Search results for "vector [form factor]"

showing 10 items of 770 documents

A relativistic approach to gravitational instability in the expanding Universe: second-order Lagrangian solutions

1994

A Lagrangian relativistic approach to the non--linear dynamics of cosmological perturbations of an irrotational collisionless fluid is considered. Solutions are given at second order in perturbation theory for the relevant fluid and geometric quantities and compared with the corresponding ones in the Newtonian approximation. Specifically, we compute the density, the volume expansion scalar, the shear, the ``electric" part, or tide, and the ``magnetic" part of the Weyl tensor. The evolution of the shear and the tide beyond the linear regime strongly depends on the ratio of the characteristic size of the perturbation to the cosmological horizon distance. For perturbations on sub--horizon scal…

Weyl tensorPhysicsGravitational waveAstrophysics (astro-ph)FOS: Physical sciencesPerturbation (astronomy)Astronomy and AstrophysicsAstrophysicsConservative vector fieldMetric expansion of spaceGeneral Relativity and Quantum Cosmologysymbols.namesakeClassical mechanicsSpace and Planetary ScienceHubble volumesymbolsNewtonian fluidPerturbation theory (quantum mechanics)Monthly Notices of the Royal Astronomical Society
researchProduct

An Extension of the VSM Documents Representation using Word Embedding

2017

Abstract In this paper, we will present experiments that try to integrate the power of Word Embedding representation in real problems for documents classification. Word Embedding is a new tendency used in the natural language processing domain that tries to represent each word from the document in a vector format. This representation embeds the semantically context in that the word occurs more frequently. We include this new representation in a classical VSM document representation and evaluate it using a learning algorithm based on the Support Vector Machine. This new added information makes the classification to be more difficult because it increases the learning time and the memory neede…

Word embeddingComputer sciencebusiness.industryRepresentation (systemics)Context (language use)Extension (predicate logic)computer.software_genreDomain (software engineering)Support vector machineVector graphicsArtificial intelligencebusinesscomputerWord (computer architecture)Natural language processingBalkan Region Conference on Engineering and Business Education
researchProduct

Writer identification for historical handwritten documents using a single feature extraction method

2020

International audience; With the growth of artificial intelligence techniques the problem of writer identification from historical documents has gained increased interest. It consists on knowing the identity of writers of these documents. This paper introduces our baseline system for writer identification, tested on a large dataset of latin historical manuscripts used in the ICDAR 2019 competition. The proposed system yielded the best results using Scale Invariant Feature Transform (SIFT) as a single feature extraction method, without any preprocessing stage. The system was compared against four teams who participated in the competition with different feature extraction methods: SRS-LBP, SI…

Writer identificationComputer sciencebusiness.industryFeature extractionhistorical documentsScale-invariant feature transform020207 software engineeringPattern recognition02 engineering and technologyartificial intelligenceConvolutional neural networkSupport vector machineIdentification (information)sift descriptors0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)Unsupervised learning020201 artificial intelligence & image processing[INFO]Computer Science [cs]Artificial intelligencebusiness
researchProduct

Fast Secure Routing for Highly Mobile Large-Scale Ad-Hoc Vehicular Networks

2009

In highly mobile large-scale vehicular ad-hoc networks, routing protocols must be fast and efficient in terms of low routing discovery delay and communication overhead to support the applications such as car talk. Such requirement becomes more difficult to achieve when inducing security enhancement to tackle the authentication of routing messages. In this paper, we propose a lightweight (fast) secure routing protocol, Secure Proactive Tree-based Routing (SPTR) to hit these two points. SPTR makes use of the characteristics of VANET networks, that is, the traffic originates from or terminates at the gateway or road side unit. SPRT also takes advantages of certificate-less ID-based cryptograph…

Zone Routing ProtocolDynamic Source RoutingStatic routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolPolicy-based routingWireless Routing ProtocolLink-state routing protocolDestination-Sequenced Distance Vector routingbusinessComputer network2009 Asia-Pacific Conference on Information Processing
researchProduct

Multipath extensions to the DYMO routing protocol

2007

Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.

Zone Routing ProtocolDynamic Source Routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer network2007 9th IFIP International Conference on Mobile Wireless Communications Networks
researchProduct

A classification approach to prostate cancer localization in 3T Multi-Parametric MRI

2016

International audience; Multiparametric-magnetic resonance imaging (mp-MRI) has demonstrated, in many studies, its potential in prostate cancer detection and analysis. We propose a supervised classification approach based on mp-MRI data base of 20 patients, in order to localize prostate cancer and to achieve a cartographic representation of the prostate voxels based on classification results. Proposed method provides a computer aided detection (CAD) software for prostatic cancer. For that, we have extracted varied features providing functional, anatomical and metabolic information helping the classifier to distinguish between three different classes ("Healthy", "Benign" and "Pathologic"). W…

