Search results for "Mining"

showing 10 items of 1730 documents

Tracking the outbreak. An optimized delimiting survey strategy for Xylella fastidiosa

2020

SummaryCurrent legislation enforces the implementation of intensive surveillance programs for quarantine plant pathogens. After an outbreak, surveys are implemented to delimit the geographic extent of the pathogen and execute disease control. The feasibility of control programs is highly dependent on budget availability, thus it is necessary to target and optimize surveillance strategies.A sequential adaptive delimiting survey involving a three-phase and a two-phase design with increasing spatial resolution was developed and implemented for the Xylella fastidiosa outbreak in Alicante, Spain. Inspection and sampling intensities were optimized using simulation-based methods and results were v…

0106 biological sciencesbiologyComputer scienceOutbreakSampling (statistics)computer.software_genrebiology.organism_classification010603 evolutionary biology01 natural sciencesDisease controlData miningXylella fastidiosacomputer010606 plant biology & botany
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

District heating networks: enhancement of the efficiency

2019

International audience; During the decades the district heating's (DH) advantages (more cost-efficient heat generation and reduced air pollution) overcompensated the additional costs of transmission and distribution of the centrally produced thermal energy to consumers. Rapid increase in the efficiency of low-power heaters, development of separated low heat density areas in cities reduce the competitiveness of the large centralized DH systems in comparison with the distributed cluster-size networks and even local heating. Reduction of transmission costs, enhancement of the network efficiency by optimization of the design of the DH networks become a critical issue. The methodology for determ…

020209 energynetwork design02 engineering and technology7. Clean energyAutomotive engineeringReduction (complexity)JEL: C - Mathematical and Quantitative Methods/C.C4 - Econometric and Statistical Methods: Special Topics/C.C4.C45 - Neural Networks and Related Topicsbenchmarking methodologies11. Sustainability0202 electrical engineering electronic engineering information engineeringdistrict heatingbusiness.industry020208 electrical & electronic engineeringdata miningBenchmarkingJEL: O - Economic Development Innovation Technological Change and Growth/O.O1 - Economic Development/O.O1.O13 - Agriculture • Natural Resources • Energy • Environment • Other Primary Products[SHS.ECO]Humanities and Social Sciences/Economics and FinanceNetwork planning and designVariable (computer science)Transmission (telecommunications)13. Climate actionHeat generationKey (cryptography)Environmental sciencebusinessJEL: C - Mathematical and Quantitative Methods/C.C2 - Single Equation Models • Single Variables/C.C2.C24 - Truncated and Censored Models • Switching Regression Models • Threshold Regression ModelsThermal energyInsights into Regional Development
researchProduct

Consistent Clustering of Elements in Large Pairwise Comparison Matrices

2018

[EN] In multi-attribute decision making the number of decision elements under consideration may be huge, especially for complex, real-world problems. Typically these elements are clustered and then the clusters organized hierarchically to reduce the number of elements to be simultaneously handled. These decomposition methodologies are intended to bring the problem within the cognitive ability of decision makers. However, such methodologies have disadvantages, and it may happen that such a priori clustering is not clear, and/or the problem has previously been addressed without any grouping action. This is the situation for the case study we address, in which a panel of experts gives opinions…

0209 industrial biotechnologyAHP0211 other engineering and technologiesAnalytic hierarchy process02 engineering and technologycomputer.software_genreWater distribution system (WDS)Pairwise comparisonMatrix (mathematics)020901 industrial engineering & automationSettore ING-IND/17 - Impianti Industriali MeccaniciDecomposition (computer science)Cluster (physics)Cluster analysisMathematics021103 operations researchApplied MathematicsManagement and operation of a WDSComputational MathematicsIdentification (information)Miller’s magic number sevenA priori and a posterioriPairwise comparisonData miningMiller's magic number sevenMATEMATICA APLICADAcomputerDecision-making
researchProduct

Advances in Practical Applications of Agents, Multi-Agent Systems, and Sustainability: The PAAMS Collection

2015

This volume presents the papers that have been accepted for the 2015 special sessions of the 13th International Conference on Practical Applications of Agents and Multi-Agent Systems, held at University of Salamanca, Spain, at 3rd-5th June, 2015: Agents Behaviours and Artificial Markets (ABAM); Agents and Mobile Devices (AM); Multi-Agent Systems and Ambient Intelligence (MASMAI); Web Mining and Recommender systems (WebMiRes); Learning, Agents and Formal Languages (LAFLang); Agent-based Modeling of Sustainable Behavior and Green Economies (AMSBGE); Emotional Software Agents (SSESA) and Intelligent Educational Systems (SSIES). The volume also includes the paper accepted for the Doctoral Conso…

0209 industrial biotechnologyAmbient intelligenceManagement scienceComputer scienceMulti-agent system02 engineering and technologyRecommender systemComputingMethodologies_ARTIFICIALINTELLIGENCEEngineering management020901 industrial engineering & automationWeb miningSoftware agentSustainability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMobile deviceDissemination
researchProduct

Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons

2016

The application of Ant Colony Optimization to the field of classification has mostly been limited to hybrid approaches which attempt at boosting the performance of existing classifiers (such as Decision Trees and Support Vector Machines (SVM)) — often through guided feature reductions or parameter optimizations.

