Search results for "pattern"

showing 10 items of 4203 documents

New delay-dependent stability of Markovian jump neutral stochastic systems with general unknown transition rates

2015

This paper investigates the delay-dependent stability problem for neutral Markovian jump systems with generally unknown transition rates GUTRs. In this neutral GUTR model, each transition rate is completely unknown or only its estimate value is known. Based on the study of expectations of the stochastic cross-terms containing the integral, a new stability criterion is derived in terms of linear matrix inequalities. In the mathematical derivation process, bounding stochastic cross-terms, model transformation and free-weighting matrix are not employed for less conservatism. Finally, an example is provided to demonstrate the effectiveness of the proposed results.

0209 industrial biotechnologygeneral uncertain transition rateStability criterionModel transformationDelay-dependent stability02 engineering and technologyTransition rate matrixStability (probability)neutral-type stochastic systemTheoretical Computer ScienceDelay dependentMatrix (mathematics)Markovian jump020901 industrial engineering & automationControl theoryBounding overwatch0202 electrical engineering electronic engineering information engineeringApplied mathematicsMathematicscomputer.programming_languageDelay-dependent stability; neutral-type stochastic system;Markovian switching; general uncertain transition rate; mean-square exponentially stable; Control and Systems Engineering; Theoretical Computer Science; Computer Science Applications1707 Computer Vision and Pattern RecognitionMarkovian switchingComputer Science Applications1707 Computer Vision and Pattern RecognitionComputer Science ApplicationsControl and Systems Engineeringmean-square exponentially stable020201 artificial intelligence & image processingcomputerInternational Journal of Systems Science
researchProduct

Dissipativity-Based Small-Gain Theorems for Stochastic Network Systems

2016

In this paper, some small-gain theorems are proposed for stochastic network systems which describe large-scale systems with interconnections, uncertainties and random disturbances. By the aid of conditional dissipativity and showing times of stochastic interval, small-gain conditions proposed for the deterministic case are extended to the stochastic case. When some design parameters are tunable in practice, we invaginate a simpler method to verify small-gain condition by selecting one subsystem as a monitor. Compared with the existing results, the existence-and-uniqueness of solution and ultimate uniform boundedness of input are removed from requirements of input-to-state stability and smal…

0209 industrial biotechnologystochastic systemsComputer Science Applications1707 Computer Vision and Pattern Recognition02 engineering and technologyInterval (mathematics)Stability (probability)Electronic mailComputer Science Applicationsinput-to-state stabilityDissipativity; input-to-state stability; network systems; stochastic systems; Control and Systems Engineering; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringNonlinear system020901 industrial engineering & automationnetwork systemsControl and Systems EngineeringControl theoryControl system0202 electrical engineering electronic engineering information engineeringUniform boundedness020201 artificial intelligence & image processingStochastic optimizationElectrical and Electronic EngineeringDissipativityMathematicsIEEE Transactions on Automatic Control
researchProduct

An Artificial Bee Colony Approach for Classification of Remote Sensing Imagery

2018

This paper presents a novel Artificial Bee Colony (ABC) approach for supervised classification of remote sensing images. One proposes to apply an ABC algorithm to optimize the coefficients of the set of polynomial discriminant functions. We have experimented the proposed ABC-based classifier algorithm for a Landsat 7 ETM+ image database, evaluating the influence of the ABC model parameters on the classifier performances. Such ABC model parameters are: numbers of employed/onlooker/scout bees, number of epochs, and polynomial degree. One has compared the best ABC classifier Overall Accuracy (OA) with the performances obtained using a set of benchmark classifiers (NN, NP, RBF, and SVM). The re…

021103 operations researchArtificial neural networkComputer science0211 other engineering and technologies02 engineering and technologyArtificial bee colony algorithmSupport vector machineStatistical classificationAbc modelComputingMethodologies_PATTERNRECOGNITIONDiscriminant0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDegree of a polynomialClassifier (UML)Remote sensing2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
researchProduct

PolyACO+: a multi-level polygon-based ant colony optimisation classifier

2017

Ant Colony Optimisation for classification has mostly been limited to rule based approaches where artificial ants walk on datasets in order to extract rules from the trends in the data, and hybrid approaches which attempt to boost the performance of existing classifiers through guided feature reductions or parameter optimisations. A recent notable example that is distinct from the mainstream approaches is PolyACO, which is a proof of concept polygon-based classifier that resorts to ant colony optimisation as a technique to create multi-edged polygons as class separators. Despite possessing some promise, PolyACO has some significant limitations, most notably, the fact of supporting classific…

