Search results for "computer.software_genre"
showing 10 items of 3858 documents
An integrated approach for high spatial resolution mapping of water and carbon fluxes using multi-sensor satellite data
2012
In the last years, modeling of surface processes - such as water, energy and carbon budgets, as well as vegetation growth- seems to be focused on integrated approaches that combine aspects of hydrology, biology and meteorology into unified analyses. In this context, remotely sensed data often have a core role due to the cross-cutting impact of this novel source of spatially distributed information on all these research areas. However, several applications - such as drought monitoring, yield forecasting and crop management - require spatially detailed products at sub-field scales, which can be obtained only with support of adequately fine resolution remote sensing data (< 100 m). In particul…
A Simulation Analysis of the Microstructure of an Order Driven Financial Market with Multiple Securities and Portfolio Choices
2005
In this paper we propose an artificial market where multiple risky assets are exchanged. Agents are constrained by the availability of resources and trade to adjust their portfolio according to an exogenously given target portfolio. We model the trading mechanism as a continuous auction order-driven market. Agents are heterogeneous in terms of desired target portfolio allocations, but they are homogeneous in terms of trading strategies. We investigate the role played by the trading mechanism in affecting the dynamics of prices, trading volume and volatility. We show that the institutional setting of a double auction market is sufficient to generate a non-normal distribution of price changes…
Credit card incidents and control systems
2012
Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.
Comparison of relaxation techniques in virtual reality for breast cancer patients
2019
A number of studies demonstrated that virtual reality (VR) featuring pleasant scenarios and relaxing narratives is effective in promoting relaxation in users, both in healthy and pathological contexts. One important field for application of relaxing VR is breast cancer, because of therapy-related distress and changes in body imagine experienced by patients during the care process. However, comparisons between different relaxation techniques adapted to virtual reality are rare. In the present study, the same virtual environment has been integrated with audio narratives designed according to two different relaxation techniques (respiration control and body scan). As initial exploration, 16 br…
Case-Sensitivity of Classifiers for WSD: Complex Systems Disambiguate Tough Words Better
2007
We present a novel method for improving disambiguation accuracy by building an optimal ensemble (OE) of systems where we predict the best available system for target word using a priori case factors (e.g. amount of training per sense). We report promising results of a series of best-system prediction tests (best prediction accuracy is 0.92) and show that complex/simple systems disambiguate tough/easy words better. The method provides the following benefits: (1) higher disambiguation accuracy for virtually any base systems (current best OE yields close to 2% accuracy gain over Senseval-3 state of the art) and (2) economical way of building more effective ensembles of all types (e.g. optimal,…
OPETH: Open Source Solution for Real-Time Peri-Event Time Histogram Based on Open Ephys
2019
Single cell electrophysiology remains one of the most widely used approaches of systems neuroscience. Decisions made by the experimenter during electrophysiology recording largely determine recording quality, duration of the project and value of the collected data. Therefore, online feedback aiding these decisions can lower monetary and time investment, and substantially speed up projects as well as allow novel studies otherwise not possible due to prohibitively low throughput. Real-time feedback is especially important in studies that involve optogenetic cell type identification by enabling a systematic search for neurons of interest. However, such tools are scarce and limited to costly co…
Searching for repetitions in biological networks: methods, resources and tools
2013
We present here a compact overview of the data, models and methods proposed for the analysis of biological networks based on the search for significant repetitions. In particular, we concentrate on three problems widely studied in the literature: ‘network alignment’, ‘network querying’ and ‘network motif extraction’. We provide (i) details of the experimental techniques used to obtain the main types of interaction data, (ii) descriptions of the models and approaches introduced to solve such problems and (iii) pointers to both the available databases and software tools. The intent is to lay out a useful roadmap for identifying suitable strategies to analyse cellular data, possibly based on t…
Computational identification of chemical compounds with potential anti-Chagas activity using a classification tree
2021
Chagas disease is endemic to 21 Latin American countries and is a great public health problem in that region. Current chemotherapy remains unsatisfactory; consequently the need to search for new drugs persists. Here we present a new approach to identify novel compounds with potential anti-chagasic action. A large dataset of 584 compounds, obtained from the Drugs for Neglected Diseases initiative, was selected to develop the computational model. Dragon software was used to calculate the molecular descriptors and WEKA software to obtain the classification tree. The best model shows accuracy greater than 93.4% for the training set; the tree was also validated using a 10-fold cross-validation p…
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
Effectiveness of local feature selection in ensemble learning for prediction of antimicrobial resistance
2008
In the real world concepts are often not stable but change over time. A typical example of this in the biomedical context is antibiotic resistance, where pathogen sensitivity may change over time as pathogen strains develop resistance to antibiotics that were previously effective. This problem, known as concept drift (CD), complicates the task of learning a robust model. Different ensemble learning (EL) approaches (that instead of learning a single classifier try to learn and maintain a set of classifiers over time) have been shown to perform reasonably well in the presence of concept drift. In this paper we study how much local feature selection (FS) can improve ensemble performance for da…