915 resultados para Pattern recognition algorithms
Resumo:
The dynamics of inter-regional communication within the brain during cognitive processing – referred to as functional connectivity – are investigated as a control feature for a brain computer interface. EMDPL is used to map phase synchronization levels between all channel pair combinations in the EEG. This results in complex networks of channel connectivity at all time–frequency locations. The mean clustering coefficient is then used as a descriptive feature encapsulating information about inter-channel connectivity. Hidden Markov models are applied to characterize and classify dynamics of the resulting complex networks. Highly accurate levels of classification are achieved when this technique is applied to classify EEG recorded during real and imagined single finger taps. These results are compared to traditional features used in the classification of a finger tap BCI demonstrating that functional connectivity dynamics provide additional information and improved BCI control accuracies.
Resumo:
The Stochastic Diffusion Search algorithm -an integral part of Stochastic Search Networks is investigated. Stochastic Diffusion Search is an alternative solution for invariant pattern recognition and focus of attention. It has been shown that the algorithm can be modelled as an ergodic, finite state Markov Chain under some non-restrictive assumptions. Sub-linear time complexity for some settings of parameters has been formulated and proved. Some properties of the algorithm are then characterised and numerical examples illustrating some features of the algorithm are presented.
Resumo:
We address the problem of automatically identifying and restoring damaged and contaminated images. We suggest a novel approach based on a semi-parametric model. This has two components, a parametric component describing known physical characteristics and a more flexible non-parametric component. The latter avoids the need for a detailed model for the sensor, which is often costly to produce and lacking in robustness. We assess our approach using an analysis of electroencephalographic images contaminated by eye-blink artefacts and highly damaged photographs contaminated by non-uniform lighting. These experiments show that our approach provides an effective solution to problems of this type.
Resumo:
In the recent years, the area of data mining has been experiencing considerable demand for technologies that extract knowledge from large and complex data sources. There has been substantial commercial interest as well as active research in the area that aim to develop new and improved approaches for extracting information, relationships, and patterns from large datasets. Artificial neural networks (NNs) are popular biologically-inspired intelligent methodologies, whose classification, prediction, and pattern recognition capabilities have been utilized successfully in many areas, including science, engineering, medicine, business, banking, telecommunication, and many other fields. This paper highlights from a data mining perspective the implementation of NN, using supervised and unsupervised learning, for pattern recognition, classification, prediction, and cluster analysis, and focuses the discussion on their usage in bioinformatics and financial data analysis tasks. © 2012 Wiley Periodicals, Inc.
Resumo:
Scope: Fibers and prebiotics represent a useful dietary approach for modulating the human gut microbiome. Therefore, aim of the present study was to investigate the impact of four flours (wholegrain rye, wholegrain wheat, chickpeas and lentils 50:50, and barley milled grains), characterized by a naturally high content in dietary fibers, on the intestinal microbiota composition and metabolomic output. Methods and results: A validated three-stage continuous fermentative system simulating the human colon was used to resemble the complexity and diversity of the intestinal microbiota. Fluorescence in situ hybridization was used to evaluate the impact of the flours on the composition of the microbiota, while small-molecule metabolome was assessed by NMR analysis followed by multivariate pattern recognition techniques. HT29 cell-growth curve assay was used to evaluate the modulatory properties of the bacterial metabolites on the growth of intestinal epithelial cells. All the four flours showed positive modulations of the microbiota composition and metabolic activity. Furthermore, none of the flours influenced the growth-modulatory potential of the metabolites toward HT29 cells. Conclusion: Our findings support the utilization of the tested ingredients in the development of a variety of potentially prebiotic food products aimed at improving gastrointestinal health.
Resumo:
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. Implementation is achieved through development of a logic-based inference engine based on Prolog. Threat detection performance is conducted by testing against a range of datasets describing realistic situations and demonstrates a reduction in the number of false alarms generated. The proposed system represents the approach employed in the EU SUBITO project (Surveillance of Unattended Baggage and the Identification and Tracking of the Owner).
Resumo:
Analysis of human behaviour through visual information has been a highly active research topic in the computer vision community. This was previously achieved via images from a conventional camera, but recently depth sensors have made a new type of data available. This survey starts by explaining the advantages of depth imagery, then describes the new sensors that are available to obtain it. In particular, the Microsoft Kinect has made high-resolution real-time depth cheaply available. The main published research on the use of depth imagery for analysing human activity is reviewed. Much of the existing work focuses on body part detection and pose estimation. A growing research area addresses the recognition of human actions. The publicly available datasets that include depth imagery are listed, as are the software libraries that can acquire it from a sensor. This survey concludes by summarising the current state of work on this topic, and pointing out promising future research directions.
Resumo:
This paper presents the PETS2009 outdoor crowd image analysis surveillance dataset and the performance evaluation of people counting, detection and tracking results using the dataset submitted to five IEEE Performance Evaluation of Tracking and Surveillance (PETS) workshops. The evaluation was carried out using well established metrics developed in the Video Analysis and Content Extraction (VACE) programme and the CLassification of Events, Activities, and Relationships (CLEAR) consortium. The comparative evaluation highlights the detection and tracking performance of the authors’ systems in areas such as precision, accuracy and robustness and provides a brief analysis of the metrics themselves to provide further insights into the performance of the authors’ systems.