0209 industrial biotechnologyBoosting (machine learning)business.industryComputer scienceAnt colony optimization algorithmsDecision treePattern recognition02 engineering and technologyAnt colonycomputer.software_genreSwarm intelligenceSupport vector machineComputingMethodologies_PATTERNRECOGNITION020901 industrial engineering & automationKernel method0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligenceData miningbusinesscomputer
researchProduct

Summarizing Large Scale 3D Mesh

2018

International audience; Recent progress in 3D sensor devices and in semantic mapping allows to build very rich HD 3D maps very useful for autonomous navigation and localization. However , these maps are particularly huge and require important memory capabilities as well computational resources. In this paper, we propose a new method for summarizing a 3D map (Mesh) as a set of compact spheres in order to facilitate its use by systems with limited resources (smartphones, robots, UAVs, ...). This vision-based summarizing process is applied in a fully automatic way using jointly photometric, geometric and semantic information of the studied environment. The main contribution of this research is…

0209 industrial biotechnologyComputer science020206 networking & telecommunications02 engineering and technologycomputer.software_genreVisualization[SPI.AUTO]Engineering Sciences [physics]/Automatic020901 industrial engineering & automation[SPI.AUTO] Engineering Sciences [physics]/AutomaticSemantic mapping0202 electrical engineering electronic engineering information engineeringEntropy (information theory)Polygon meshData miningcomputer
researchProduct

Autonomous ultrasonic inspection using Bayesian optimisation and robust outlier analysis

2020

The use of robotics is beginning to play a key role in automating the data collection process in Non Destructive Testing (NDT). Increasing the use of automation quickly leads to the gathering of large quantities of data, which makes it inefficient, perhaps even infeasible, for a human to parse the information contained in them. This paper presents a solution to this problem by making the process of NDT data acquisition an autonomous one as opposed to an automatic one. In order to achieve this, the robotic data acquisition task is treated as an optimisation problem, where one seeks to find locations with the highest indication of damage. The resulting algorithm combines damage detection tech…

0209 industrial biotechnologyComputer scienceTKAerospace Engineering02 engineering and technologycomputer.software_genre01 natural sciencesField (computer science)Settore ING-IND/14 - Progettazione Meccanica E Costruzione Di Macchine020901 industrial engineering & automationData acquisitionNon-destructive testing (NDT)0103 physical sciencesUltrasoundUncertainty quantificationOutlier analysis010301 acousticsCivil and Structural EngineeringData collectionbusiness.industryMechanical EngineeringProbabilistic logicBayesian optimisationAutomationComputer Science ApplicationsControl and Systems EngineeringSignal ProcessingOutlierStructural health monitoringData miningbusinesscomputerGaussian process (GP) regression
researchProduct

Predictive Model Markup Language (PMML) Representation of Bayesian Networks: An Application in Manufacturing

2018

International audience; Bayesian networks (BNs) represent a promising approach for the aggregation of multiple uncertainty sources in manufacturing networks and other engineering systems for the purposes of uncertainty quantification, risk analysis, and quality control. A standardized representation for BN models will aid in their communication and exchange across the web. This article presents an extension to the predictive model markup language (PMML) standard for the representation of a BN, which may consist of discrete variables, continuous variables, or their combination. The PMML standard is based on extensible markup language (XML) and used for the representation of analytical models…

0209 industrial biotechnologyDesignComputer sciencecomputer.internet_protocol02 engineering and technologycomputer.software_genreBayesian inferenceIndustrial and Manufacturing EngineeringArticle[SPI]Engineering Sciences [physics]020901 industrial engineering & automationPMML0202 electrical engineering electronic engineering information engineeringanalyticsUncertainty quantificationMonte-Carlouncertaintycomputer.programming_languageParsingBayesian networkInformationSystems_DATABASEMANAGEMENTstandardPython (programming language)XMLComputer Science ApplicationsmanufacturingComputingMethodologies_PATTERNRECOGNITIONBayesian networksControl and Systems EngineeringSurface-RoughnessData analysisPredictive Model Markup Language020201 artificial intelligence & image processingData miningcomputerXML
researchProduct

Detection of algorithmically generated malicious domain names using masked N-grams

2019

Abstract Malware detection is a challenge that has increased in complexity in the last few years. A widely adopted strategy is to detect malware by means of analyzing network traffic, capturing the communications with their command and control (C&C) servers. However, some malware families have shifted to a stealthier communication strategy, since anti-malware companies maintain blacklists of known malicious locations. Instead of using static IP addresses or domain names, they algorithmically generate domain names that may host their C&C servers. Hence, blacklist approaches become ineffective since the number of domain names to block is large and varies from time to time. In this paper, we i…

0209 industrial biotechnologyDomain generation algorithmComputer scienceGeneral Engineering02 engineering and technologycomputer.software_genreBlacklistComputer Science ApplicationsRandom forestDomain (software engineering)020901 industrial engineering & automationArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingData miningcomputerHost (network)Block (data storage)Expert Systems with Applications
researchProduct