Search results for "computers"

showing 10 items of 3243 documents

Recursive and bargaining values

2021

Abstract We introduce two families of values for TU-games: the recursive and bargaining values. Bargaining values are obtained as the equilibrium payoffs of the symmetric non-cooperative bargaining game proposed by Hart and Mas-Colell (1996). We show that bargaining values have a recursive structure in their definition, and we call this property recursiveness. All efficient, linear, and symmetric values that satisfy recursiveness are called recursive values. We generalize the notions of potential, and balanced contributions property, to characterize the family of recursive values. Finally, we show that if a time discount factor is considered in the bargaining model, every bargaining value h…

Computer Science::Computer Science and Game TheoryDiscountingSociologia matemàticaProperty (philosophy)ComputingMilieux_THECOMPUTINGPROFESSIONSociology and Political ScienceGeneral Social SciencesComputingMethodologies_ARTIFICIALINTELLIGENCEEconomia socialComputer Science::Multiagent SystemsComputingMilieux_COMPUTERSANDSOCIETYMatemàtica financeraEconomia Mètodes estadísticsStatistics Probability and UncertaintyValue (mathematics)Mathematical economicsGeneral PsychologyMathematics
researchProduct

Automatic construction of test sets: Theoretical approach

2005

We consider the problem of automatic construction of complete test set (CTS) from program text. The completeness criterion adopted is C1, i.e., it is necessary to execute all feasible branches of program at least once on the tests of CTS. A simple programming language is introduced with the property that the values used in conditional statements are not arithmetically deformed. For this language the CTS problem is proved to be algorithmically solvable and CTS construction algorithm is obtained. Some generalizations of this language containing counters, stacks or arrays are considered where the CTS problem remains solvable. In conclusion the applications of the obtained results to CTS constr…

Computer Science::PerformanceComputer scienceProperty (programming)Simple (abstract algebra)Completeness (order theory)Test setComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureComputer Science::Programming LanguagesInternal variableArithmeticHardware_LOGICDESIGNTest (assessment)
researchProduct

Does Sedentary Behavior Predict Academic Performance in Adolescents or the Other Way Round? A Longitudinal Path Analysis.

2016

This study examined whether adolescents’ time spent on sedentary behaviors (academic, technological-based and social-based activities) was a better predictor of academic performance than the reverse. A cohort of 755 adolescents participated in a three-year period study. Structural Equation Modeling techniques were used to test plausible causal hypotheses. Four competing models were analyzed to determine which model best fitted the data. The Best Model was separately tested by gender. The Best Model showed that academic performance was a better predictor of sedentary behaviors than the other way round. It also indicated that students who obtained excellent academic results were more likely t…

Computer and Information SciencesSocial SciencesEquipmentlcsh:MedicineAdolescentsStructural equation modelingEducationDevelopmental psychologyFamilies03 medical and health sciences0302 clinical medicineSociology030225 pediatricsCovariateMedicine and Health SciencesPublic and Occupational Health030212 general & internal medicineYoung adultPath analysis (statistics)lcsh:ScienceChildrenSedentary lifestyleCommunication EquipmentBehaviorSchoolsMultidisciplinaryCovarianceComputerslcsh:RBiology and Life SciencesRandom VariablesSedentary behaviorProbability TheoryProsocial behaviorAge GroupsPeople and PlacesPhysical SciencesCohortEngineering and TechnologyPopulation Groupingslcsh:QCell PhonesBehavioral and Social Aspects of HealthPsychologyMathematicsResearch ArticlePLoS ONE
researchProduct

Restoration of Videos Degraded by Local Isoplanatism Effects in the Near-Infrared Domain

2008

When observing a scene horizontally at a long distance in the near-infrared domain, degradations due to atmospheric turbulence often occur. In our previous work, we presented two hybrid methods to restore videos degraded by such local perturbations. These restoration algorithms take advantages of a space-time Wiener filter and a space-time regularization by the Laplacian operator. Wiener and Laplacian regularization results are mixed differently depending on the distance between the current pixel and the nearest edge point. It was shown that a gradation between Wiener and Laplacian areas improves results quality, so that only the algorithm using a gradation will be used in this article. In …

Computer engineering. Computer hardwareComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRegularization (mathematics)Image (mathematics)Local degradationAdaptive restorationTK7885-7895symbols.namesakeSegmentationComputer visionPixelbusiness.industryWiener filterAtmospheric turbulenceImage and Video ProcessingVideo SurveillanceQA75.5-76.95Video processingElectronic computers. Computer sciencesymbolsGradationComputer Vision and Pattern RecognitionArtificial intelligenceAutomatic segmentationbusinessLaplace operatorSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Extension of luminance component based demosaicking algorithm to 4- and 5-band multispectral images

