Search results for "UML"
showing 10 items of 407 documents
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
A Method of Three-Dimensional Visualization of Molecular Processes of Apoptosis
2014
Apoptosis or programmed cell death plays an important role in many physiological states and diseases. Detection of apoptotic cells, tracing the development of apoptosis, drug development and regulation of apoptosis are an important parts of basic research in medicine. A large number of models have been developed that are based on the differential equations of the chemical kinetics, and can be expressed in a uniform notation using some XML-based languages, such as SBML and CellML. We describe the CellML and the simulation environment OpenCell herein. These tools can display models schematically and output results in the form of graphs showing time dependencies of component concentrations. Ho…
From the nearest neighbour rule to decision trees
1998
This paper proposes an algorithm to design a tree-like classifier whose result is equivalent to that achieved by the classical Nearest Neighbour rule. The procedure consists of a particular decomposition of a d-dimensional feature space into a set of convex regions with prototypes from just one class. Some experimental results over synthetic and real databases are provided in order to illustrate the applicability of the method.
Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario
2006
In order to resist an unauthorized use of the resources accessible through mobile terminals, masquerader detection means can be employed. In this paper, the problem of mobile-masquerader detection is approached as a classification problem, and the detection is performed by an ensemble of one-class classifiers. Each classifier compares a measure describing user behavior or environment with the profile accumulating the information about past behavior and environment. The accuracy of classification is empirically estimated by experimenting with a dataset describing the behavior and environment of two groups of mobile users, where the users within groups are affiliated with each other. It is as…
CultReal—A Rapid Development Platform for AR Cultural Spaces, with Fused Localization
2021
Virtual and augmented reality technologies have known an impressive market evolution due to their potential to provide immersive experiences. However, they still have significant difficulties to enable fully fledged, consumer-ready applications that can handle complex tasks such as multi-user collaboration or time-persistent experiences. In this context, CultReal is a rapid creation and deployment platform for augmented reality (AR), aiming to revitalize cultural spaces. The platform’s content management system stores a representation of the environment, together with a database of multimedia objects that can be associated with a location. The localization component fuses data from beacons …
Gabor filtering for feature extraction on complex images: application to defect detection on semiconductors
2006
AbstractThis paper is an extension of previous work on the image segmentation of electronic structures on patterned wafers to improve the defect detection process on optical inspection tools. Die-to-die wafer inspection is based upon the comparison of the same area on two neighbourhood dies. The dissimilarities between the images are a result of defects in this area of one of the dies. The noise level can vary from one structure to the other, within the same image. Therefore, segmentation is needed to create a mask and apply an optimal threshold in each region. Contrast variation on the texture can affect the response of the parameters used for the segmentation. This paper shows a method of…
Tracking Hands in Interaction with Objects: A Review
2017
Markerless vision-based 3D hand motion tracking is a key and popular component for interaction studies in many domains such as virtual reality and natural human-computer interfaces. While this research field has been well studied in the last decades, most approaches have considered the human hand in isolation and not in action or in interaction with the environment or the other articulated human body parts. Employing contextual information about the surrounding environment (e.g. the shape, the texture, and the posture of the object in the hand) can remarkably constrain the tracking problem. The goal of this survey is to develop an up-to-date taxonomy of existing vision-based hand tracking m…
Feature selection with Ant Colony Optimization and its applications for pattern recognition in space imagery
2016
This paper presents a feature selection (FS) algorithm using Ant Colony Optimization (ACO). It is inspired by the particular behavior of real ants, namely by the fact that they are capable of finding the shortest path between a food source and the nest. There are considered two ACO-FS model applications for pattern recognition in remote sensing imagery: ACO Band Selection (ACO-BS) and ACO Training Label Purification (ACO-TLP). The ACO-BS reduces dimensionality of an input multispectral image data by selecting the “best” subset of bands to accomplish the classification task. The ACO-TLP selects the most informative training samples from a given set of labeled vectors in order to optimize the…
Adding Domain Analysis to Software Development Method
2002
The researchers in the field of software development regard the reuse of components as one possible approach when creating quality software in less time and with fewer people. When components are used and created in the software development, one critical success factor is the use of domain analysis (DA). We report an action case study where the DA technique is first integrated into an existing software development method and then refined based on the experience of using it in a pilot project. The results indicate that our approach produces reusable components across a company-wide domain and eases the use of them in other development projects within domain.
Analysis of ventricular fibrillation signals using feature selection methods
2012
Feature selection methods in machine learning models are a powerful tool to knowledge extraction. In this work they are used to analyse the intrinsic modifications of cardiac response during ventricular fibrillation due to physical exercise. The data used are two sets of registers from isolated rabbit hearts: control (G1: without physical training), and trained (G2). Four parameters were extracted (dominant frequency, normalized energy, regularity index and number of occurrences). From them, 18 features were extracted. This work analyses the relevance of each feature to classify the records in G1 and G2 using Logistic Regression, Multilayer Perceptron and Extreme Learning Machine. Three fea…