335 results on '"Static data"'
Search Results
2. Malware Detection System Based on Static-Dynamic Preprocessing Techniques Combined in an Ensemble Model
- Author
-
Kim, Hae-Soo, Kim, Mi-Hui, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Park, Ji Su, editor, Yang, Laurence T., editor, Pan, Yi, editor, and Park, James J., editor
- Published
- 2024
- Full Text
- View/download PDF
3. Static and Dynamic Monitoring of Giovanni Pisano’s Pulpit in Pistoia (Italy)
- Author
-
Marafini, Francesca, Betti, Michele, Bartoli, Gianni, Zini, Giacomo, Casarin, Filippo, Marchesini, Fabio, Barontini, Alberto, Mendes, Nuno, Endo, Yohei, editor, and Hanazato, Toshikazu, editor
- Published
- 2024
- Full Text
- View/download PDF
4. Reducing the Geological Uncertainty by History Matching
- Author
-
Yousefzadeh, Reza, Kazemi, Alireza, Ahmadi, Mohammad, Gholinezhad, Jebraeel, Gholinezhad, Jebraeel, Series Editor, Bentley, Mark, Editorial Board Member, Akanji, Lateef, Editorial Board Member, Sabil, Khalik Mohamad, Editorial Board Member, Agar, Susan, Editorial Board Member, Soga, Kenichi, Editorial Board Member, Sulaimon, A. A., Editorial Board Member, Yousefzadeh, Reza, Kazemi, Alireza, and Ahmadi, Mohammad
- Published
- 2023
- Full Text
- View/download PDF
5. 基于子空间的可解释性多变量异常检测.
- Author
-
宋润葵, 郑杨飞, 郭红钰, and 李倩
- Abstract
Copyright of Computer Measurement & Control is the property of Magazine Agency of Computer Measurement & Control and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
6. Introduction
- Author
-
Peón Quirós, Miguel, Catthoor, Francky, Mendías Cuadros, José Manuel, Peón Quirós, Miguel, Catthoor, Francky, and Mendías Cuadros, José Manuel
- Published
- 2020
- Full Text
- View/download PDF
7. Simulation model of vegetation dynamics by combining static and dynamic data using the gated recurrent unit neural network-based method
- Author
-
Pu Zhang, Zhipeng Li, Heyu Zhang, Jie Ding, Xufeng Zhang, Rui Peng, and Yiming Feng
- Subjects
Vegetation dynamic ,Gated recurrent unit neural network ,Static data ,Dynamic data ,Simulation model ,Physical geography ,GB3-5030 ,Environmental sciences ,GE1-350 - Abstract
The simulation of vegetation dynamics is essential for guiding regional ecological remediation and environmental management. Recent progress in deep learning methods has provided possible solutions to vegetation simulations. The gated recurrent unit (GRU) is one of the latest deep learning algorithms that can effectively process dynamic data. However, static and dynamic data, which typically coexist in the datasets of vegetation dynamic changes, are typically processed indistinguishably. To efficiently extract spatiotemporal patterns and improve our ability to simulate potential vegetation changes, we introduced GRU into vegetation simulation and further amended the original structure of GRU according to the characteristics of the simulation dataset. The new model, the vegetation dynamics model (VDM), can independently process static and dynamic data using a more appropriate algorithm, thereby improving the simulation accuracy. Moreover, we presented a model test applied in the Luntai Desert-Oasis Ecotone in Northwest China and compared the performance of the VDM with baseline models. The results showed that the VDM produced a 7.51% higher coefficient of determination (R2) value, 7.51% higher adjusted R2 value, 16.67% lower mean squared error, and 10.78% lower mean absolute error than those of the GRU, which is the best baseline model. The proposed VDM is the first GRU-based simulation model of vegetation dynamics that has the potential to detect the time-order characteristics of dynamic factors by comprehensively considering the static information that affects vegetation changes. Moreover, the flexibility of the VDM, in combination with the wide availability of data from different data sources, aids the broader application of the VDM.
- Published
- 2022
- Full Text
- View/download PDF
8. Bayesian damage identification of simply supported beams from elastostatic data.
- Author
-
Ardekani, Iman Tabatabaei, Kaipio, Jari, and Castello, Daniel
- Subjects
- *
INVERSE problems , *NUMERICAL analysis , *STANDARD deviations , *DYNAMICAL systems , *INFORMATION resources - Abstract
This paper considers a statistical method for damage identification of simply-supported elastic beams from static data. The problem is cast as an inverse problem and analyzed in Bayesian inversion framework. The main goal is to obtain a probabilistic model for the spatial distribution of the damage across a beam given limited and noisy data on the static beam response. A principal distinction of the proposed method is its ability to identify not only an estimate of the damage occurred to the beam but also the uncertainty (error) associated with such an estimate. Moreover, the proposed method uses simple static data instead of dynamic or spectral data, unlike the majority of research work published in the literature. This is a challenge as static data is a rather limited source of information about the underlying physical system compared to dynamic data. Finally, the proposed method does not involves any computationally expensive high-dimensional integration algorithms unlike the existing methods. According to the numerical analysis conducted in this paper, the result obtained by using the proposed damage identification method lies within one standard deviation interval. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. A new homotopy approach for stochastic static model updating with large uncertain measurement errors.
- Author
-
Wu, Zhifeng, Huang, Bin, Chen, Hui, and Zhang, Heng
- Subjects
- *
MEASUREMENT errors , *STOCHASTIC models , *DEAD loads (Mechanics) , *CONCRETE beams , *TIKHONOV regularization , *STRUCTURAL models - Abstract
• It proposes a new homotopy approach to conduct the stochastic static model updating with large measurement errors. • A stochastic model updating equation is solved by combining the homotopy analysis method with a regularization technique. • The proposed method has a higher accuracy than low-order perturbation methods in cases with large measurement errors. • It requires very less computational efforts than conventional Bayesian methods. Large measurement errors are a major challenge in structural model updating. Based on the concept of homotopy, a new stochastic static model updating method is proposed to update structural models using uncertain static data with large measurement errors. First, considering the uncertainty of the static measurement, a stochastic model updating equation for element update factors is set up. To solve the stochastic model updating equation, a series of homotopy deformation equations are presented to establish the relationship between the deterministic update factors and the random update factors. Furthermore, the homotopy series expansions of the random update factors can be determined by solving the homotopy deformation equations. Since the measured degrees of freedom of updated structures are usually limited or unavailable, a static condensation technique is used for stochastic model updating. To address the ill-posed problems caused by incomplete measurement information and static measurement errors, the Tikhonov regularization method is used in the process of solving the homotopy deformation equations. Three numerical examples are given to demonstrate the validity of the proposed stochastic model updating method. The numerical results clearly show that unlike the second-order perturbation method, this new method can produce better accuracy in cases with large measurement errors. Compared with the Bayesian method with the Delayed Rejection Adaptive Metropolis sampling technique and even a fast Bayesian method, the proposed method utilizes much less computational time and provides an equivalent accuracy. Finally, static loading experiments on a two-span continuous concrete beam are implemented to validate the proposed model updating method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. Analysis, Classification and Marker Discovery of Gene Expression Data with Evolving Spiking Neural Networks
- Author
-
Shahi, Gautam Kishore, Bilbao, Imanol, Capecci, Elisa, Nandini, Durgesh, Choukri, Maria, Kasabov, Nikola, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Cheng, Long, editor, Leung, Andrew Chi Sing, editor, and Ozawa, Seiichi, editor
- Published
- 2018
- Full Text
- View/download PDF
11. 基于聚类的离群点检测方法研究综述.
