224 resultados para NEURAL CODE
Resumo:
Bridge construction responds to the need for environmentally friendly design of motorways and facilitates the passage through sensitive natural areas and the bypassing of urban areas. However, according to numerous research studies, bridge construction presents substantial budget overruns. Therefore, it is necessary early in the planning process for the decision makers to have reliable estimates of the final cost based on previously constructed projects. At the same time, the current European financial crisis reduces the available capital for investments and financial institutions are even less willing to finance transportation infrastructure. Consequently, it is even more necessary today to estimate the budget of high-cost construction projects -such as road bridges- with reasonable accuracy, in order for the state funds to be invested with lower risk and the projects to be designed with the highest possible efficiency. In this paper, a Bill-of-Quantities (BoQ) estimation tool for road bridges is developed in order to support the decisions made at the preliminary planning and design stages of highways. Specifically, a Feed-Forward Artificial Neural Network (ANN) with a hidden layer of 10 neurons is trained to predict the superstructure material quantities (concrete, pre-stressed steel and reinforcing steel) using the width of the deck, the adjusted length of span or cantilever and the type of the bridge as input variables. The training dataset includes actual data from 68 recently constructed concrete motorway bridges in Greece. According to the relevant metrics, the developed model captures very well the complex interrelations in the dataset and demonstrates strong generalisation capability. Furthermore, it outperforms the linear regression models developed for the same dataset. Therefore, the proposed cost estimation model stands as a useful and reliable tool for the construction industry as it enables planners to reach informed decisions for technical and economic planning of concrete bridge projects from their early implementation stages.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.
Resumo:
BACKGROUND: The aberrant transcription in cancer of genes normally associated with embryonic tissue differentiation at various organ sites may be a hallmark of tumour progression. For example, neuroendocrine differentiation is found more commonly in cancers destined to progress, including prostate and lung. We sought to identify proteins which are involved in neuroendocrine differentiation and differentially expressed in aggressive/metastatic tumours.
RESULTS: Expression arrays were used to identify up-regulated transcripts in a neuroendocrine (NE) transgenic mouse model of prostate cancer. Amongst these were several genes normally expressed in neural tissues, including the pro-neural transcription factors Ascl1 and Hes6. Using quantitative RT-PCR and immuno-histochemistry we showed that these same genes were highly expressed in castrate resistant, metastatic LNCaP cell-lines. Finally we performed a meta-analysis on expression array datasets from human clinical material. The expression of these pro-neural transcripts effectively segregates metastatic from localised prostate cancer and benign tissue as well as sub-clustering a variety of other human cancers.
CONCLUSION: By focussing on transcription factors known to drive normal tissue development and comparing expression signatures for normal and malignant mouse tissues we have identified two transcription factors, Ascl1 and Hes6, which appear effective markers for an aggressive phenotype in all prostate models and tissues examined. We suggest that the aberrant initiation of differentiation programs may confer a selective advantage on cells in all contexts and this approach to identify biomarkers therefore has the potential to uncover proteins equally applicable to pre-clinical and clinical cancer biology.
Resumo:
This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for smaller architectures. BLAKE2 can be directly keyed, making it functionally equivalent to a Message Authentication Code (MAC).
Resumo:
In this study, we introduce an original distance definition for graphs, called the Markov-inverse-F measure (MiF). This measure enables the integration of classical graph theory indices with new knowledge pertaining to structural feature extraction from semantic networks. MiF improves the conventional Jaccard and/or Simpson indices, and reconciles both the geodesic information (random walk) and co-occurrence adjustment (degree balance and distribution). We measure the effectiveness of graph-based coefficients through the application of linguistic graph information for a neural activity recorded during conceptual processing in the human brain. Specifically, the MiF distance is computed between each of the nouns used in a previous neural experiment and each of the in-between words in a subgraph derived from the Edinburgh Word Association Thesaurus of English. From the MiF-based information matrix, a machine learning model can accurately obtain a scalar parameter that specifies the degree to which each voxel in (the MRI image of) the brain is activated by each word or each principal component of the intermediate semantic features. Furthermore, correlating the voxel information with the MiF-based principal components, a new computational neurolinguistics model with a network connectivity paradigm is created. This allows two dimensions of context space to be incorporated with both semantic and neural distributional representations.
