Search results for "computer.software_genre"

showing 10 items of 3858 documents

Automatic segmentation of the spine by means of a probabilistic atlas with a special focus on ribs suppression

2017

[EN] Purpose: The development of automatic and reliable algorithms for the detection and segmentation of the vertebrae are of great importance prior to any diagnostic task. However, an important problem found to accurately segment the vertebrae is the presence of the ribs in the thoracic region. To overcome this problem, a probabilistic atlas of the spine has been developed dealing with the proximity of other structures, with a special focus on ribs suppression. Methods: The data sets used consist of Computed Tomography images corresponding to 21 patients suffering from spinal metastases. Two methods have been combined to obtain the final result: firstly, an initial segmentation is performe…

Computer scienceVertebral segmentationComputed tomographyRibscomputer.software_genre030218 nuclear medicine & medical imagingTECNOLOGIA ELECTRONICA03 medical and health sciences0302 clinical medicineVoxelAtlas (anatomy)medicineHumansSegmentationProbabilistic atlasComputed tomographyProbabilityRib cagemedicine.diagnostic_testbusiness.industryPattern recognitionGeneral MedicineProbabilistic atlasSpineHausdorff distancemedicine.anatomical_structureRibs suppressionArtificial intelligencebusinessTomography X-Ray Computedcomputer030217 neurology & neurosurgeryAlgorithms
researchProduct

Grammars++ for modelling information in text

1999

Abstract Grammars provide a convenient means to describe the set of valid instances in a text database. Flexibility in choosing a grammar can be exploited to provide information modelling capability by designing productions in the grammar to represent entities and relationships of interest to database applications. Additional constraints can be specified by attaching predicates to selected nonterminals in the grammar. When used for database definition, grammars can provide the functionality that users have come to expect of database schemas. Extended grammars can also be used to specify database manipulation, including query, update, view definition, and index specification.

Computer scienceViewmedia_common.quotation_subjectComputerApplications_COMPUTERSINOTHERSYSTEMScomputer.software_genreQuery languageDatabase designAdaptive grammarRule-based machine translationmedia_commonGrammarProgramming languagebusiness.industryDatabase schemaPredicate (grammar)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESExtended Affix GrammarHardware and ArchitectureAffix grammarStochastic context-free grammarSynchronous context-free grammarArtificial intelligenceL-attributed grammarbusinesscomputerSoftwareNatural language processingInformation SystemsInformation Systems
researchProduct

A Comparison Study of Metaheuristic Techniques for Providing QoS to Avatars in DVE Systems

2004

Network-server architecture has become a de-facto standard for Distributed Virtual Environment (DVE) systems. In these systems, a large set of remote users share a 3D virtual scene. In order to design scalable DVE systems, different approaches have been proposed to maintain the DVE system working under its saturation point, maximizing system throughput. Also, in order to provide quality of service to avatars in a DVE systems, avatars should be assigned to servers taking into account, among other factors, system throughput and system latency. This highly complex problem is called quality of service (QoS) problem in DVE systems. This paper proposes two different approaches for solving the QoS…

Computer scienceVirtual machineQuality of serviceServerDistributed computingScalabilityComputingMilieux_PERSONALCOMPUTINGHeuristicscomputer.software_genrecomputerMetaheuristic
researchProduct

Predicting perceived visual complexity of abstract patterns using computational measures: The influence of mirror symmetry on complexity perception

2017

Visual complexity is relevant for many areas ranging from improving usability of technical displays or websites up to understanding aesthetic experiences. Therefore, many attempts have been made to relate objective properties of images to perceived complexity in artworks and other images. It has been argued that visual complexity is a multidimensional construct mainly consisting of two dimensions: A quantitative dimension that increases complexity through number of elements, and a structural dimension representing order negatively related to complexity. The objective of this work is to study human perception of visual complexity utilizing two large independent sets of abstract patterns. A w…

Computer scienceVisionSocial Scienceslcsh:MedicineSensory perceptioncomputer.software_genreSymmetry0302 clinical medicineMathematical and Statistical TechniquesAttitudes (psychology)Psychologylcsh:Sciencemedia_commonMultidisciplinaryApplied MathematicsSimulation and Modeling05 social sciencesPattern Recognition VisualEllipsesPhysical SciencesVisual PerceptionMirror symmetryStatistics (Mathematics)AlgorithmsResearch ArticleComputer and Information Sciencesmedia_common.quotation_subjectGeometryMachine learning algorithmsMachine learningEllipseResearch and Analysis Methods050105 experimental psychologyVisual complexity03 medical and health sciencesArtificial IntelligencePerceptionMachine learningHumans0501 psychology and cognitive sciencesStatistical Methodsbusiness.industrylcsh:RBiology and Life SciencesComputational BiologyUsabilitylcsh:QArtificial intelligencebusinesscomputer030217 neurology & neurosurgeryMathematicsNeuroscienceForecasting
researchProduct