- Author
-
周玉, 朱文豪, 房倩, and 白磊
- Abstract
Copyright of Journal of Computer Engineering & Applications is the property of Beijing Journal of Computer Engineering & Applications Journal Co Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
12. Recovering dynamic networks in big static datasets.
- Author
-
Wu, Rongling and Jiang, Libo
- Subjects
- *
BIG data , *OMNIDIRECTIONAL antennas , *GAME theory - Abstract
The promise of big data is enormous and nowhere is it more critical than in its potential to contain important, undiscovered interdependence among thousands of variables. Networks have arisen as a powerful tool to detect how different variables are interconnected and how these interconnections mediate the internal workings and dynamics of various physical, chemical, biological, and social systems. Although a number of statistical methods have been developed for network reconstruction, the use of networks to excavate useful information from complex big data poses a conceptual, technical, and computational challenge. Here, we describe recent advances in statistical formalism that can recover mechanistically interpretable and practically applicable networks from wide big data domains. Traditional approaches can only infer an overall network from a number of samples, failing to reveal sample-specific differences. Identifying meaningful networks particularly requires the availability of high-density temporal or perturbed data and their dynamic fitting over time, both of which are hardly met in most big data sectors. The new formalism can particularly extract and tap dynamic information hidden in static data to reconstruct mobile networks without need of temporal data and, thereby, track how topological architecture changes from sample to sample and across time and space scales. We review the establishment principle of this new formalism derived from the seamless integration of ingredients of various disciplines, such as allometric scaling laws, evolutionary game theory, and developmental modularity theory. We show how this formalism can infer fully informative networks, encapsulated by bidirectional, signed, and weighted pairwise and high-order interactions, overcoming the intrinsic limitation of static data for network identification. We propose a general framework to augment a generalized argument for inferring omnidirectional, multilayer, and multispace networks from any high dimension of data and fill gaps in network reconstruction between standard techniques and the current state of the art. This formalism represents a paradigm shifting emerging technology that can make sophisticated networks a more efficient, effective and widespread tool to disentangle natural complexities in the era of big data. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. 移动型数据与静态型数据的混合聚类算法.
- Author
-
何云斌, 董恒, and 万静
- Subjects
PROBLEM solving ,ALGORITHMS - Abstract
Copyright of Journal of Harbin University of Science & Technology is the property of Journal of Harbin University of Science & Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
14. Simulation and analysis system of sea echo based on MATLAB
- Author
-
Yan Fengjun and Sun Xinzhe
- Subjects
internet ,graphical user interfaces ,marine radar ,data communication ,oceanographic techniques ,transport protocols ,offshore installations ,marine environment ,radar echo ,sea echo ,shore-based radar ,analyses system ,real-time data communication ,record playback ,multidimensional multimode display ,subsequent refined simulation ,static data ,dynamic data ,situation analysis ,multiframe data ,fault analysis ,algorithm optimisation ,matlab ,maritime navigation ,shore-based marine radar ,offshore vessel management ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Marine radar is mainly used for maritime navigation and avoidance of collision. Shore-based marine radar is used for offshore vessel management. In the marine environment, the radar echo is complex for the targets which are polytypic and undulant, and the clutter is strongly and violently affected by the environment. In order to simulate and analyse the sea echo from shore-based radar with real time and high precision, this study sets up a kind of MATLAB simulation and analyses system of real-time data communication and record playback based on transport control protocol/ Internet protocol and GUI. The system can realise the multi-dimensional multi-mode display and subsequent refined simulation of the echo based on static data or dynamic data, and the situation analysis of marine environment is provided through the learning training of multi-frame data. The system has been successfully applied in field experiments and has played an important role in fault analysis and algorithm optimisation, which has very high application value.
- Published
- 2019
- Full Text
- View/download PDF
15. 从 BIM 模型提取建筑能耗监测静态数据的方法.
- Author
-
马智亮, 滕明焜, and 任远
- Subjects
ENERGY consumption of buildings ,BUILDING information modeling ,BIG data ,COMPUTER software ,DATA analysis ,PASSIVHAUS - Abstract
Copyright of Journal of Harbin Institute of Technology. Social Sciences Edition / Haerbin Gongye Daxue Xuebao. Shehui Kexue Ban is the property of Harbin Institute of Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
16. Simulation and analysis system of sea echo based on MATLAB.
- Author
-
Fengjun, Yan and Xinzhe, Sun
- Subjects
RADAR -- Installation on ships ,CLUTTER (Radar) ,INTERNET protocols ,RADAR cross sections - Abstract
Marine radar is mainly used for maritime navigation and avoidance of collision. Shore-based marine radar is used for offshore vessel management. In the marine environment, the radar echo is complex for the targets which are polytypic and undulant, and the clutter is strongly and violently affected by the environment. In order to simulate and analyse the sea echo from shore-based radar with real time and high precision, this study sets up a kind of MATLAB simulation and analyses system of real-time data communication and record playback based on transport control protocol/ Internet protocol and GUI. The system can realise the multi-dimensional multi-mode display and subsequent refined simulation of the echo based on static data or dynamic data, and the situation analysis of marine environment is provided through the learning training of multi-frame data. The system has been successfully applied in field experiments and has played an important role in fault analysis and algorithm optimisation, which has very high application value. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
17. An ontology-mediated analytics-aware approach to support monitoring and diagnostics of static and streaming data.
- Author
-
Kharlamov, Evgeny, Kotidis, Yannis, Mailis, Theofilos, Neuenstadt, Christian, Nikolaou, Charalampos, Özçep, Özgür, Svingos, Christoforos, Zheleznyakov, Dmitriy, Ioannidis, Yannis, Lamparter, Steffen, Möller, Ralf, and Waaler, Arild
- Abstract
Streaming analytics that requires integration and aggregation of heterogeneous and distributed streaming and static data is a typical task in many industrial scenarios including the case of industrial IoT where several pieces of industrial equipment such as turbines in Siemens are integrated into an IoT. The OBDA approach has a great potential to facilitate such tasks; however, it has a number of limitations in dealing with analytics that restrict its use in important industrial applications. We argue that a way to overcome those limitations is to extend OBDA to become analytics, source, and cost aware. In this work we propose such an extension. In particular, we propose an ontology, mapping, and query language for OBDA, where aggregate and other analytical functions are first class citizens. Moreover, we develop query optimisation techniques that allow to efficiently process analytical tasks over static and streaming data. We implement our approach in a system and evaluate our system with Siemens turbine data. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. ЗАПЕРЕЧУВАНЕ ШИФРУВАННЯ НА ОСНОВІ ЗАСТОСУВАННЯ ПІДХОДУ ГІБРИДНИХ КРИПТОГРАФІЧНИХ СИСТЕМ
- Author
-
Гальченко, А. В. and Чопоров, С. В.
- Subjects
PUBLIC key cryptography ,TELECOMMUNICATION systems ,DATA encryption ,DATA security ,DATA protection ,ENCRYPTION protocols ,IMAGE encryption - Abstract
Copyright of Radio Electronics, Computer Science, Control is the property of Zaporizhzhia National Technical University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
19. Transfer Function to Predict Warhead Fragmentation In-Flight Behavior from Static Data
- Author
-
Elisabetta L. Jerome, Omkar S. Mulekar, Riccardo Bevilacqua, and Thomas J. Hatch-Aguilar
- Subjects
Computer simulation ,Warhead ,Computer science ,law ,Monte Carlo method ,Fragmentation (computing) ,Aerospace Engineering ,Probability density function ,Stereoscopy ,Static data ,Transfer function ,Simulation ,law.invention - Abstract
In recent years, static warhead arena tests have used stereoscopic cameras to count fragments in real time and correlate their individual velocity and mass. This new technique provides the ability ...
- Published
- 2021
- Full Text
- View/download PDF
20. Revisiting Network Telemetry in COIN: A Case for Runtime Programmability
- Author
-
Reza Rejaie, Walter Willinger, Chris Misa, and Ramakrishnan Durairajan
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Cloud computing ,Operation scheduling ,Scheduling (computing) ,Software ,Hardware and Architecture ,Telemetry ,Overhead (computing) ,Static data ,business ,Edge computing ,Information Systems - Abstract
Applications based on the compute-in-the-network (COIN) paradigm require flexible network telemetry data to drive effective allocation decisions. Telemetry systems collect such data based on queries specifying the precise traffic metrics or features required. Recent advances in programmable switch hardware have led to highly efficient methods to compute query results using in-network resources. However, current approaches fail to meet the simultaneous requirements of dynamic traffic loads, diverse query types, and query dynamics. In this work, we argue that telemetry systems should be cast as active runtime schedulers rather than static data sources. COIN-based applications can then dynamically submit telemetry queries on the fly and react to their results in a closed-loop fashion – enabling a new generation of telemetry-driven reactive applications. As a first step toward this vision, we present a single-switch telemetry operation scheduling method. Our empirical evaluation demonstrates that such a method can reduce overhead by an order of magnitude compared to worst case allocations. This initial exploration opens the door to a multi-tier scheduling framework combining switch hardware with software-based compute platforms to meet the telemetry demands of future COIN-based applications.
- Published
- 2021
- Full Text
- View/download PDF
21. The Interplay of AI and Biometrics: Challenges and Opportunities
- Author
-
Arndt von Twickel, Matthias Neu, and Christian Berghoff
- Subjects
Authentication ,Modalities ,General Computer Science ,Biometrics ,Computer science ,Process (engineering) ,Data_MISCELLANEOUS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Fingerprint recognition ,Facial recognition system ,Identification (information) ,ComputingMethodologies_PATTERNRECOGNITION ,Human–computer interaction ,Static data - Abstract
Current biometric applications exhibit numerous connections to artificial intelligence (AI). They use AI to boost their performance, can fall prey to attacks targeting AI components or based on AI, and can use AI toward off attacks. Biometric applications serve to identify individuals based on their biological characteristics or behaviors. Currently, fingerprints and faces are the predominantly used biometric modalities, but systems based on hand veins, irises, or voices are also available. Biometric applications can use single modalities or combine multiple ones, and they can process static data (for example, for facial recognition) as well as (for example, for video identification or speaker verification). Data can be acquired using single or multiple sensors of different types (for ex-ample, optical or acoustic).
- Published
- 2021
- Full Text
- View/download PDF
22. Chrontext: Portable SPARQL queries over contextualised time series data in industrial settings.
- Author
-
Bakken, Magnus and Soylu, Ahmet
- Subjects
- *
TIME series analysis , *KNOWLEDGE graphs , *DATABASES , *INFORMATION modeling , *MACHINE learning - Abstract
Industrial information models are standardised ways of representing industrial devices, equipment, and processes together with the data collected from associated sensors and control systems. Companies invest in such models to enable digitalisation and modular, reusable solutions. They also invest heavily in analytics (e.g. machine learning) based on time series data sets to improve operations. Queries that use such context to retrieve time series data can make industrial data sets more accessible to practitioners performing analytics and application development. Moreover, they can enable scalable deployment of resulting analytical models. Industrial availability constraints require that queries over context and time series should be portable in general, as they should be able retrieve data for training in a cloud setting and production data for deployment in an on-premise setting. Solving this problem is challenging with existing approaches as context and time series data tend to exist in separate, specialised databases. We address the issue by proposing a hybrid query engine, namely Chrontext, in the setting of a SPARQL database hosting the static model, and an arbitrary time series database. We show how with a set of annotations in the knowledge graph, SPARQL queries can be evaluated over such a hybrid architecture. We provide a proof showing that our approach correctly answers SPARQL 1.1. queries. We implement our approach in Rust under the Apache 2.0 license, and use the Apache Arrow-based Polars library together with configurable pushdowns to achieve high performance. We compare the performance of Chrontext against Ontop, one of the most prominent virtual knowledge graph systems, on a synthetic data set based on industrial standards. Data are stored in a S3 data lake and PostgreSQL with the Dremio data lakehouse as the SQL integrator. We find that our approach performs 10× to 85× faster and consumes much less memory than Ontop. • Novel approach to SPARQL for querying contextualised time series data. • Proof of correctness for approach. • Open source implementation using state of the art technologies. • Large performance increase over incumbent open source solution Ontop. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Guided Stable Dynamic Projections
- Author
-
Eduardo Faccin Vernier, João Luiz Dihl Comba, Alexandru Telea, and Scientific Visualization and Computer Graphics
- Subjects
Similarity (geometry) ,Computer science ,Benchmark (computing) ,Data dynamics ,Data mining ,Static data ,computer.software_genre ,ENCODE ,Projection (set theory) ,Representation (mathematics) ,Computer Graphics and Computer-Aided Design ,Stability (probability) ,computer - Abstract
Projections aim to convey the relationships and similarity of high-dimensional data in a low-dimensional representation. Most such techniques are designed for static data. When used for time-dependent data, they usually fail to create a stable and suitable low dimensional representation. We propose two dynamic projection methods (PCD-tSNE and LD-tSNE) that use global guides to steer projection points. This avoids unstable movement that does not encode data dynamics while keeping t-SNE's neighborhood preservation ability. PCD-tSNE scores a good balance between stability, neighborhood preservation, and distance preservation, while LD-tSNE allows creating stable and customizable projections. We compare our methods to 11 other techniques using quality metrics and datasets provided by a recent benchmark for dynamic projections.
- Published
- 2021
24. Prediction of COVID-19 Infections for Municipalities in the Netherlands: Algorithm Development and Interpretation
- Author
-
van der Ploeg, Tjeerd, Gobbens, Robbert J J, van der Ploeg, Tjeerd, and Gobbens, Robbert J J
- Published
- 2022
25. Semantic access to streaming and static data at Siemens.
- Author
-
Kharlamov, Evgeny, Mailis, Theofilos, Mehdi, Gulnar, Neuenstadt, Christian, Özçep, Özgür, Roshchin, Mikhail, Solomakhina, Nina, Soylu, Ahmet, Svingos, Christoforos, Brandt, Sebastian, Giese, Martin, Ioannidis, Yannis, Lamparter, Steffen, Möller, Ralf, Kotidis, Yannis, and Waaler, Arild
- Abstract
We present a description and analysis of the data access challenge in Siemens Energy. We advocate Ontology Based Data Access (OBDA) as a suitable Semantic Web driven technology to address the challenge. We derive requirements for applying OBDA in Siemens, review existing OBDA systems and discuss their limitations with respect to the Siemens requirements. We then introduce the Optique platform as a suitable OBDA solution for Siemens. The platform is based on a number of novel techniques and components including a deployment module, BootOX for ontology and mapping bootstrapping, a query language STARQL that allows for a uniform querying of both streaming and static data, a highly optimised backend, ExaStream, for processing such data, and a query formulation interface, OptiqueVQS, that allows to formulate STARQL queries without prior knowledge of its formal syntax. Finally, we describe our installation and evaluation of the platform in Siemens. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
26. Experimental static data based damage localization of beam-like structures considering axial load
- Author
-
M.S. Hashemi, O. Yazdanpanah, and Ramezan Ali Izadifard
- Subjects
Work (thermodynamics) ,Damage detection ,Materials science ,business.industry ,Applied Mathematics ,General Engineering ,Experimental data ,010103 numerical & computational mathematics ,Structural engineering ,01 natural sciences ,Computer Science Applications ,010101 applied mathematics ,Axial load ,0101 mathematics ,Static data ,business ,Beam (structure) - Abstract
In this research work, a crack diagnosis method for beam-column structures is proposed considering axial load effects through experimental data. The proposed method is employed for the detection of...
- Published
- 2021
- Full Text
- View/download PDF
27. Sujeto, subjetivación y ontología de nosotros mismos
- Author
-
Edgar Delgado Rubio and Milton Fernando Dionicio Lozano
- Subjects
Philosophy ,Theory of Forms ,Subject (philosophy) ,Static data ,Humanities - Abstract
espanolEl objetivo de este trabajo es dar cuenta de los conceptos de sujeto, subjetivacion y ontologia historica de nosotros mismos. Estas categorias son esenciales en las pesquisas de Foucault de los anos 80-84. De igual manera, desde estos conceptos, Foucault pudo pensar al sujeto de forma alterna al modo como este fue configurado en Occidente. En efecto, en sus intensas busquedas encuentra en la tradicion moderna, Baudelaire y Kant, pistas para considerar al sujeto no como un dato estatico, sino como alguien que se gestiona a traves de procesos historicos que lo van delineando y que lo habilitan en la empresa de construirse, de elaborarse a si mismo, esto es, mediante procesos de subjetivacion. Finalmente, la tradicion antigua, es decir, la tradicion greco-latina, le ofrece elementos teoricos sustanciales para reflexionar sobre las condiciones en las que se pueden configurar modos de vida, estilos de existencia que operen como ejes de resistencia a las formas que se nos han impuesto. EnglishThe purpose of this paper is to analyse the concepts of subject, subjectivation and historical ontology of ourselves. These categories are essential in Foucault’s research of the 80-84 years. In the same way, from these concepts Foucault interprets the subject in an alternating way to the way it was configured in the West. Indeed, in his intense researches he finds in the modern tradition, Baudelaire and Kant, clues to consider the subject not as a static data, but as someone who is managed through historical processes that delineate it and that enable it to be built, to be selfelaborated, that is, through processes of subjectivation. Finally, the ancient tradition, that is to say, the Greco-Latin tradition, offers substantial theoretical elements to reflect on the conditions under which lifestyles can be configured, styles of existence that operate as axes of resistance to the forms that have been given to us.
- Published
- 2021
- Full Text
- View/download PDF
28. A Sliding Window-Based Approach for Mining Frequent Weighted Patterns Over Data Streams
- Author
-
Huong Bui, Tu-Anh Nguyen-Hoang, Bay Vo, Ham Nguyen, and Tuong Le
- Subjects
Data stream ,General Computer Science ,Data stream mining ,Computer science ,Node (networking) ,frequent weighted patterns ,General Engineering ,data streams ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,sliding window model ,TK1-9971 ,Data modeling ,Tree (data structure) ,Pattern mining ,Sliding window protocol ,0202 electrical engineering, electronic engineering, information engineering ,Batch processing ,020201 artificial intelligence & image processing ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Data mining ,Static data ,computer - Abstract
The mining of frequent weighted patterns (FWPs) that considers the different semantic significance (weight) of items is more suitable for practice than the mining of frequent patterns. Therefore, it plays a vital role in real-world scenarios. However, there exist several limitations when applying methods for mining FWPs designed for static data on growth datasets, especially data streams. Hence, this study proposes an algorithm for mining FWPs over data streams. First, we introduce the concept of mining FWPs over data streams via a sliding window model. Then, we introduce a modification of the weighted node tree (WN-tree) named SWN-tree that has the ability to maintain the information over data streams. Next, this study develops a method for mining FWPs over data streams employing a sliding window model based on SWN-tree. This method is called FWPODS (Frequent Weighted Patterns Over Data Stream) algorithm. Finally, we conduct empirical experiments to compare the performances of our approach and the state-of-the-art algorithm (NFWI) for mining FWPs over data streams. The results of experiment indicate that our approach outperforms the NFWI algorithm when running in batch mode in a sliding window.
- Published
- 2021
- Full Text
- View/download PDF
29. A Project Designed by Cloud Storage Encryption Based on Separated Key
- Author
-
Zhizhong Wang, Cheng Zhou, and Yufei Mou
- Subjects
cloud storage ,separated key ,static data ,data security ,master key ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The problems existing in the original cloud storage model has plagued the industry for many years, to realize the true sense of the data privatization in the static data encrypted storage process is able to ensure data security and protect data owners' interests. Cloud storage applications for the current secure storage of user data is able to improve data security. Taking Amazon S3 as an example, the general problem in static data security was analyzed. A new set of cloud static data encryption and storage solution, separated key S3, was designed, and a new key management method was also designed. The new technology absolutely accomplished the security of static data in the cloud. Additionally the data security analysis and prospect on next research was given.