2021

Abstract Multispectral imaging systems are currently expanding with a variety of multispectral demosaicking algorithms. But these algorithms have limitations due to the remarkable presence of artifacts in the reconstructed image. In this paper, we propose a powerful multispectral image demosaicking method that focuses on the G band and luminance component. We've first identified a relevant 4-and 5-band multispectral filter array (MSFA) with the dominant G band and then proposed an algorithm that consistently estimates the missing G values and other missing components using a convolution operator and a weighted bilinear interpolation algorithm based on the luminance component. Using the cons…

Computer engineering. Computer hardwareDemosaicingDemosaicking algorithmComputer scienceMultispectral imageBilinear interpolationQA75.5-76.95General MedicineExtension (predicate logic)Filter (signal processing)Multispectral filter arrayLuminanceConvolutionTK7885-7895G bandElectronic computers. Computer scienceComponent (UML)Weighted bilinear interpolationLuminance componentAlgorithmArray
researchProduct

Non-Model Based Method for an Automation of 3D Acquisition and Post-Processing

2008

Most of the automation for 3D acquisition concerns objects with simple shape, like mechanical parts. For cultural heritage artefacts, the process is more complex, and it doesn't exist general solution nowadays. This paper presents a method to generate a complete 3D model of cultural heritage artefacts. In a first step, MVC is used to solve the view planning problem. Then, holes remaining in 3D model are detected, and their features are calculated to finish acquisition. Different post-processing are applied on each view to increase quality of the 3D model. This procedure has been tested with simulated scanner, before being implemented on a motion system with five degrees of freedom.

Computer engineering. Computer hardwareEngineering drawingScannerScanners automationComputer sciencemedia_common.quotation_subjectBéns del patrimoni culturalDegrees of freedom (mechanics)TK7885-7895Adquisició de 3DSimple (abstract algebra)view planningAutomatització de ScannersView planningQuality (business)scanners automationmedia_commonbusiness.industryAutomatización de ScannersProcess (computing)Adquisición de 3Dcultural heritage artefactsQA75.5-76.95Bienes del patrimonio culturalPlanificación de VistaAutomationCultural heritageElectronic computers. Computer scienceCultural heritage artefactsComputer Vision and Pattern RecognitionPlanificació de Vistabusiness3D acquisitionSoftwareMotion systemELCVIA Electronic Letters on Computer Vision and Image Analysis
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Detection of developmental dyslexia with machine learning using eye movement data

2021

Dyslexia is a common neurocognitive learning disorder that can seriously hinder individuals’ aspirations if not detected and treated early. Instead of costly diagnostic assessment made by experts, in the near future dyslexia might be identified with ease by automated analysis of eye movements during reading provided by embedded eye tracking technology. However, the diagnostic machine learning methods need to be optimized first. Previous studies with machine learning have been quite successful in identifying dyslexic readers, however, using contrasting groups with large performance differences between diagnosed and good readers. A practical challenge is to identify also individuals with bord…

Computer engineering. Computer hardwareSupport Vector MachineComputer sciencemedia_common.quotation_subject02 engineering and technologyMachine learningcomputer.software_genre050105 experimental psychologyDyslexiaTK7885-7895FluencysilmänliikkeetoppimisvaikeudetReading (process)dyslexia0202 electrical engineering electronic engineering information engineeringmedicinedysleksia0501 psychology and cognitive sciencessupport vector machinemedia_commonRandom ForestRecallbusiness.industry05 social sciencesDyslexiaEye movementGeneral MedicineQA75.5-76.95diagnostiikkamedicine.diseaseRandom forestkoneoppiminenElectronic computers. Computer scienceLearning disabilityEye tracking020201 artificial intelligence & image processingArtificial intelligencemedicine.symptombusinesscomputerrandom forestArray
researchProduct

Complex networks : application for texture characterization and classification

2008

This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.

Computer engineering. Computer hardwareTexture compressionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComplex networksImage processingTexture (geology)TK7885-7895Image textureImage processingAnàlisi de texturaProcesamiento de imágenestexture analysisClustering coefficientAnálisis de texturaRedes complejasPixelbusiness.industryNode (networking)Pattern recognitionProcessament d'imatgescomplex networksQA75.5-76.95Xarxes complexesComplex networkTexture analysisElectronic computers. Computer scienceComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Towards Efficient Control of Mobile Network-Enabled UAVs

2019

| openaire: EC/H2020/815191/EU//PriMO-5G The efficient control of mobile network-enabled unmanned aerial vehicles (UAVs) is targeted in this paper. In particular, a downlink scenario is considered, in which control messages are sent to UAVs via cellular base stations (BSs). Unlike terrestrial user equipment (UEs), UAVs perceive a large number of BSs, which can lead to increased interference causing poor or even unacceptable throughput. This paper proposes a framework for efficient control of UAVs. First, a communication model is introduced for flying UAVs taking into account interference, path loss and fast fading. The characteristics of UAVs make such model different compared to traditiona…

Computer science05 social sciencesReal-time computingComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunicationsThroughput02 engineering and technologyInterference (wave propagation)Base station0508 media and communicationsUser equipmentTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networkPath lossFading2019 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct