861 resultados para scenario clustering


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a new stochastic clustering methodology devised for the analysis of categorized or sorted data. The methodology reveals consumers' common category knowledge as well as individual differences in using this knowledge for classifying brands in a designated product class. A small study involving the categorization of 28 brands of U.S. automobiles is presented where the results of the proposed methodology are compared with those obtained from KMEANS clustering. Finally, directions for future research are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This deliverable is a confirmation and update of 'D5.5 - First Version Scenario Arrangement Document – round 1' after a revisions with game developers. It outlines the implementation plan for each of the first-round studies of the RAGE pilots. The main goal of these pilots is to perform a small-scale test of the RAGE games with end-users and intermediary stakeholders in five different non-leisure domains to guide the further development of the games for the final validation studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reverse engineering is usually the stepping stone of a variety of at-tacks aiming at identifying sensitive information (keys, credentials, data, algo-rithms) or vulnerabilities and flaws for broader exploitation. Software applica-tions are usually deployed as identical binary code installed on millions of com-puters, enabling an adversary to develop a generic reverse-engineering strategy that, if working on one code instance, could be applied to crack all the other in-stances. A solution to mitigate this problem is represented by Software Diversity, which aims at creating several structurally different (but functionally equivalent) binary code versions out of the same source code, so that even if a successful attack can be elaborated for one version, it should not work on a diversified ver-sion. In this paper, we address the problem of maximizing software diversity from a search-based optimization point of view. The program to protect is subject to a catalogue of transformations to generate many candidate versions. The problem of selecting the subset of most diversified versions to be deployed is formulated as an optimisation problem, that we tackle with different search heuristics. We show the applicability of this approach on some popular Android apps.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel demand response model using a fuzzy subtractive cluster approach. The model development provides support to domestic consumer decisions on controllable loads management, considering consumers' consumption needs and the appropriate load shape or rescheduling in order to achieve possible economic benefits. The model based on fuzzy subtractive clustering method considers clusters of domestic consumption covering an adequate consumption range. Analysis of different scenarios is presented considering available electric power and electric energy prices. Simulation results are presented and conclusions of the proposed demand response model are discussed. (C) 2016 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Endocrine disrupting chemicals (EDCs) are exogenous agents that have the ability to interfere with/or mimic estrogenic hormones and, therefore can simultaneously and differentially trigger specific signaling pathways responsible for the nature and magnitude of biological responses in diverse cell types. Human exposure to EDCs, particularly at low-doses, is ubiquitous, persistent and occurs in complex mixtures. These compounds can bioaccumulate in lipid compartments of tissues forming a mixed “body burden” of contaminants of different origins. Although the independent action of chemicals has been considered the main principle in EDCs mixture toxicity, several effects cannot be predicted when analyzing single compounds individually. Based in a revision of the literature, focused in studies that evaluated EDCs mixtures, we hypothesize the scenario of a pregnant woman environmentally exposed to three different EDCs as a potential real scenario of human exposure supported by data describing where exposure to these compounds occur.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Post inhibitory rebound is a nonlinear phenomenon present in a variety of nerve cells. Following a period of hyper-polarization this effect allows a neuron to fire a spike or packet of spikes before returning to rest. It is an important mechanism underlying central pattern generation for heartbeat, swimming and other motor patterns in many neuronal systems. In this paper we consider how networks of neurons, which do not intrinsically oscillate, may make use of inhibitory synaptic connections to generate large scale coherent rhythms in the form of cluster states. We distinguish between two cases i) where the rebound mechanism is due to anode break excitation and ii) where rebound is due to a slow T-type calcium current. In the former case we use a geometric analysis of a McKean type model to obtain expressions for the number of clusters in terms of the speed and strength of synaptic coupling. Results are found to be in good qualitative agreement with numerical simulations of the more detailed Hodgkin-Huxley model. In the second case we consider a particular firing rate model of a neuron with a slow calcium