- Published
- 2013
- Full Text
- View/download PDF
30. Features of clinical course, morphological diagnosis and prognosis factors for neuroendocrine neoplasms of rare localizations
- Author
-
D. V. Abbasova, I. P. Kovalenko, V. V. Selivanova, S. B. Polikarpova, N. A. Kozlov, Ye. V. Artamonova, and V. Yu. Kirsanov
- Subjects
medicine.medical_specialty ,medicine.anatomical_structure ,business.industry ,Internal medicine ,Observation period ,Mammary gland ,Medicine ,Retrospective cohort study ,Prostate gland ,Static data ,business ,Gastroenterology - Abstract
Currently, neuroendocrine neoplasms (NENs) of the gastroenteropancreat-ic and bronchopulmonary systems are well studied and the most common, the share of which is 73 and 25 % of cases, respectively. The remaining 2 % of cases are attributed to NEN of more rare localizations, the static registration of which is difficult due to their rarity, and clinical cases are presented by episodic descriptions of single observations. Such tumors include NEN of the prostate gland from 0.5 to 1.0 %, NEN of ovaries 0.5 %, NEN of the mammary gland from 0.3 to 0.5 %, NEN of the kidney (practically devoid of static data), bladder 0.48-1.00 %. The retrospective study included 92 patients with NEN of rare localizations who were examined and treated of the N. N. Blochin National Medical Research Center of Oncology from 1990 to 2019. Currently, there are no generally accepted methods of treatment for this group of patients due to the rarity of the pathology, and it is carried out according to the NEN of other localizations. NEN of rare localizations have high survival rates (the observation period was from a month to 14 years), both general and without progression and require long-term monitoring and observation. At the time of assessment of long-term results, 20 (21.8 %) patients died of progression, 12 (13.1 %) patients dropped out of observation. The rest were alive at the date of the last control.
- Published
- 2020
- Full Text
- View/download PDF
31. EXPANSÃO E FINANCIAMENTO DA PÓS-GRADUAÇÃO E DESIGUALDADE REGIONAL NO BRASIL (2002-2018)
- Author
-
José Almir Brito dos Santos, Cristiane de Sousa Brito, and André Rodrigues Guimarães
- Subjects
High concentration ,Inequality ,media_common.quotation_subject ,Political science ,Georeference ,Regional science ,Information system ,Context (language use) ,Static data ,Public funding ,media_common - Abstract
O presente estudo tem como objetivo analisar a expansão e o financiamento da Pós-Graduação Stricto Sensu, no período 2002-2018, considerando o contexto de desigualdade regional brasileira. A pesquisa, com abordagem quali-quantitativa, tem como base empírica os dados estatísticos do Sistema de Informações Georreferenciadas da CAPES (GEOCAPES) e da Execução Orçamentária da União. Os resultados apontam expressivo movimento de expansão da Pós-Graduação no país, com índices mais acentuados nas regiões Norte e Nordeste, mas também revelam ainda haver elevada concentração no eixo sul-sudeste. Em relação ao financiamento, destaca-se a elevada redução orçamentária da CAPES, a partir de 2014, com fortes implicações na manutenção dos Programas, particularmente no que diz respeito aos auxílios financeiros a pesquisadores e estudantes. Em síntese, conclui-se que sem o necessário financiamento público serão aprofundadas as disparidades regionais na Pós-Graduação brasileira.
- Published
- 2020
- Full Text
- View/download PDF
32. Developing Road Hazard Estimation Algorithms Based on Dynamic and Static Data
- Author
-
choongheon Yang and Jinguk Kim
- Subjects
Commercial vehicle ,Computer science ,Real-time computing ,Static data ,Hazard estimation - Published
- 2020
- Full Text
- View/download PDF
33. DEAL – ‘Deep Ensemble ALgorithm’ Framework for Credit Card Fraud Detection in Real-Time Data Stream with Google TensorFlow
- Author
-
Monika Arya and Hanumat Sastry G
- Subjects
Fluid Flow and Transfer Processes ,Computer Networks and Communications ,Computer science ,business.industry ,020209 energy ,Deep learning ,020208 electrical & electronic engineering ,Credit card fraud ,General Engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,Ensemble learning ,Computational Mathematics ,Chemistry (miscellaneous) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Real-time data ,Artificial intelligence ,Static data ,business ,computer ,Energy (miscellaneous) - Abstract
The state-of-the-art Credit Card Fraud Detection (CCFD) systems utilize supervised rule-based schemes to identify fraudulent behaviors in static data. Designing an efficient framework for CCFD is p...
- Published
- 2020
- Full Text
- View/download PDF
34. Making HTTP Requests
- Author
-
Adam Freeman
- Subjects
World Wide Web ,Ajax ,Asynchronous communication ,Computer science ,Table (database) ,Context (language use) ,Web service ,Static data ,computer.software_genre ,computer ,computer.programming_language - Abstract
All the examples since Chapter 11 have relied on static data that has been hardwired into the application. In this chapter, I demonstrate how to use asynchronous HTTP requests, often called Ajax requests, to interact with a web service to get real data into an application. Table 24-1 puts HTTP requests in context.
- Published
- 2022
- Full Text
- View/download PDF
35. Research on Epidemic Prevention and Management Measures in University Based on GIS and ABM – Taking South China University of Technology (Wushan Campus) as an Example
- Author
-
Mingxi Chen
- Subjects
education.field_of_study ,South china ,Geography ,Coupling effect ,Population ,Gis model ,Static data ,Zoning ,education ,Environmental planning - Abstract
Prevention and management of epidemic is a protracted war. As large community in city, universities are key regions in the anti-epidemic period. However, the current epidemic prevention and management measures in many universities do not compatible with the spatial form and the characteristics of the population, likely to lead to waste of resources and cause conflicts. The research simulates campus environment by constructing GIS model, and simulates the behavior of campus crowd by ABM. Under the coupling effect of the two, the real-time calculation of the spread of epidemic in universities can be calculated in real-time, making up for the deficiency of GIS model which can only do static data analysis. On this basis, research takes South China University of Technology as an example and assumes three epidemic prevention management measures, i.e. closed-off management, zoning management and self prevention, respectively to simulate the spread of the epidemic, sum up the results of different management measures and provide certain suggestions.
