Search results for "Software"
showing 10 items of 7396 documents
An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering
2002
Abstract A generalized prototype-based classification scheme founded on hierarchical clustering is proposed. The basic idea is to obtain a condensed 1-NN classification rule by merging the two same-class nearest clusters, provided that the set of cluster representatives correctly classifies all the original points. Apart from the quality of the obtained sets and its flexibility which comes from the fact that different intercluster measures and criteria can be used, the proposed scheme includes a very efficient four-stage procedure which conveniently exploits geometric cluster properties to decide about each possible merge. Empirical results demonstrate the merits of the proposed algorithm t…
Viejos paisajes, nuevas tecnologías: una reconstrucción del paisaje Holoceno con gvSIG y sextante
2010
Con el objetivo de reconstruir el paisaje geomorfológico de finales del cuaternario y comienzos del Holoceno, se ha utilizado gvSIG y sextante para intentar establecer el paisaje a partir de los datos de campoarquelógicos y geomorfológicos recogidos durante una veintena de años en la cuenca media y alta del río Serpis. La evolución cuaternaria es la historia de un vaciado (erosión + denudación) de los valles del curso alto y medio del Serpis, con algunas interrupciones (fases de sedimentación). Testigos de dicha evolución son las terrazas fluviales adscritas por nosotros a diversos periodos del Cuaternario. La combinación de métodos tradicionales y el trabajo con el uso de herramientas SIG …
Social Media Data in an Augmented Reality System for Situation Awareness Support in Emergency Control Rooms
2021
AbstractDuring crisis situations, emergency operators require fast information access to achieve situation awareness and make the best possible decisions. Augmented reality could be used to visualize the wealth of user-generated content available on social media and enable context-adaptive functions for emergency operators. Although emergency operators agree that social media analytics will be important for their future work, it poses a challenge to filter and visualize large amounts of social media data. We conducted a goal-directed task analysis to identify the situation awareness requirements of emergency operators. By collecting tweets during two storms in Germany we evaluated the usefu…
3D objects descriptors methods: Overview and trends
2017
International audience; Object recognition or object's category recognition under varying conditions is one of the most astonishing capabilities of human visual system. The scientists in computer vision have been trying for decades to reproduce this ability by implementing algorithms and providing computers with appropriate tools. Hence, several intelligent systems have been proposed. To act in this field, numerous approaches have been proposed. In this paper we present an overview of the current trend in 3D objects recognition and describe some representative state of the art methods, highlighting their limits and complexity.
Dosimetry comparison between TG-43 and Monte Carlo calculations using the Freiburg flap for skin high-dose-rate brachytherapy
2012
Abstract Purpose The purpose of this work was to evaluate whether the delivered dose to the skin surface and at the prescription depth when using a Freiburg flap applicator is in agreement with the one predicted by the treatment planning system (TPS) using the TG-43 dose-calculation formalism. Methods and Materials Monte Carlo (MC) simulations and radiochromic film measurements have been performed to obtain dose distributions with the source located at the center of one of the spheres and between two spheres. Primary and scatter dose contributions were evaluated to understand the role played by the scatter component. A standard treatment plan was generated using MC- and TG-43-based TPS appl…
proTRAC - a software for probabilistic piRNA cluster detection, visualization and analysis
2012
Abstract Background Throughout the metazoan lineage, typically gonadal expressed Piwi proteins and their guiding piRNAs (~26-32nt in length) form a protective mechanism of RNA interference directed against the propagation of transposable elements (TEs). Most piRNAs are generated from genomic piRNA clusters. Annotation of experimentally obtained piRNAs from small RNA/cDNA-libraries and detection of genomic piRNA clusters are crucial for a thorough understanding of the still enigmatic piRNA pathway, especially in an evolutionary context. Currently, detection of piRNA clusters relies on bioinformatics rather than detection and sequencing of primary piRNA cluster transcripts and the stringency …
unitas: the universal tool for annotation of small RNAs
2017
AbstractBackgroundNext generation sequencing is a key technique in small RNA biology research that has led to the discovery of functionally different classes of small non-coding RNAs in the past years. However, reliable annotation of the extensive amounts of small non-coding RNA data produced by high-throughput sequencing is time-consuming and requires robust bioinformatics expertise. Moreover, existing tools have a number of shortcomings including a lack of sensitivity under certain conditions, limited number of supported species or detectable sub-classes of small RNAs.ResultsHere we introduce unitas, an out-of-the-box ready software for complete annotation of small RNA sequence datasets, …
Autonomous maritime ecosystem : digital concepts and business case : results from the JYU TJTSM54 course on advanced topics on systems development
2019
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
Smart Assistance for Students and People Living in a Campus
2019
Being part of one of the fastest growing area in Artificial Intelligence (AI), virtual assistants are nowadays part of everyone's life being integrated in almost every smart device. Alexa, Siri, Google Assistant, and Cortana are just few examples of the most famous ones. Beyond these off-the-shelf solutions, different technologies which allow to create custom assistants are available. IBM Watson, for instance, is one of the most widely-adopted question-answering framework both because of its simplicity and accessibility through public APIs. In this work, we present a virtual assistant that exploits the Watson technology to support students and staff of a smart campus at the University of Pa…