current that admits to an exact analysis. Once again existence regions for cluster states are explicitly calculated. Both mechanisms are shown to prefer globally synchronous states for slow synapses as long as the strength of coupling is sufficiently large. With a decrease in the duration of synaptic inhibition both systems are found to break into clusters. A major difference between the two mechanisms for cluster generation is that anode break excitation can support clusters with several groups, whilst slow T-type calcium currents predominantly give rise to clusters of just two (anti-synchronous) populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rigid adherence to pre-specified thresholds and static graphical representations can lead to incorrect decisions on merging of clusters. As an alternative to existing automated or semi-automated methods, we developed a visual analytics approach for performing hierarchical clustering analysis of short time-series gene expression data. Dynamic sliders control parameters such as the similarity threshold at which clusters are merged and the level of relative intra-cluster distinctiveness, which can be used to identify "weak-edges" within clusters. An expert user can drill down to further explore the dendrogram and detect nested clusters and outliers. This is done by using the sliders and by pointing and clicking on the representation to cut the branches of the tree in multiple-heights. A prototype of this tool has been developed in collaboration with a small group of biologists for analysing their own datasets. Initial feedback on the tool has been positive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Autism Spectrum Disorder (ASD) is a neurodevelopmental disorder characterized by deficits in social communication/interaction and by unusual repetitive and restricted behaviors and interests. ASD often co-occurs in the same families with other neuropsychiatric diseases (NPD), such as intellectual disability, schizophrenia, epilepsy, depression and attention deficit hyperactivity disorder. Genetic factors have an important role in ASD etiology. Multiple copy number variants (CNVs) and single nucleotide variants (SNVs) in candidate genes have been associated with an increased risk to develop ASD. Nevertheless, recent heritability estimates and the high genotypic and phenotypic heterogeneity characteristic of ASD indicate a role of environmental and epigenetic factors, such as long noncoding RNA (lncRNA) and microRNA (miRNA), as modulators of genetic expression and further clinical presentation. Both miRNA and lncRNA are functional RNA molecules that are transcribed from DNA but not translated into proteins, instead they act as powerful regulators of gene expression. While miRNA are small noncoding RNAs with 22-25 nucleotides in length that act at the post-transcriptional level of gene expression, the lncRNA are bigger molecules (>200 nucleotides in length) that are capped, spliced, and polyadenylated, similar to messenger RNA. Although few lncRNA were well characterized until date, there is a great evidence that they are implicated in several levels of gene expression (transcription/post-transcription/post-translation, organization of protein complexes, cell– cell signaling as well as recombination) as shown in figure 1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study answers to How scenario analysis could help acquiring companies to reduce uncertainty in the acquisition process? It is due to the mismatch between academic world’s caveat emptor and business world’s eagerness to pursue acquisitions that motivated this study. Acquisitions are as popular as ever, thus, managing the uncertainty surrounding these transactions is relevant. This study creates a generic theoretical model with a strategy-level scope. Thus, the study does not discuss nor does it seek answers to operational issues related in both fields. This study is explorative and constructivist in nature. It discusses briefly the concepts and relatedness of risk and uncertainty and establishes a hierarchy between these two: Risks being a “sub-section” of uncertainty, although not with clear boundaries. Acquisition theory follows the process view that understands acquisitions as a process with various levels – some strategic, some operational. Scenario analysis is presented as tool for management to enrich their strategic discussion and understand their future options. The empirical data collection is done through interviewing. The results are reflected on literature on strategic management, scenario literature, and on a consultancy’s report picturing firm’s strategies in accordance with their acquisition processes. The study has an abductive approach as it tries to combine multiple views and generates discussion between literature review, interviews, the report, and second round of literature. The model suggests three propositions: First, at the strategic decision making level, when the decision whether or not to pursue an acquisition growth strategy has been made, it provides firms new data and enriches the strategic discussion. Second, when the acquisition strategy has been created, it can be applied as a tool to measure possible acquisition targets against the backdrop of the first set of scenarios. Third, due to the scenario analysis’ requirement to include people with various backgrounds and from multiple levels of the corporate hierarchy, it could help managers to avoid biases stemming from hubris.