Resumo:
The 3D shape of an object and its 3D location have traditionally thought of as very separate entities, although both can be described within a single 3D coordinate frame. Here, 3D shape and location are considered as two aspects of a view-based approach to representing depth, avoiding the use of 3D coordinate frames.
Resumo:
Three coupled knowledge transfer partnerships used pattern recognition techniques to produce an e-procurement system which, the National Audit Office reports, could save the National Health Service £500 m per annum. An extension to the system, GreenInsight, allows the environmental impact of procurements to be assessed and savings made. Both systems require suitable products to be discovered and equivalent products recognised, for which classification is a key component. This paper describes the innovative work done for product classification, feature selection and reducing the impact of mislabelled data.
Resumo:
Paracoccidioides brasiliensis (Pb) is a dimorphic fungal pathogen that causes paracoccidioidomycosis the most severe deep mycosis from South America Although cell mediated immunity is considered the most efficient protective mechanism against Pb infection mechanisms of innate immunity are poorly defined Herein we investigated the interaction of the complement system with high and low virulence isolates of Pb We demonstrated that Pb18 a high virulence Pb Isolate when incubated with normal human serum (NHS) induces consumption of hemolytic complement and when immobilized promotes binding of C4b C3b and C5b-C9 Both low virulence (Pb265) and high virulence (Pb18) isolates consumed C4 C3 and mannose-binding learn (MBL) of MBL-sufficient but not of MBL-deficient serum as revealed by deposition of residual C4 C3 and MBL on immune complexes and mannan However higher complement components consumption was observed with Pb265 as compared with Pb18 The suggested relationship between low virulence and significant complement activation properties of Pb isolates was confirmed by the demonstration that virulence attenuation of Pb 18 results in acquisition of the ability to activate complement Conversely reactivation of attenuated Pb18 results in loss of the ability to activate complement Our results demonstrate for the first time that Pb yeasts activate the complement system by the lectin pathway and there is an Inverse correlation between complement activating ability and Pb virulence These differences could exert an influence on Innate immunity and severity of the disease developed by infected hosts (C) 2010 Elsevier Ltd All rights reserved
Resumo:
Acute kidney injury (AKI) is an important clinical syndrome characterized by abnormalities in the hydroelectrolytic balance. Because of high rates of morbidity and mortality (from 15% to 60%) associated with AKI, the study of its pathophysiology is critical in searching for clinical targets and therapeutic strategies. Severe sepsis is the major cause of AKI. The host response to sepsis involves an inflammatory response, whereby the pathogen is initially sensed by innate immune receptors (pattern recognition receptors [PRRs]). When it persists, this immune response leads to secretion of proinflammatory products that induce organ dysfunction such as renal failure and consequently increased mortality. Moreover, the injured tissue releases molecules resulting from extracellular matrix degradation or dying cells that function as alarmines, which are recognized by PRR in the absence of pathogens in a second wave of injury. Toll-like receptors (TLRs) and NOD-like receptors (NLRs) are the best characterized PRRs. They are expressed in many cell types and throughout the nephron. Their activation leads to translocation of nuclear factors and synthesis of proinflammatory cytokines and chemokines. TLRs` signaling primes the cells for a robust inflammatory response dependent on NLRs; the interaction of TLRs and NLRs gives rise to the multiprotein complex known as the inflammasome, which in turn activates secretion of mature interleukin 1 beta and interleukin 18. Experimental data show that innate immune receptors, the inflammasome components, and proinflammatory cytokines play crucial roles not only in sepsis, but also in organ-induced dysfunction, especially in the kidneys. In this review, we discuss the significance of the innate immune receptors in the development of acute renal injury secondary to sepsis.
Resumo:
There is a family of well-known external clustering validity indexes to measure the degree of compatibility or similarity between two hard partitions of a given data set, including partitions with different numbers of categories. A unified, fully equivalent set-theoretic formulation for an important class of such indexes was derived and extended to the fuzzy domain in a previous work by the author [Campello, R.J.G.B., 2007. A fuzzy extension of the Rand index and other related indexes for clustering and classification assessment. Pattern Recognition Lett., 28, 833-841]. However, the proposed fuzzy set-theoretic formulation is not valid as a general approach for comparing two fuzzy partitions of data. Instead, it is an approach for comparing a fuzzy partition against a hard referential partition of the data into mutually disjoint categories. In this paper, generalized external indexes for comparing two data partitions with overlapping categories are introduced. These indexes can be used as general measures for comparing two partitions of the same data set into overlapping categories. An important issue that is seldom touched in the literature is also addressed in the paper, namely, how to compare two partitions of different subsamples of data. A number of pedagogical examples and three simulation experiments are presented and analyzed in details. A review of recent related work compiled from the literature is also provided. (c) 2010 Elsevier B.V. All rights reserved.
Resumo:
Successful classification, information retrieval and image analysis tools are intimately related with the quality of the features employed in the process. Pixel intensities, color, texture and shape are, generally, the basis from which most of the features are Computed and used in such fields. This papers presents a novel shape-based feature extraction approach where an image is decomposed into multiple contours, and further characterized by Fourier descriptors. Unlike traditional approaches we make use of topological knowledge to generate well-defined closed contours, which are efficient signatures for image retrieval. The method has been evaluated in the CBIR context and image analysis. The results have shown that the multi-contour decomposition, as opposed to a single shape information, introduced a significant improvement in the discrimination power. (c) 2008 Elsevier B.V. All rights reserved,