813 resultados para Pseudo relevance feedback


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The emergence of cloud datacenters enhances the capability of online data storage. Since massive data is stored in datacenters, it is necessary to effectively locate and access interest data in such a distributed system. However, traditional search techniques only allow users to search images over exact-match keywords through a centralized index. These techniques cannot satisfy the requirements of content based image retrieval (CBIR). In this paper, we propose a scalable image retrieval framework which can efficiently support content similarity search and semantic search in the distributed environment. Its key idea is to integrate image feature vectors into distributed hash tables (DHTs) by exploiting the property of locality sensitive hashing (LSH). Thus, images with similar content are most likely gathered into the same node without the knowledge of any global information. For searching semantically close images, the relevance feedback is adopted in our system to overcome the gap between low-level features and high-level features. We show that our approach yields high recall rate with good load balance and only requires a few number of hops.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Parte de la investigación biomédica actual se encuentra centrada en el análisis de datos heterogéneos. Estos datos pueden tener distinto origen, estructura, y semántica. Gran cantidad de datos de interés para los investigadores se encuentran en bases de datos públicas, que recogen información de distintas fuentes y la ponen a disposición de la comunidad de forma gratuita. Para homogeneizar estas fuentes de datos públicas con otras de origen privado, existen diversas herramientas y técnicas que permiten automatizar los procesos de homogeneización de datos heterogéneos. El Grupo de Informática Biomédica (GIB) [1] de la Universidad Politécnica de Madrid colabora en el proyecto europeo P-medicine [2], cuya finalidad reside en el desarrollo de una infraestructura que facilite la evolución de los procedimientos médicos actuales hacia la medicina personalizada. Una de las tareas enmarcadas en el proyecto P-medicine que tiene asignado el grupo consiste en elaborar herramientas que ayuden a usuarios en el proceso de integración de datos contenidos en fuentes de información heterogéneas. Algunas de estas fuentes de información son bases de datos públicas de ámbito biomédico contenidas en la plataforma NCBI [3] (National Center for Biotechnology Information). Una de las herramientas que el grupo desarrolla para integrar fuentes de datos es Ontology Annotator. En una de sus fases, la labor del usuario consiste en recuperar información de una base de datos pública y seleccionar de forma manual los resultados relevantes. Para automatizar el proceso de búsqueda y selección de resultados relevantes, por un lado existe un gran interés en conseguir generar consultas que guíen hacia resultados lo más precisos y exactos como sea posible, por otro lado, existe un gran interés en extraer información relevante de elevadas cantidades de documentos, lo cual requiere de sistemas que analicen y ponderen los datos que caracterizan a los mismos. En el campo informático de la inteligencia artificial, dentro de la rama de la recuperación de la información, existen diversos estudios acerca de la expansión de consultas a partir de retroalimentación relevante que podrían ser de gran utilidad para dar solución a la cuestión. Estos estudios se centran en técnicas para reformular o expandir la consulta inicial utilizando como realimentación los resultados que en una primera instancia fueron relevantes para el usuario, de forma que el nuevo conjunto de resultados tenga mayor proximidad con los que el usuario realmente desea. El objetivo de este trabajo de fin de grado consiste en el estudio, implementación y experimentación de métodos que automaticen el proceso de extracción de información trascendente de documentos, utilizándola para expandir o reformular consultas. De esta forma se pretende mejorar la precisión y el ranking de los resultados asociados. Dichos métodos serán integrados en la herramienta Ontology Annotator y enfocados a la fuente de datos de PubMed [4].---ABSTRACT---Part of the current biomedical research is focused on the analysis of heterogeneous data. These data may have different origin, structure and semantics. A big quantity of interesting data is contained in public databases which gather information from different sources and make it open and free to be used by the community. In order to homogenize thise sources of public data with others which origin is private, there are some tools and techniques that allow automating the processes of integration heterogeneous data. The biomedical informatics group of the Universidad Politécnica de Madrid cooperates with the European project P-medicine which main purpose is to create an infrastructure and models to facilitate the transition from current medical practice to personalized medicine. One of the tasks of the project that the group is in charge of consists on the development of tools that will help users in the process of integrating data from diverse sources. Some of the sources are biomedical public data bases from the NCBI platform (National Center for Biotechnology Information). One of the tools in which the group is currently working on for the integration of data sources is called the Ontology Annotator. In this tool there is a phase in which the user has to retrieve information from a public data base and select the relevant data contained in it manually. For automating the process of searching and selecting data on the one hand, there is an interest in automatically generating queries that guide towards the more precise results as possible. On the other hand, there is an interest on retrieve relevant information from large quantities of documents. The solution requires systems that analyze and weigh the data allowing the localization of the relevant items. In the computer science field of the artificial intelligence, in the branch of information retrieval there are diverse studies about the query expansion from relevance feedback that could be used to solve the problem. The main purpose of this studies is to obtain a set of results that is the closer as possible to the information that the user really wants to retrieve. In order to reach this purpose different techniques are used to reformulate or expand the initial query using a feedback the results that where relevant for the user, with this method, the new set of results will have more proximity with the ones that the user really desires. The goal of this final dissertation project consists on the study, implementation and experimentation of methods that automate the process of extraction of relevant information from documents using this information to expand queries. This way, the precision and the ranking of the results associated will be improved. These methods will be integrated in the Ontology Annotator tool and will focus on the PubMed data source.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In order to bridge the “Semantic gap”, a number of relevance feedback (RF) mechanisms have been applied to content-based image retrieval (CBIR). However current RF techniques in most existing CBIR systems still lack satisfactory user interaction although some work has been done to improve the interaction as well as the search accuracy. In this paper, we propose a four-factor user interaction model and investigate its effects on CBIR by an empirical evaluation. Whilst the model was developed for our research purposes, we believe the model could be adapted to any content-based search system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents an interactive content-based image retrieval framework—uInteract, for delivering a novel four-factor user interaction model visually. The four-factor user interaction model is an interactive relevance feedback mechanism that we proposed, aiming to improve the interaction between users and the CBIR system and in turn users overall search experience. In this paper, we present how the framework is developed to deliver the four-factor user interaction model, and how the visual interface is designed to support user interaction activities. From our preliminary user evaluation result on the ease of use and usefulness of the proposed framework, we have learnt what the users like about the framework and the aspects we could improve in future studies. Whilst the framework is developed for our research purposes, we believe the functionalities could be adapted to any content-based image search framework.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Individuals living in highly networked societies publish a large amount of personal, and potentially sensitive, information online. Web investigators can exploit such information for a variety of purposes, such as in background vetting and fraud detection. However, such investigations require a large number of expensive man hours and human effort. This paper describes InfoScout, a search tool which is intended to reduce the time it takes to identify and gather subject centric information on the Web. InfoScout collects relevance feedback information from the investigator in order to rerank search results, allowing the intended information to be discovered more quickly. Users may still direct their search as they see fit, issuing ad-hoc queries and filtering existing results by keywords. Design choices are informed by prior work and industry collaboration.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose of review To perform an update review on thyroglobulin gene mutations associated with congenital hypothyroidism, thyroid cancer, and autoimmunity. Recent findings Forty-two thyroglobulin mutations have been identified in dyshormonogenetic congenital hypothyroidism. Clinical and laboratory criteria defining defective thyroglobulin synthesis are mostly related to thyroglobulin mutations, generally caused by intracellular thyroglobulin transport defects to the colloid rather than defects in thyroid hormones synthesis. Some mutated thyroglobulin may escape the rigorous chaperone control and reach the colloid, allowing a wide phenotypic spectrum that includes euthyroidism in an adequate iodine environment. In some patients, continuous levothyroxine treatment does not reduce elevated serum