Bayesian metanetworks for modelling user preferences in mobile environment

2003

The problem of profiling and filtering is important particularly for mobile information systems where wireless network traffic and mobile terminal’s size are limited comparing to the Internet access from the PC. Dealing with uncertainty in this area is crucial and many researchers apply various probabilistic models. The main challenge of this paper is the multilevel probabilistic model (the Bayesian Metanetwork), which is an extension of traditional Bayesian networks. The extra level(s) in the Metanetwork is used to select the appropriate substructure from the basic network level based on contextual features from user’s profile (e.g. user’s location). Two models of the Metanetwork are consi…

Computer scienceWireless networkbusiness.industryBayesian probabilityProbabilistic logicMobile computingBayesian networkFeature selectionStatistical modelcomputer.software_genreTelecommunications networkThe InternetData miningbusinesscomputer
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

Should I use touchscreen tablets rather than computers and mice in TDS trials?

2016

International audience; Internet technologies are increasingly used as tools in sensory analysis. Thus, it would be a natural step forward for sensory science to move beyond the laboratory, into people's homes. Therefore, working with consumer IT devices like touchscreen tablets in sensory science should be taken into consideration. Working with the intuitive concept of dominance, Temporal Dominance of Sensations (TDS) requires a non-analytical answer from the subject. Using a touchscreen tablet instead of a classic mouse could reduce the cognitive load and favor a more instinctive answer. Indeed, it was proven that touch interaction is natural and efficient, and that finger pointing is fas…

Computer science[ SDV.AEN ] Life Sciences [q-bio]/Food and NutritionPointing devicePerformance gapcomputer.software_genreSensory analysislaw.invention0404 agricultural biotechnologyTouchscreenlawconsumption10. No inequalityTouchscreen tabletsTDStimeNutrition and DieteticsMultimediafood04 agricultural and veterinary sciencesConsumer040401 food science[SDV.AEN] Life Sciences [q-bio]/Food and NutritionYounger adultsSensory sciencemeals[SDV.AEN]Life Sciences [q-bio]/Food and NutritioncomputerCognitive loadtemporal dominancesensationsFood ScienceFood Quality and Preference
researchProduct

From fractal urban pattern analysis to fractal urban planning concepts

2014

International audience; Fractal geometry can be used to develop a multiscale approach toinvestigate the spatial organization of urban fabrics. First, the concepts behindfractal reference models are introduced so as to provide a better understandingof the results obtained from empirical analyses of urban patterns. Then, differentmethods for conducting fractal analyses are presented and the results obtained forurban patterns are discussed. It turns out that, despite their irregular appearance,urban patterns are often organized by an inherent fractal order principle, at leastacross a certain range of scales. More detailed analysis of the findings reveals linksbetween these fractal properties a…

Computer science[SHS.GEO] Humanities and Social Sciences/Geography0211 other engineering and technologies0507 social and economic geographyPattern analysisContext (language use)02 engineering and technologycomputer.software_genreurban planningfractal planning[ SHS.GEO ] Humanities and Social Sciences/GeographyFractalUrban planning11. SustainabilityReference modelSpatial organizationComputingMilieux_MISCELLANEOUSUrban modelingsustainable development05 social sciences021107 urban & regional planningFractal Analysis[SHS.GEO]Humanities and Social Sciences/GeographyData mining050703 geographycomputerfractal analysis of urban patternsUrban modeling
researchProduct

Editorial: Mining Scientific Papers: NLP-enhanced Bibliometrics

2019

International audience

Computer science[SHS.INFO]Humanities and Social Sciences/Library and information sciencestext miningBibliometrics050905 science studiescomputer.software_genrescientific papersscientometrics[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]Bibliography. Library science. Information resourcescomputational linguistics[SHS.HISPHILSO]Humanities and Social Sciences/History Philosophy and Sociology of Sciencesnatural language processing[SHS.LANGUE]Humanities and Social Sciences/LinguisticsComputingMilieux_MISCELLANEOUScitation content analysisbusiness.industry05 social sciencesScientometrics[INFO.INFO-TT]Computer Science [cs]/Document and Text Processing[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Artificial intelligence0509 other social sciencesComputational linguistics050904 information & library sciencesbusinesscomputerNatural language processingZ
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct