Search results for "Mining"
showing 10 items of 1730 documents
3D skeleton-based human action classification: A survey
2016
In recent years, there has been a proliferation of works on human action classification from depth sequences. These works generally present methods and/or feature representations for the classification of actions from sequences of 3D locations of human body joints and/or other sources of data, such as depth maps and RGB videos.This survey highlights motivations and challenges of this very recent research area by presenting technologies and approaches for 3D skeleton-based action classification. The work focuses on aspects such as data pre-processing, publicly available benchmarks and commonly used accuracy measurements. Furthermore, this survey introduces a categorization of the most recent…
An ontology-based retrieval system for mammographic reports
2015
In healthcare domain it can be useful to compare unstructured free-text clinical reports in order to enable the search for similar and/or relevant clinical cases. In data mining and text analysis tasks, the cosine similarity is usually used for texts comparison purposes. It is usually performed by computing the standard document vector cosine similarity between the two vectors representing the report pair under analysis. In this paper a novel system based on text pre-processing techniques and a modelled medical knowledge, using an improved radiological ontology, is proposed. Medical terms organized in a hierarchical tree can assess semantic similarity relationships between unstructured repo…
A Novel Expert System for Non-Invasive Liver Iron Overload Estimation in Thalassemic Patients
2014
Expert Systems can integrate logic based often on computational intelligence methods and they are used in complex problem solving. In this work an Expert System for classifying liver iron concentration in thalassemic patients is presented. In this work, an ANN is used to validate the output of the L.I.O.MO.T (Liver Iron Overload Monitoring in Thalassemia) method against the output of the state-of-the-art method based on MRI T2 assessment for liver iron concentration. The model has been validated with a dataset of 200 samples. The experimental Mean Squared Error results and Correlation show interesting performances. The proposed algorithm has been developed as a plug in for OsiriX Dicom View…
A framework for real-time Twitter data analysis
2016
A framework for real-time Twitter data analysisWe propose improvements to the Soft Frequent Pattern Mining (SFPM) algorithmThe stream of tweets is organized in dynamic windows whose size depends both on the volume of tweets and timeThe set of keywords used to query Twitter is progressively refined to highlight the user's point of viewComparisons with two state of the art systems Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. In this work we present a system for real-time Twitter data analysis in order to follow popular events from the user's perspective. The method we propose extends and improves the Soft Freque…
QoS-Aware Fault Detection in Wireless Sensor Networks
2013
Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS re…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Fast Training of Self Organizing Maps for the Visual Exploration of Molecular Compounds
2007
Visual exploration of scientific data in life science\ud area is a growing research field due to the large amount of\ud available data. The Kohonen’s Self Organizing Map (SOM) is\ud a widely used tool for visualization of multidimensional data.\ud In this paper we present a fast learning algorithm for SOMs\ud that uses a simulated annealing method to adapt the learning\ud parameters. The algorithm has been adopted in a data analysis\ud framework for the generation of similarity maps. Such maps\ud provide an effective tool for the visual exploration of large and\ud multi-dimensional input spaces. The approach has been applied\ud to data generated during the High Throughput Screening\ud of mo…
A data association approach to detect and organize people in personal photo collections
2011
In this paper we present a method to automatically segment a photo sequence in groups containing the same persons. Many methods in literature accom- plish to this task by adopting clustering techniques. We model the problem as the search for probable associations between faces detected in subsequent photos con- sidering the mutual exclusivity constraint: a person can not be in a photo two times, nor two faces in the same photo can be assigned to the same group. Associations have been found considering face and clothing descriptions. In particular, a two level architecture has been adopted: at the first level, associations are computed within meaningful temporal windows (situations); at the …
Medical image registration: Interpolations, similarities and optimizations strategies
2010
This paper presents a study conducted for evaluating different interpolation schemes, similarity metrics and optimization algorithms for the purpose of volumetric medical image registration. Each technique has been implemented to be plugged in a modular system. Rotation, translation and scale error has been measured to obtain a performance evaluation for all of the combinations of the considered techniques. Several experimental tests were conducted for validation both on synthetic and real datasets providing an exhaustive overview of the various strategies used.
Structural Knowledge Extraction and Representation in Sensory Data
During the last decades the availability of increasingly cheaper technology for pervasive monitoring has boosted the creation of systems able to automatically comprehend the events occurring in the monitored area, in order to plan a set of actions to bring the environment closer to the user's preferences. These systems must inevitably process a great amount of raw data - sensor measurements - and need to summarize them in a high-level representation to accomplish their tasks. An implicit requirement is the need to learn from experience, in order to be able to capture the hidden structure of the data, in terms of relations between its key components. The availability of large collections of …