thyroid-stimulating hormone (TSH) levels that may lead to goiter development. Prenatally, inactive mutant thyroglobulin will not be able to synthesize thyroid hormones and may increase pituitary thyrotroph threshold for thyroid hormone feedback. Congenital goiter is a risk factor for thyroid cancer and some thyroglobulin variants may confer susceptibility to thyroid autoimmunity. Summary Advances in the understanding of thyroglobulin genetic defects and its severity should allow researchers to perform adequate molecular diagnosis, genetic counseling, and intrauterine treatment to prevent subtle deficits in central nervous system development. This knowledge should improve the understanding of physiological functions of the thyroid and influence of nutritional iodine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives The purpose of this study is to assess short and long term changes in knowledge, attitudes, and skills among medical residents following a short course on cultural competency and to explore their perspectives on the experience. Methods Eighteen medical residents went through a short training programme comprised of two seminars lasting 30' and 60' respectively over two days. Three months later, we conducted three focus groups, with 17 residents to explore their thoughts, perspectives and feedback about the course. To measure changes over time, we carried out a quantitative sequential survey before the seminars, three days after, and three months later using the Multicultural Assessment Questionnaire. Results Residents expressed a wide variety of perspectives on the main themes related to the content of the training - culture, trialogue, stereotypes, status, epidemiology, history and geopolitics - and related to its organization - relevance, volume, timing, target audience, training tools, and working material. Using the MAQ, we observed a higher global performance score (n=16) at three days (median=38) compared to results before the training (median=33) revealing a median difference of 5.5 points (z=2.4, p=0.015). This difference was still present at three months (∆=4.5, z=2.4, p=0.018), mainly due to knowledge acquisition (∆=3) rather than attitudes (∆=0) or skills (∆=1). Conclusions Cross-cultural competence training not only brings awareness of multicultural issues but also helps participants understand their own cultures, perception of others and preconceived ideas. Physicians' education should however also focus on improving implementation of acquired knowledge in cross-cultural competence.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Rückmeldungen von Schülerinnen und Schülern zum Unterricht nehmen eine wichtige Rolle zur Verbesserung der Unterrichtsqualität ein. Während der Ausbildung von Lehrpersonen wird dieses Potenzial bisher aber selten genutzt. Der Beitrag stellt Ergebnisse aus dem Forschungsprojekt "Lernen im Praktikum" vor. Befragt wurden 150 Studierende des Lehramts für 7.-9. Klassen (Sekundarstufe 1) zur Bedeutung von Schülerrückmeldungen im Praktikum sowie 1331 Schülerinnen und Schüler aus Praktikumsklassen zum Praktikum und zum Lernprozess der Praktikantinnen und Praktikanten. Die Ergebnisse unterstützen einerseits die Relevanz systematischer Schülerrückmeldungen für das Lernen im Praktikum. Andererseits machen sie auf die Notwendigkeit aufmerksam, die Kriterien, die Schülerbeurteilungen zugrunde liegen, weiter zu erforschen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The ability to accurately observe the Earth's carbon cycles from space gives scientists an important tool to analyze climate change. Current space-borne Integrated-Path Differential Absorption (IPDA) Iidar concepts have the potential to meet this need. They are mainly based on the pulsed time-offlight principle, in which two high energy pulses of different wavelengths interrogate the atmosphere for its transmission properties and are backscattered by the ground. In this paper, feasibility study results of a Pseudo-Random Single Photon Counting (PRSPC) IPDA lidar are reported. The proposed approach replaces the high energy pulsed source (e.g. a solidstate laser), with a semiconductor laser in CW operation with a similar average power of a few Watts, benefiting from better efficiency and reliability. The auto-correlation property of Pseudo-Random Binary Sequence (PRBS) and temporal shifting of the codes can be utilized to transmit both wavelengths simultaneously, avoiding the beam misalignment problem experienced by pulsed techniques. The envelope signal to noise ratio has been analyzed, and various system parameters have been selected. By restricting the telescopes field-of-view, the dominant noise source of ambient light can be suppressed, and in addition with a low noise single photon counting detector, a retrieval precision of 1.5 ppm over 50 km along-track averaging could be attained. We also describe preliminary experimental results involving a negative feedback Indium Gallium Arsenide (InGaAs) single photon avalanche photodiode and a low power Distributed Feedback laser diode modulated with PRBS driven acoustic optical modulator. The results demonstrate that higher detector saturation count rates will be needed for use in future spacebourne missions but measurement linearity and precision should meet the stringent requirements set out by future Earthobserving missions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Relatório final apresentado para a obtenção do grau de mestre em Ensino do 1.º ciclo e do 2.º ciclo do ensino básico