Resumo:
This paper investigates the profile of teachers in the island of Ireland who declared themselves willing to undertake professional development activities in programming, in particular to master programming by taking on-line courses involving the design of computer games. Using the Technology Acceptance Model (TAM), it compares scores for teachers “willing” to undertake the courses with scores for those who declined, and examines other differences between the groups of respondents. Findings reflect the perceived difficulties of programming and the current low status accorded to the subject in Ireland. The paper also reviews the use of games-based learning as a “hook” to engage learners in programming and discusses the role of gamification as a tool for motivating learners in an on-line course. The on-line course focusing on games design was met with enthusiasm, and there was general consensus that gamification was appropriate for motivating learners in structured courses such as those provided.
Resumo:
In this paper we propose a novel recurrent neural networkarchitecture for video-based person re-identification.Given the video sequence of a person, features are extracted from each frame using a convolutional neural network that incorporates a recurrent final layer, which allows information to flow between time-steps. The features from all time steps are then combined using temporal pooling to give an overall appearance feature for the complete sequence. The convolutional network, recurrent layer, and temporal pooling layer, are jointly trained to act as a feature extractor for video-based re-identification using a Siamese network architecture.Our approach makes use of colour and optical flow information in order to capture appearance and motion information which is useful for video re-identification. Experiments are conduced on the iLIDS-VID and PRID-2011 datasets to show that this approach outperforms existing methods of video-based re-identification.
https://github.com/niallmcl/Recurrent-Convolutional-Video-ReID
Project Source Code
Resumo:
Real-space grids are a powerful alternative for the simulation of electronic systems. One of the main advantages of the approach is the flexibility and simplicity of working directly in real space where the different fields are discretized on a grid, combined with competitive numerical performance and great potential for parallelization. These properties constitute a great advantage at the time of implementing and testing new physical models. Based on our experience with the Octopus code, in this article we discuss how the real-space approach has allowed for the recent development of new ideas for the simulation of electronic systems. Among these applications are approaches to calculate response properties, modeling of photoemission, optimal control of quantum systems, simulation of plasmonic systems, and the exact solution of the Schrödinger equation for low-dimensionality systems.
Resumo:
Cross education is the process whereby training of one limb gives rise to increases in the subsequent performance of its opposite counterpart. The execution of many unilateral tasks is associated with increased excitability of corticospinal projections from primary motor cortex (M1) to the opposite limb. It has been proposed that these effects are causally related. Our aim was to establish whether changes in corticospinal excitability arising from prior training of the opposite limb determine levels of interlimb transfer.
We used three vision conditions shown previously to modulate the excitability of corticospinal projections to the inactive (right) limb during wrist flexion movements performed by the training (left) limb. These were: mirrored visual feedback of the training limb; no visual feedback of either limb; and visual feedback of the inactive limb. Training comprised 300 discrete, ballistic wrist flexion movements executed as rapidly as possible. Performance of the right limb on the same task was assessed prior to, at the mid point of, and following left limb training.
There was no evidence that variations in the excitability of corticospinal projections (assessed by transcranial magnetic stimulation (TMS)) to the inactive limb were associated with, or predictive of, the extent of interlimb transfer that was expressed. There were however associations between alterations in muscle activation dynamics observed for the untrained limb, and the degree of positive transfer that arose from training of the opposite limb.
The results suggest that the acute adaptations that mediate the bilateral performance gains realised through unilateral practice of this ballistic wrist flexion task are mediated by neural elements other than those within M1 that are recruited at rest by single-pulse TMS.