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rise of smart phones, lifelogging devices (e.g. Google Glass) and popularity of image sharing websites (e.g. Flickr), users are capturing and sharing every aspect of their life online producing a wealth of visual content. Of these uploaded images, the majority are poorly annotated or exist in complete semantic isolation making the process of building retrieval systems difficult as one must firstly understand the meaning of an image in order to retrieve it. To alleviate this problem, many image sharing websites offer manual annotation tools which allow the user to “tag” their photos, however, these techniques are laborious and as a result have been poorly adopted; Sigurbjörnsson and van Zwol (2008) showed that 64% of images uploaded to Flickr are annotated with < 4 tags. Due to this, an entire body of research has focused on the automatic annotation of images (Hanbury, 2008; Smeulders et al., 2000; Zhang et al., 2012a) where one attempts to bridge the semantic gap between an image’s appearance and meaning e.g. the objects present. Despite two decades of research the semantic gap still largely exists and as a result automatic annotation models often offer unsatisfactory performance for industrial implementation. Further, these techniques can only annotate what they see, thus ignoring the “bigger picture” surrounding an image (e.g. its location, the event, the people present etc). Much work has therefore focused on building photo tag recommendation (PTR) methods which aid the user in the annotation process by suggesting tags related to those already present. These works have mainly focused on computing relationships between tags based on historical images e.g. that NY and timessquare co-exist in many images and are therefore highly correlated. However, tags are inherently noisy, sparse and ill-defined often resulting in poor PTR accuracy e.g. does NY refer to New York or New Year? This thesis proposes the exploitation of an image’s context which, unlike textual evidences, is always present, in order to alleviate this ambiguity in the tag recommendation process. Specifically we exploit the “what, who, where, when and how” of the image capture process in order to complement textual evidences in various photo tag recommendation and retrieval scenarios. In part II, we combine text, content-based (e.g. # of faces present) and contextual (e.g. day-of-the-week taken) signals for tag recommendation purposes, achieving up to a 75% improvement to precision@5 in comparison to a text-only TF-IDF baseline. We then consider external knowledge sources (i.e. Wikipedia & Twitter) as an alternative to (slower moving) Flickr in order to build recommendation models on, showing that similar accuracy could be achieved on these faster moving, yet entirely textual, datasets. In part II, we also highlight the merits of diversifying tag recommendation lists before discussing at length various problems with existing automatic image annotation and photo tag recommendation evaluation collections. In part III, we propose three new image retrieval scenarios, namely “visual event summarisation”, “image popularity prediction” and “lifelog summarisation”. In the first scenario, we attempt to produce a rank of relevant and diverse images for various news events by (i) removing irrelevant images such memes and visual duplicates (ii) before semantically clustering images based on the tweets in which they were originally posted. Using this approach, we were able to achieve over 50% precision for images in the top 5 ranks. In the second retrieval scenario, we show that by combining contextual and content-based features from images, we are able to predict if it will become “popular” (or not) with 74% accuracy, using an SVM classifier. Finally, in chapter 9 we employ blur detection and perceptual-hash clustering in order to remove noisy images from lifelogs, before combining visual and geo-temporal signals in order to capture a user’s “key moments” within their day. We believe that the results of this thesis show an important step towards building effective image retrieval models when there lacks sufficient textual content (i.e. a cold start).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

No doubt shall be placed when qualifying torture as one of the cruellest crime offences against human beings. It is widely known that the first torture practices go back to the Middle Ages, where torture mechanisms and devices were used as a legitimate means of punishment, extraction of confessions or executions. Brutal techniques such as ‘Judas Cradle’, ‘The Rack’ or the ‘Rat Torture’ were indeed, the ones commonly used. Moreover, some centuries onwards, torture warrants were permitted and authorised by Privy Councils in legislations such as the English one. However, examples like that were the only ones which public accountability was given to, whereas off-the-book practices remained in silence in other countries for long lasting years. Nowadays, in the 21st century, there are innumerable enforced laws and provisions that prohibit the act of torture, to be precise, physical and psychological torture. Nonetheless, not only are these legislations necessary for fighting torture, but also ad hoc courts and specialised committees continuously report the existence of this crime offence.