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Treatment of Escherichia coli glutamine synthetase (GS) with peroxynitrite leads to nitration of some tyrosine residues and conversion of some methionine residues to methionine sulfoxide (MSOX) residues. Nitration, but not MSOX formation, is stimulated by Fe-EDTA. In the absence of Fe-EDTA, nitration of only one tyrosine residue per subunit of unadenylylated GS leads to changes in divalent cation requirement, pH-activity profile, affinity for ADP, and susceptibility to feedback inhibition by end products (tryptophan, AMP, CTP), whereas nitration of one tyrosine residue per subunit in the adenylylated GS leads to complete loss of catalytic activity. In the presence of Fe-EDTA, nitration is a more random process: nitration of five to six tyrosine residues per subunit is needed to convert unadenylylated GS to the adenylylated configuration. These results and the fact that nitration of tyrosine residues is an irreversible process serve notice that the regulatory function of proteins that undergo phosphorylation or adenylylation in signal transduction cascades might be seriously compromised by peroxynitrite-promoted nitration.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We show, through some examples, that chemical activation by alkaline hydroxides permits the preparation of activated carbons with tailored pore volume, pore size distribution, pore structure and surface chemistry, which are useful for their application as electrodes in supercapacitors. Examples are presented discussing the importance of each of these properties on the double layer capacitance, on the kinetics of the electric double-layer charge-discharge process and on the pseudo-capacitative contribution from the surface functional groups or the addition of a conducting polymer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Relatório final apresentado para a obtenção do grau de mestre em Ensino do 1.º ciclo e do 2.º ciclo do ensino básico

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Feedback is considered one of the most effective mechanisms to aid learning and achievement (Hattie and Timperley, 2007). However, in past UK National Student Surveys, perceptions of academic feedback have been consistently rated lower by final year undergraduate students than other aspects of the student experience (Williams and Kane, 2009). For pharmacy students in particular, Hall and colleagues recently reported that almost a third of students surveyed were dissatisfied with feedback and perceived feedback practice to be inconsistent (Hall et al, 2012). Aims of the Workshop: This workshop has been designed to explore current academic feedback practices in pharmacy education across a variety of settings and cultures as well as to create a toolkit for pharmacy academics to guide their approach to feedback. Learning Objectives: 1. Discuss and characterise academic feedback practices provided by pharmacy academics to pharmacy students in a variety of settings and cultures. 2. Develop academic feedback strategies for a variety of scenarios. 3. Evaluate and categorise feedback strategies with use of a feedback matrix. Description of Workshop Activities: Introduction to workshop and feedback on pre-reading exercise (5 minutes). Activity 1: A short presentation on theoretical models of academic feedback. Evidence of feedback in pharmacy education (10 minutes). Activity 2: Discussion of feedback approaches in participants’ organisations for differing educational modalities. Consideration of the following factors will be undertaken: experiential v. theoretical education, formative v. summative assessment, form of assessment and the effect of culture (20 minutes, large group discussion). Activity 3: Introduction of a feedback matrix (5 minutes). Activity 4: Development of an academic feedback toolkit for pharmacy education. Participants will be divided into 4 groups and will discuss how to provide effective feedback for 2 scenarios. Feedback strategies will be categorised with the feedback matrix. Results will be presented back to the workshop group (20 minutes, small group discussion, 20 minutes, large group presentation). Summary (10 minutes). Additional Information: Pre-reading: Participants will be provided with a list of definitions for academic feedback and will be asked to rank the definitions in order of perceived relevance to pharmacy education. References Archer, J. C. (2010). State of the science in health professional education: effective feedback. Medical education, 44(1), 101-108. Hall, M., Hanna, L. A., & Quinn, S. (2012). Pharmacy Students’ Views of Faculty Feedback on Academic Performance. American journal of pharmaceutical education, 76(1). Hattie, J., & Timperley, H. (2007). The power of feedback. Review of educational research, 77(1), 81-112. Medina, M. S. (2007). Providing feedback to enhance pharmacy students’ performance. American Journal of Health-System Pharmacy, 64(24), 2542-2545.