several months, from early 2017, both in person, teleconferencing and via email. The result was an ethnographic model of the refugee situation in Lesbos, Greece. The qualifier “ethnographic” means that the simulation’s purpose was to capture the problem situation described by ethnographers in a manner that resembles their observations, not to ans…

021103 operations researchProcess (engineering)Field (Bourdieu)05 social sciencesPerspective (graphical)0211 other engineering and technologiesQualitative property02 engineering and technologyReferentEpistemologyIdentification (information)0502 economics and businessCo-creationSociologyResearch question050203 business & management
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests

2020

In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…

021110 strategic defence & security studiesComputer sciencebusiness.industry0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionStructural engineeringGeotechnical Engineering and Engineering GeologyUniversity hospitalBase (topology)0201 civil engineeringSettore ICAR/09 - Tecnica Delle CostruzioniSettore ING-IND/31 - ElettrotecnicaSnap backIdentification (information)friction friction pendulum bearing full-scale experimental tests in-situ testing seismic isolation snap-back testSeismic isolationbusinessQuasistatic processCivil and Structural EngineeringJournal of Earthquake Engineering
researchProduct

Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation

2016

Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…

021110 strategic defence & security studiesK5000-5582business.industrySeparation (aeronautics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologyAnatomyDental identificationpath-findinghuman dental identificationCriminal law and procedurestomatognathic diseasesstomatognathic systemSocial pathology. Social and public welfare. CriminologyPath (graph theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessHV1-9960Scandinavian Journal of Forensic Science
researchProduct

Political interest furthers partisanship in England, Scotland, and Wales

2016

ABSTRACTAccording to much of the literature, partisanship in Britain exercises little independent influence on the vote but merely reflects voters’ prospective and retrospective evaluations of the parties’ performance with regard to their management of the economy, national security, and public services. In this view, partisanship comes close to Fiorina’s model of a “running tally” of political experiences. Similarly, Dalton’s notion of “cognitive mobilization” suggests that seeking out political information should undermine both the need for and the likelihood of party identification. Applying Mixed Markov Latent Class Analysis to the British Election Study Panel 1997–2000, we challenge th…

021110 strategic defence & security studiesNational securitySociology and Political Sciencebusiness.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies02 engineering and technologyLatent class model0506 political scienceIdentification (information)PoliticsPerceptionLawPolitical economy050602 political science & public administrationSociologybusinessmedia_commonJournal of Elections, Public Opinion and Parties
researchProduct

ES1D: A Deep Network for EEG-Based Subject Identification

2017

Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…

021110 strategic defence & security studiesmedicine.diagnostic_testbusiness.industryComputer scienceDeep learningFeature extractionSIGNAL (programming language)0211 other engineering and technologiesSpectral densityPattern recognition02 engineering and technologyElectroencephalographyConvolutional neural networkConvolutionIdentification (information)0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processingArtificial intelligencebusiness2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)
researchProduct

Biodeterioration

2017

The biodeterioration of organic and inorganic materials, as well as polymers, is a complex of alteration processes induced by the growing and metabolic activ- ity of organisms. It can be recognized on monuments, wall paintings, stone, wood, paper, vegetal/animal fibers, and parchment artworks. As defined by Hueck (1968), biodeterioration is “any undesirable change in the properties of a material caused by the vital activities of organisms”; this definition is accepted as the meaning of the phenomenon. Both macroorganisms (such as animals, plants and mosses) and microorganisms (such as autotrophic or het- erotrophic bacteria, microfungi, cyanobacteria, algae and lichens) represent the trigge…

0301 basic medicine03 medical and health sciencesSettore BIO/03 - Botanica Ambientale E Applicata030106 microbiology010401 analytical chemistryBiodeteriogens Macro-system Micro-system Microbial colonizer Identification bacteria-fungi01 natural sciences0104 chemical sciences
researchProduct

TPP2 mutation associated with sterile brain inflammation mimicking MS

2018

ObjectiveTo ascertain the genetic cause of a consanguineous family from Syria suffering from a sterile brain inflammation mimicking a mild nonprogressive form of MS.MethodsWe used homozygosity mapping and next-generation sequencing to detect the disease-causing gene in the affected siblings. In addition, we performed RNA and protein expression studies, enzymatic activity assays, immunohistochemistry, and targeted sequencing of further MS cases from Austria, Germany, Canada and Jordan.ResultsIn this study, we describe the identification of a homozygous missense mutation (c.82T>G, p.Cys28Gly) in the tripeptidyl peptidase II (TPP2) gene in all 3 affected siblings of the family. Sequencing o…

0301 basic medicine41132medicine.disease_causeMajor histocompatibility complexArticle03 medical and health sciencesExon0302 clinical medicineGene expressionmedicineMissense mutationGeneGenetics (clinical)Medicinsk genetikMutationbiologyTripeptidyl peptidase IIDisease gene identificationMolecular biology3. Good health030104 developmental biologybiology.proteinNeurology (clinical)Medical Genetics030217 neurology & neurosurgeryNeurology Genetics
researchProduct