Search results for "computer.software_genre"
showing 10 items of 3858 documents
Inferring Learning Strategies from Cultural Frequency Data
2015
Social learning has been identified as one of the fundamentals of culture and therefore the understanding of why and how individuals use social information presents one of the big questions in cultural evolution. To date much of the theoretical work on social learning has been done in isolation of data. Evolutionary models often provide important insight into which social learning strategies are expected to have evolved but cannot tell us which strategies human populations actually use. In this chapter we explore how much information about the underlying learning strategies can be extracted by analysing the temporal occurrence or usage patterns of different cultural variants in a population…
Development of Waste Collection Model Using Mobile Phone Data: A Case Study in Latvia
2020
In organizing household waste management and controlling waste collection and disposal, it is necessary to minimise risks to the environment and human health and, where possible, ensure that waste is recycled and returned to the economic cycle. Different models are being applied to increase waste collection management efficiency, but in recent years, the mobile phone data is widely used to solve various application problems. The research objective is to develop a waste collection model, which responds to the population’s current demands and allows planning waste container loading, based on mobile phone data statistics. The developed approach, techniques and data model can be used for waste …
Optimizing the Integration Area and Performance of VLIW Architectures by Hardware/Software Co-design
2021
The cost and the performance are major concerns that the designers of embedded processors shall take into account, especially for market considerations. In order to reduce the cost, embedded systems rely on simple hardware architectures like VLIW (Very Long Instruction Word) processors and they look for compiler support. This paper aims at developing a design space explorer of VLIW architectures from different perspectives like processing performance and integration area. A multi-objective Genetic Algorithm (GA) was used to find the optimum hardware configuration of an embedded system and the optimization rules applied by compiler on the benchmarks code. The first step consisted in represen…
Population and Query Interface for a Content-Based Video Database
2002
In this paper we describe the first full implementation of a content-based indexing and retrieval system for MPEG-2 and MPEG-4 videos. We consider a video as a collection of spatiotemporal segments called video objects; each video object is a sequence of video object planes. A set of representative video object planes is used to index each video object. During the database population, the operator, using a semi-automatic outlining tool we developed, manually selects video objects and insert some semantical information. Low-level visual features like color, texture, motion and geometry are automatically computed. The system has been implemented on a commercial relational DBMS and is based on…
Set Membership (In) Validation of nonlinear positive models for biological systems
2006
The complexity of biology needs quantitative tools in order to support and validate biologists intuition and traditional qualitative descriptions. In this paper, Nonlinear Positive models with constraints for biological systems are validated/invalidated in a worst-case deterministic setting. These models are usefull for the analysis of the DNA and RNA evolution and for the description of the population dynamics of viruses and bacteria. The conditional central estimate and the Uncertainty Intervals are determined in order to validate/invalidate the model. The effectiveness of the proposed procedure has been illustrated by means of simulation experiments.
Smartphone data analysis for human activity recognition
2017
In recent years, the percentage of the population owning a smartphone has increased significantly. These devices provide the user with more and more functions, so that anyone is encouraged to carry one during the day, implicitly producing that can be analysed to infer knowledge of the userâs context. In this work we present a novel framework for Human Activity Recognition (HAR) using smartphone data captured by means of embedded triaxial accelerometer and gyroscope sensors. Some statistics over the captured sensor data are computed to model each activity, then real-time classification is performed by means of an efficient supervised learning technique. The system we propose also adopts a …
Expert system for predicting unstable angina based on Bayesian networks
2013
The use of computer-based clinical decision support (CDS) tools is growing significantly in recent years. These tools help reduce waiting lists, minimise patient risks and, at the same time, optimise the cost health resources. In this paper, we present a CDS application that predicts the probability of having unstable angina based on clinical data. Due to the characteristics of the variables (mostly binary) a Bayesian network model was chosen to support the system. Bayesian-network model was constructed using a population of 1164 patients, and subsequently was validated with a population of 103 patients. The validation results, with a negative predictive value (NPV) of 91%, demonstrate its …
Application of a Bayesian Spatiotemporal Surveillance Method to NYC Syndromic Data
2014
Incorporating prior knowledge (e.g., the spatial distribution of zip codes and background population effects) into a model using Bayesian methods could potentially improve outbreak detection. We adapted a previously described Bayesian model-based spatiotemporal surveillance technique to daily respiratory syndrome counts in NYC Emergency Department data in 2009, the year of the H1N1 influenza pandemic. Citywide, 56 alarms were produced across 15 zip codes, all during days of elevated respiratory visits. Future work includes evaluating our choice of baseline length, considering other alarm thresholds, and conducting a formal evaluation of the method across five syndromes in NYC.
Anomaly Detection in Dynamic Social Systems Using Weak Estimators
2009
Anomaly detection involves identifying observationsthat deviate from the normal behavior of a system. One ofthe ways to achieve this is by identifying the phenomena thatcharacterize “normal” observations. Subsequently, based on thecharacteristics of data learned from the “normal” observations,new observations are classified as being either “normal” or not.Most state-of-the-art approaches, especially those which belongto the family parameterized statistical schemes, work under theassumption that the underlying distributions of the observationsare stationary. That is, they assume that the distributions thatare learned during the training (or learning) phase, thoughunknown, are not time-varyin…
An Initial Security Analysis of the Personal Transaction Protocol
2003
Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.