[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[SPI] Engineering Sciences [physics][INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingComputer scienceSVMFeature extractionWord error ratecomputer.software_genre030218 nuclear medicine & medical imaging03 medical and health sciencesProstate cancer[SPI]Engineering Sciences [physics]0302 clinical medicine[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingProstateVoxelmedicine[ SPI ] Engineering Sciences [physics]Computer visionProstate cancermedicine.diagnostic_testbusiness.industryPattern recognitionMagnetic resonance imagingSpectramedicine.disease3. Good healthRandom forestSupport vector machinemedicine.anatomical_structuremp-MRIArtificial intelligencebusinesscomputer030217 neurology & neurosurgeryRandom forest
researchProduct

Building Anosov flows on $3$–manifolds

2014

We prove a result allowing to build (transitive or non-transitive) Anosov flows on 3-manifolds by gluing together filtrating neighborhoods of hyperbolic sets. We give several applications; for example: 1. we build a 3-manifold supporting both of a transitive Anosov vector field and a non-transitive Anosov vector field; 2. for any n, we build a 3-manifold M supporting at least n pairwise different Anosov vector fields; 3. we build transitive attractors with prescribed entrance foliation; in particular, we construct some incoherent transitive attractors; 4. we build a transitive Anosov vector field admitting infinitely many pairwise non-isotopic trans- verse tori.

[ MATH ] Mathematics [math]Pure mathematicsAnosov flowMathematics::Dynamical Systems3–manifolds[ MATH.MATH-DS ] Mathematics [math]/Dynamical Systems [math.DS][MATH.MATH-DS]Mathematics [math]/Dynamical Systems [math.DS]Dynamical Systems (math.DS)$3$–manifolds01 natural sciencesFoliationsSet (abstract data type)MSC: Primary: 37D20 Secondary: 57M9957M99Diffeomorphisms0103 physical sciencesAttractorFOS: Mathematics0101 mathematics[MATH]Mathematics [math]Mathematics - Dynamical SystemsManifoldsMathematics::Symplectic Geometry3-manifold37D20 57MMathematicsTransitive relation37D20010308 nuclear & particles physics010102 general mathematicsTorusMathematics::Geometric TopologyFlow (mathematics)Anosov flowsFoliation (geology)Vector fieldhyperbolic plugsGeometry and Topologyhyperbolic basic set3-manifold
researchProduct

The two-photon decay of X(6900) from light-by-light scattering at the LHC

2022

The LHCb Collaboration has recently discovered a structure around 6.9 GeV in the double-$J/\psi$ mass distribution, possibly a first fully-charmed tetraquark state $X(6900)$. Based on vector-meson dominance (VMD) such a state should have a significant branching ratio for decaying into two photons. We show that the recorded LHC data for the light-by-light scattering may indeed accommodate for such a state, with a $\gamma \gamma$ branching ratio of order of $10^{-4}$, which is larger even than the value inferred by the VMD. The spin-parity assignment $0^{-+}$ is in better agreement with the VMD prediction than $0^{++}$, albeit not significantly at the current precision. Further light-by-light…

[PHYS.NUCL] Physics [physics]/Nuclear Theory [nucl-th]interpretation of experiments: CERN LHC Coll[PHYS.HEXP] Physics [physics]/High Energy Physics - Experiment [hep-ex]Nuclear Theoryradiative decayphoton photon: scatteringinterpretation of experiments: LHC-BFOS: Physical sciencestetraquarkvector mesonHigh Energy Physics - Experimentmass spectrum[PHYS.HPHE] Physics [physics]/High Energy Physics - Phenomenology [hep-ph]Nuclear Theory (nucl-th)High Energy Physics - Experiment (hep-ex)High Energy Physics - PhenomenologyHigh Energy Physics - Phenomenology (hep-ph)branching ratiostructurephoton: pair productiontwo-photon
researchProduct

A novel pilot study of automatic identification of EMF radiation effect on brain using computer vision and machine learning

2020

Abstract Electromagnetic field (EMF) radiations from mobile phones and cell tower affect brain of humans and other organisms in many ways. Exposure to EMF could lead to neurological changes causing morphological or chemical changes in the brain and other internal organs. Cellular level analysis to measure and identify the effect of mobile radiations is an expensive and long process as it requires preparing the cell suspension for the analysis. This paper presents a novel pilot study to identify changes in brain morphology under EMF exposure considering drosophila melanogaster as a specimen. The brain is automatically segmented, obtaining microscopic images from which discriminatory geometri…

animal structuresComputer science0206 medical engineeringBiomedical EngineeringHealth InformaticsImage processingFeature selection02 engineering and technologyMachine learningcomputer.software_genre03 medical and health sciencesNaive Bayes classifier0302 clinical medicineComputer visionTime complexityArtificial neural networkbusiness.industryBrain morphometry020601 biomedical engineeringRandom forestSupport vector machineSignal ProcessingArtificial intelligencebusinesscomputer030217 neurology & neurosurgeryBiomedical Signal Processing and Control
researchProduct

Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods

2022

Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…

autoencodercyber physical systemsyväoppiminensupport vector machinefault tolerancetiedonlouhintakyberturvallisuusverkkohyökkäyksetsensor datacyber attacktietojärjestelmätInternational Conference on Cyber Warfare and Security
researchProduct