- Published
- 2021
- Full Text
- View/download PDF
36. Informed decision-making by integrating historical on-road driving performance data in high-resolution maps for connected and automated vehicles
- Author
-
Jun Liu and Asad J. Khattak
- Subjects
Control and Systems Engineering ,Computer science ,Order (business) ,Applied Mathematics ,Automotive Engineering ,Real-time computing ,Aerospace Engineering ,High resolution ,Static data ,Software ,Computer Science Applications ,Information Systems - Abstract
Connected and automated vehicles (CAVs) are already part of the surface transportation system. In order for a CAV to operate safely, it needs information such as static data (high-resolution naviga...
- Published
- 2019
- Full Text
- View/download PDF
37. Race as a central element of Brazil's death policy : visiting the teachings of Roberto Esposito and Achille Mbembe
- Author
-
Danielle Ferreira Medeiro da Silva de Araújo and Walkyria Chagas da Silva Santos
- Subjects
Necropolítica ,Philosophy ,05 social sciences ,Juventude negra ,General Medicine ,Biopolítica ,0506 political science ,Necropolitics ,Black youth ,0502 economics and business ,050602 political science & public administration ,Biopolitics ,Static data ,Humanities ,050203 business & management - Abstract
DOI: 10.1590/2179-8966/2019/45695 Resumo O presente artigo visa apresentar discussoes sobre a politica de morte da juventude negra no Brasil, tendo como principal chave de leitura a raca, e fundamentada nas teses de dois filosofos, o italiano Roberto Esposito (biopolitica) e o camarones Achille Mbembe (necropolitica). Para desenvolvimento das ideias sera utilizado o metodo de revisao de literatura entrelacado com dados estaticos apresentados no Mapa da Violencia 2018 e Atlas da Violencia 2019 sobre a morte da juventude negra brasileira. Palavras-chave: Juventude negra; Biopolitica; Necropolitica. Abstract This article aims to present discussions about the politics of death of black youth in Brazil, having as main reading key the race, and based on the theses of two philosophers, the Italian Roberto Esposito (biopolitics) and the Cameroonian Achille Mbembe (necropolitics). To develop the ideas will be used the literature review method interlaced with static data presented in the Map of Violence 2018 and Atlas of Violence 2019 on the death of Brazilian black youth. Keywords: Black youth; Biopolitics; Necropolitics.
- Published
- 2019
- Full Text
- View/download PDF
38. Working Capital Management and Performance of Industrial and Consumer Goods Firms in Nigeria: A Comparative Analysis
- Author
-
Clement Olatunji, Roseline, Olaoye, and Adeboboye
- Subjects
Labour economics ,media_common.quotation_subject ,Working capital ,Significant difference ,Collection period ,Business ,Static data ,Return on capital employed ,Payment ,Mean difference ,media_common - Abstract
This study conducted a comparative analysis on working capital management and performance ofindustrial and consumer goods firms in Nigeria. Precisely, the study compared effect of average collectionperiod and average payment period on return on capital employed of selected industrial goods and consumergoods firms. 20 firms were randomly selected over a period of 10 years data were collected from annualreport of the firms. This study used static data analyses to analyze data. Result showed average collectionperiod and average payment period exert insignificant positive effect on return on capital employed ofindustrial goods firms, while both average collection period and average payment period exert insignificantnegative effect on return on capital employed of consumer goods firms. Independent t-test result showedsignificant mean difference between coefficient estimate corresponding to industrial and consumer goodsfirms. This study concluded that there exists significant difference between the effect of working capitalmanagement on performance of industrial goods firms and consumer goods firms when performance ismeasured in terms of return on capital employed. Hence firms in both sub-sectors should be strategic whenmanaging working capital, by setting higher average payment period in a manner that will not crowd-outtheir credit worthiness.
- Published
- 2019
- Full Text
- View/download PDF
39. DroidRista: a highly precise static data flow analysis framework for android applications
- Author
-
Suhair Alshehri, Areej Alzaidi, and Seyed M. Buhari
- Subjects
021110 strategic, defence & security studies ,Computer Networks and Communications ,Computer science ,business.industry ,0211 other engineering and technologies ,Cryptography ,02 engineering and technology ,Improved performance ,User privacy ,Embedded system ,Static data ,Android (operating system) ,Safety, Risk, Reliability and Quality ,business ,Computer communication networks ,Software ,Information Systems ,Leakage (electronics) - Abstract
The Android operating system dominates the smartphone market. Thus, to service the market, the number of Android applications has risen dramatically. These applications are processing a great amount of sensitive data, which could result in various concerns including data leakage and privacy violations. For example, applications may misuse the sensitive data stored on Android devices and violate the privacy of the user. Therefore, it is essential to maintain user privacy and protect sensitive data from leakage. Static data flow analysis approaches are used for analyzing Android applications to uncover security and privacy issues. However, these approaches frequently generate false alarms, given the different challenges created by Android applications, such as inter-component communication (ICC), reflection, and implicit flow. This work presents the DroidRista approach for conducting static data flow analysis on Android applications to detect sensitive data leakage. DroidRista analyzes ICC, reflection, and implicit flow in Android applications. To evaluate the performance of DroidRista, it was tested on three data sets. The results demonstrate improved performance in terms of detecting data leakage compared to existing static data flow analysis approaches.
- Published
- 2019
- Full Text
- View/download PDF
40. Computing meaningful models of continuous data
- Author
-
Koji Muteki, Francis B. Lavoie, and Ryan Gosselin
- Subjects
Chemical process ,0209 industrial biotechnology ,Process (engineering) ,Computer science ,General Chemical Engineering ,02 engineering and technology ,General Chemistry ,computer.software_genre ,Regression ,Continuous data ,020901 industrial engineering & automation ,020401 chemical engineering ,Process dynamics ,Process analysis ,Data mining ,0204 chemical engineering ,Static data ,Critical quality attributes ,computer - Abstract
Parameters controlling continuous chemical processes as well as all instruments found in such processes generate a huge amount of data. Calculating models to predict critical quality attributes (in y ) from process data (in X ) can be fastidious. Partial-Least-Squares (PLS) regression is now widely present in the industry for process analysis and modelling purposes. However, this methodology requires static data while the majority of chemical processes operate continuously. Some dynamic PLS variants have been developed, but they cannot associate specific critical process parameters with meaningful process dynamics. This work presents a novel Dynamic-PLS variant developed to resolve these issues. Using one real dataset and artificial cases, the performances of this novel methodology is compared to standard regression methodologies. It is demonstrated that the proposed methodology calculates the most robust models in validation. With the real dataset, it is also demonstrated that the predictive model calculated from the proposed methodology can easily be interpreted, leading to better process understanding.