021103 operations researchArtificial neural networkComputer sciencebusiness.industryPolygonsTraining timeMulti-levelling0211 other engineering and technologiesPattern recognition02 engineering and technologyAnt colonySupport vector machineArtificial IntelligenceMultiple time dimensionsPolygonAnt colony optimisation0202 electrical engineering electronic engineering information engineeringArtificial Ants020201 artificial intelligence & image processingArtificial intelligenceClassificationsbusinessClassifier (UML)
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

ES1D: A Deep Network for EEG-Based Subject Identification

2017

Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…

021110 strategic defence & security studiesmedicine.diagnostic_testbusiness.industryComputer scienceDeep learningFeature extractionSIGNAL (programming language)0211 other engineering and technologiesSpectral densityPattern recognition02 engineering and technologyElectroencephalographyConvolutional neural networkConvolutionIdentification (information)0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processingArtificial intelligencebusiness2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)
researchProduct

Automatic Location of Sources of Electrical Activation from Electroanatomical Maps

2016

Electro-anatomical mapping is a widely used technique used by electrophysiologists to understand patient's activation pattern. The system measures activation time at different locations but does not provide information on underlying electrical pathways or triggering points, such as Purkinje-myocardial junctions or ectopic foci. We present a method to estimate the locations of Purkinje-myocardial junctions from a discrete set of endocardial samples. Using less than 1000 endocardial samples it can recover locations and activation times of the most influencing Purkinje myocardial junctions from Purkinje trees of up to 500 junctions. A simulation study revealed that using the estimated Purkinje…

03 medical and health sciences0302 clinical medicineTree structure0206 medical engineering02 engineering and technology030204 cardiovascular system & hematologyDiscrete setBiological system020601 biomedical engineeringActivation patternMathematics2016 Computing in Cardiology Conference (CinC)
researchProduct

Evaluación de la adaptación de los ítems de consumo del AUDIT para mejor el cribado de Binge Drinking en universitarios

2019

The strong presence of Binge Drinking (BD) amongst university students, as well as the consequences associated with the same and the changes taking place over recent years regarding its conceptualization make it necessary to examine the usefulness of screening instruments used to detect this drinking pattern. This study examines the usefulness of a briefer adaptation of the AUDIT proposed by Cortes, Gimenez, Motos, and Sancerni (2017a). College students self-administered the AUDIT, the revised items 2 and 3 (A2r and A3r), and completed a weekly self-report of their alcohol intake. BD was classified according to the amount consumed and the frequency of that consumption over the past six mont…

03 medical and health sciencesPsychiatry and Mental health030508 substance abuseMedicine (miscellaneous)Binge drinkingAlcohol intakeAudit0305 other medical scienceSelf reportPsychologyClinical psychologyDrinking patternAdicciones
researchProduct

Engineering of a DNA Polymerase for Direct m6A Sequencing

2017

Methods for the detection of RNA modifications are of fundamental importance for advancing epitranscriptomics. N6-methyladenosine (m6A) is the most abundant RNA modification in mammalian mRNA and is involved in the regulation of gene expression. Current detection techniques are laborious and rely on antibody-based enrichment of m6A-containing RNA prior to sequencing, since m6A modifications are generally "erased" during reverse transcription (RT). To overcome the drawbacks associated with indirect detection, we aimed to generate novel DNA polymerase variants for direct m6A sequencing. Therefore, we developed a screen to evolve an RT-active KlenTaq DNA polymerase variant that sets a mark for…

0301 basic medicineAdenosineRNA-dependent RNA polymeraseDNA-Directed DNA Polymerase010402 general chemistryProtein Engineering01 natural sciencesCatalysis03 medical and health sciencesDNA polymerasesSequencing by hybridization[SDV.BBM.GTP]Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYRNA polymerase IRNA MessengerPolymerasebiologyOligonucleotideN6-methyladenosineReverse Transcriptase Polymerase Chain ReactionCommunicationMultiple displacement amplificationHigh-Throughput Nucleotide Sequencing[SDV.BBM.BM]Life Sciences [q-bio]/Biochemistry Molecular Biology/Molecular biologyGeneral ChemistryDNA MethylationRNA modificationMolecular biologyReverse transcriptaseCommunications0104 chemical sciencesSequencing by ligationenzyme engineering030104 developmental biologyComputingMethodologies_PATTERNRECOGNITIONddc:540biology.proteinepitranscriptomicsRNA Methylation
researchProduct