- Published
- 2019
- Full Text
- View/download PDF
41. Assessing Working Capital Management and Performance of Listed Manufacturing Firms: Nigeria Evidence
- Author
-
Gideon Tayo Akinleye and Adeboboye Roseline
- Subjects
Granger causality ,Earnings per share ,media_common.quotation_subject ,Working capital ,Manufacturing firms ,Collection period ,Demographic economics ,Business ,Return on capital employed ,Static data ,Payment ,media_common - Abstract
This study assessed working capital management and performance of listed manufacturing firms in Nigeria 20 firms were sampled, over 10 years. The study employed static data analyses and panel Granger causality test. Result showed that average collection period exerts insignificant negative effect on return on capital employed of the sampled firms, while average collection period also exerts insignificant negative effect on earnings per share of the sampled firms. The result further showed that, average payment period exerts insignificant positive effect on return on capital employed of the sampled firms, but average payment period exerts insignificant negative effect on earnings per share of the sampled firms. The study concluded that, average collection period and average payment exert insignificant effect on return on capital employed of listed manufacturing firms in Nigeria, also; average collection period and average payment period exert insignificant effect on earnings per share of listed manufacturing firms in Nigeria. Hence manufacturing firms in Nigeria should objectively manage average collection period and also maintain a consistent improvement in return on capital employed and earnings per share of listed manufacturing firms in Nigeria.
- Published
- 2019
- Full Text
- View/download PDF
42. Oncological Morbidity of Children in the Arkhangelsk Region and the Nenets Autonomous District: An Ecological Study
- Subjects
030203 arthritis & rheumatology ,business.industry ,Incidence (epidemiology) ,030501 epidemiology ,Medical care ,Annual incidence ,03 medical and health sciences ,0302 clinical medicine ,Oncology ,Pediatrics, Perinatology and Child Health ,Child population ,Pediatric oncology ,Medicine ,Russian federation ,Static data ,0305 other medical science ,business ,Demography - Abstract
Background. The study of oncological morbidity in children, as well as the characteristics of its structure and the analysis of temporal trends within the subject of the Russian Federation is aimed at improving the organization of medical care: increasing early diagnosis, reliability of static data, and optimizing patient routing. Objective. Our aim was to analyze the incidence and its structure in children (0–17 years old) who lived in the Arkhangelsk Region and the Nenets Autonomous District in 2007–2016. Methods. The analysis of the incidence of malignant neoplasms of the child population in the Arkhangelsk region and the Nenets Autonomous District was carried out. Results. During the study period, the diagnosis of cancer was first established in 329 (including 6 patients from other subjects of the Russian Federation children (boys — 177, girls — 146) at the age of 0–17 years, of which 260 children at the age of 0–14 years and 63 — at the age of 15–17 years. The average annual incidence of children over 10 years was 14.3: for the age group 0–14 years old — 13.8, for the age group 15–17 years old — 16.6. During the analyzed period, there were significant fluctuations in annual incidence rates (minimum — 9.8 in 2010; maximum — 16.8 in 2009). The average annual incidence in the age group 15–17 years (16.6) was 18% higher than in the age group 0–14 years (14). The morbidity structure was characterized by some predominance of solid tumors (51.7%) over hemoblastosis (48.3%), and in the group of 0–14 years this ratio was 54.6/45.4%, in the group of 15–17 years — 50, 9/49.1%. Conclusion. In the analyzed subjects in recent years there has been practically no increase in the incidence in children. The incidence in the age group 15–17 years is slightly higher than in the age group 0–14 years. Changes in the morbidity structure are noted, mainly due to a decrease in the proportion of lymphomas.
- Published
- 2019
- Full Text
- View/download PDF
43. Actors with stretchable access patterns
- Author
-
Stéphane Domas, Ke Du, Michel Lenczner, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST), Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC), and Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[SPI.OTHER]Engineering Sciences [physics]/Other ,Data stream ,Correctness ,Theoretical computer science ,Computer science ,Dataflow ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,VHDL ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Static data ,computer.programming_language ,020208 electrical & electronic engineering ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation ,Graph ,020202 computer hardware & architecture ,Fpga design ,[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA] ,Hardware and Architecture ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,computer ,Software - Abstract
International audience; In this article, we propose a new framework based on dataflow graphs to abstract and analyze designs for hardware architectures. It is called Actors with Stretchable Access Patterns (ASAP). It can overcome some limitations of all Static Data Flow (SDF) based models like mandatory buffering between actors. This article details the fundamental contributions of ASAP. Firstly, it gives the definition of actors and their different patterns. It also illustrates the link between these notions and components written in VHDL through several examples. Secondly, it presents the main algorithms to check if a graph processes an input data stream correctly, which is called compatibility checking. Thirdly, it summarizes the principles of graph modification to enforce this correctness in case of some blocks are declared incompatible. Finally, it briefly describes our EDA tool called BlAsT which integrates the above principles, before presenting an application on a realistic FPGA design. It shows that ASAP overwhelms other models in terms of resources saving without any impact on the global latency. It also points out the ability of BlAsT to compute and to propose graph modifications and to generate the VHDL code of the whole design.
- Published
- 2019
- Full Text
- View/download PDF
44. Prediction of COVID-19 Infections for Municipalities in the Netherlands: Algorithm Development and Interpretation
- Author
-
Tjeerd van der Ploeg, Robbert J J Gobbens, Ouderen, and Tranzo, Scientific center for care and wellbeing
- Subjects
SYMPTOMS ,Fever ,Health Informatics ,virus ,FATIGUE ,Prediction model ,cough ,SURVEILLANCE ,Humans ,pneumonia ,data merging ,Cities ,Child ,Aged ,Netherlands ,municipality properties ,Pandemic ,DEATH ,Public Health, Environmental and Occupational Health ,modeling technique ,COVID-19 ,Public ,VARIABLE SELECTION ,Dyspnea ,static data ,INFECTIONS ,Congestion ,Particulate Matter ,Human medicine ,Public Health ,Algorithms ,dutch public domain ,wuhan - Abstract
Background COVID-19 was first identified in December 2019 in the city of Wuhan, China. The virus quickly spread and was declared a pandemic on March 11, 2020. After infection, symptoms such as fever, a (dry) cough, nasal congestion, and fatigue can develop. In some cases, the virus causes severe complications such as pneumonia and dyspnea and could result in death. The virus also spread rapidly in the Netherlands, a small and densely populated country with an aging population. Health care in the Netherlands is of a high standard, but there were nevertheless problems with hospital capacity, such as the number of available beds and staff. There were also regions and municipalities that were hit harder than others. In the Netherlands, there are important data sources available for daily COVID-19 numbers and information about municipalities. Objective We aimed to predict the cumulative number of confirmed COVID-19 infections per 10,000 inhabitants per municipality in the Netherlands, using a data set with the properties of 355 municipalities in the Netherlands and advanced modeling techniques. Methods We collected relevant static data per municipality from data sources that were available in the Dutch public domain and merged these data with the dynamic daily number of infections from January 1, 2020, to May 9, 2021, resulting in a data set with 355 municipalities in the Netherlands and variables grouped into 20 topics. The modeling techniques random forest and multiple fractional polynomials were used to construct a prediction model for predicting the cumulative number of confirmed COVID-19 infections per 10,000 inhabitants per municipality in the Netherlands. Results The final prediction model had an R2 of 0.63. Important properties for predicting the cumulative number of confirmed COVID-19 infections per 10,000 inhabitants in a municipality in the Netherlands were exposure to particulate matter with diameters Conclusions Data about municipality properties in relation to the cumulative number of confirmed infections in a municipality in the Netherlands can give insight into the most important properties of a municipality for predicting the cumulative number of confirmed COVID-19 infections per 10,000 inhabitants in a municipality. This insight can provide policy makers with tools to cope with COVID-19 and may also be of value in the event of a future pandemic, so that municipalities are better prepared.
- Published
- 2022
- Full Text
- View/download PDF
45. Persistently Identifying a Digital Object
- Author
-
Barlow, Melanie
- Subjects
DOI ,Provenance ,Static Data ,Dynamic Data - Abstract
Persistent identification of dynamic and static data, using DOIs and provenance (inabstract).
- Published
- 2021
- Full Text
- View/download PDF
46. Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
- Author
-
Chao Yan, Lina Wang, Weiyi Zhong, Xiaolong Xu, Yihong Yang, and Lianyong Qi
- Subjects
Data stream ,Concept drift ,Computer science ,Network security ,business.industry ,Intrusion detection system ,computer.software_genre ,Sliding window protocol ,Anomaly detection ,Network intrusion detection ,Data mining ,Static data ,business ,computer - Abstract
Intrusion detection system is a primary defense mechanism in aspect of protecting network security. Anomaly detection, as one of the most commonly used intrusion detection methods, plays a significant part in detecting the network traffic data. However, network traffic data is typical data stream pattern that is in the natures of infiniteness, correlation and concept drift, which bring some challenges to traditional anomaly detection algorithms for static data. In this paper, a novel method (called DLSHiForest*) based on LSHiForest, sliding window, concept drift detection and model update is proposed, which can cope with above issues to improve detection accuracy while guaranteeing anomaly detection efficiency. Extensive experiments are conducted using SMTP dataset to verify the feasibility of our proposed method. Experimental results demonstrate that our proposal can achieve accurate and efficient anomaly detection for data stream.
- Published
- 2021
- Full Text
- View/download PDF
47. Clustering algorithm for static gait recognition based on low-dimensional plantar pressure features.
- Author
-
Fang Zhengwen, Wang Nian, Jiang Jinjian, and Bao Wenxia
- Abstract
This paper proposed a static gait clustering algorithm to explore the application of plantar pressure features in personal identification. Firstly, the algorithm extracted the common plantar pressure features including global and local ones from the static data through a pressure platform, which could be a vector to characterize the samples. Then it used non-negative matrix factorization (NMF) method to get the mapping of the samples in the transformed feature space and the representation in low-dimensional space. Finally, after dimensionality reduction, these features were to be clustered by fuzzy C-means algorithm (FCM). The result shows that the clustering accuracy can reach about 90% and compared with other methods, it has advantages in accuracy at the same time. Through the experiment and comparative analysis, the method which compressed the sample data to a very low-dimensional feature space can retain the category information of samples, and then draw the conclusion that the plantar pressure features extracted from the algorithm are effective and feasible. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
48. Incremental Maintenance of ABAC Policies
- Author
-
Shamik Sural, Jaideep Vaidya, Gunjan Batra, and Vijayalakshmi Atluri
- Subjects
021110 strategic, defence & security studies ,Database ,Computer science ,Process (engineering) ,0211 other engineering and technologies ,02 engineering and technology ,Attribute-based access control ,Object (computer science) ,computer.software_genre ,Data mining algorithm ,Article ,Set (abstract data type) ,Incremental maintenance ,0202 electrical engineering, electronic engineering, information engineering ,In real life ,020201 artificial intelligence & image processing ,Static data ,computer - Abstract
Discovery of Attribute Based Access Control policies through mining has been studied extensively in the literature. However, current solutions assume that the rules are to be mined from a static data set of access permissions and that this process only needs to be done once. However, in real life, access policies are dynamic in nature and may change based on the situation. Simply utilizing the current approaches would necessitate that the mining algorithm be re-executed for every update in the permissions or user/object attributes, which would be significantly inefficient. In this paper, we propose to incrementally maintain ABAC policies by only updating the rules that may be affected due to any change in the underlying access permissions or attributes. A comprehensive experimental evaluation demonstrates that the proposed incremental approach is significantly more efficient than the conventional ABAC mining.
- Published
- 2021
49. Light Attention Predicts Protein Location from the Language of Life
- Author
-
Staerk H, Christian Dallago, Michael Heinzinger, and Burkhard Rost
- Subjects
Sequence ,business.industry ,Computer science ,Percentage point ,Machine learning ,computer.software_genre ,Protein location ,Resource (project management) ,Test set ,Softmax function ,Language model ,Artificial intelligence ,Static data ,business ,computer - Abstract
SummaryAlthough knowing where a protein functions in a cell is important to characterize biological processes, this information remains unavailable for most known proteins. Machine learning narrows the gap through predictions from expert-designed input features leveraging information from multiple sequence alignments (MSAs) that is resource expensive to generate. Here, we showcased using embeddings from protein language models (pLMs) for competitive localization prediction without MSAs. Our lightweight deep neural network architecture used a softmax weighted aggregation mechanism with linear complexity in sequence length referred to as light attention (LA). The method significantly outperformed the state-of-the-art (SOTA) for ten localization classes by about eight percentage points (Q10). So far, this might be the highest improvement of just embeddings over MSAs. Our new test set highlighted the limits of standard static data sets: while inviting new models, they might not suffice to claim improvements over the SOTA.AvailabilityOnline predictions are available at http://embed.protein.properties. Predictions for the human proteome are available at https://zenodo.org/record/5047020. Code is provided at https://github.com/HannesStark/protein-localization.
- Published
- 2021
- Full Text
- View/download PDF
50. Dynamic Adaptive Chain Model of Knowledge Graph Representation Learning
- Author
-
Yulong Zhao, Jinkui Yao, and Song Lu
- Subjects
Focus (computing) ,Theoretical computer science ,Chain model ,Knowledge graph ,Computer science ,Dynamic data ,Retraining ,Static data ,Feature learning - Abstract
Knowledge graph representation learning models are mostly used for static data. When the data changes, the models cannot be adjusted dynamically as the data changes. The data is constantly changing in actual usage scenarios. However, most representation learning models focus on prediction accuracy and ignore the dynamic change of knowledge graph. A trained representation learning model is closed, but the facts in the real world are constantly changing. The knowledge graph of the real world should be open to realize the description of reality. This paper proposes a dynamic adaptive chain transfer model aim to deal with changing knowledge graph data. Our model realizes the dynamic increase and decrease of triples without retraining. We designed an experimental method to verify the validity of the model. Experimental results show that our model can achieve dynamic data changes and keep the performance of the original model.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.