983 resultados para Number representation format
Resumo:
Increasing the size of training data in many computer vision tasks has shown to be very effective. Using large scale image datasets (e.g. ImageNet) with simple learning techniques (e.g. linear classifiers) one can achieve state-of-the-art performance in object recognition compared to sophisticated learning techniques on smaller image sets. Semantic search on visual data has become very popular. There are billions of images on the internet and the number is increasing every day. Dealing with large scale image sets is intense per se. They take a significant amount of memory that makes it impossible to process the images with complex algorithms on single CPU machines. Finding an efficient image representation can be a key to attack this problem. A representation being efficient is not enough for image understanding. It should be comprehensive and rich in carrying semantic information. In this proposal we develop an approach to computing binary codes that provide a rich and efficient image representation. We demonstrate several tasks in which binary features can be very effective. We show how binary features can speed up large scale image classification. We present learning techniques to learn the binary features from supervised image set (With different types of semantic supervision; class labels, textual descriptions). We propose several problems that are very important in finding and using efficient image representation.
Resumo:
Theories of sparse signal representation, wherein a signal is decomposed as the sum of a small number of constituent elements, play increasing roles in both mathematical signal processing and neuroscience. This happens despite the differences between signal models in the two domains. After reviewing preliminary material on sparse signal models, I use work on compressed sensing for the electron tomography of biological structures as a target for exploring the efficacy of sparse signal reconstruction in a challenging application domain. My research in this area addresses a topic of keen interest to the biological microscopy community, and has resulted in the development of tomographic reconstruction software which is competitive with the state of the art in its field. Moving from the linear signal domain into the nonlinear dynamics of neural encoding, I explain the sparse coding hypothesis in neuroscience and its relationship with olfaction in locusts. I implement a numerical ODE model of the activity of neural populations responsible for sparse odor coding in locusts as part of a project involving offset spiking in the Kenyon cells. I also explain the validation procedures we have devised to help assess the model's similarity to the biology. The thesis concludes with the development of a new, simplified model of locust olfactory network activity, which seeks with some success to explain statistical properties of the sparse coding processes carried out in the network.
Resumo:
Motivated by a recent claim by Muller et al (2010 Nature 463 926-9) that an atom interferometer can serve as an atom clock to measure the gravitational redshift with an unprecedented accuracy, we provide a representation-free description of the Kasevich-Chu interferometer based on operator algebra. We use this framework to show that the operator product determining the number of atoms at the exit ports of the interferometer is a c-number phase factor whose phase is the sum of only two phases: one is due to the acceleration of the phases of the laser pulses and the other one is due to the acceleration of the atom. This formulation brings out most clearly that this interferometer is an accelerometer or a gravimeter. Moreover, we point out that in different representations of quantum mechanics such as the position or the momentum representation the phase shift appears as though it originates from different physical phenomena. Due to this representation dependence conclusions concerning an enhanced accuracy derived in a specific representation are unfounded.
Resumo:
Bahadur representation and its applications have attracted a large number of publications and presentations on a wide variety of problems. Mixing dependency is weak enough to describe the dependent structure of random variables, including observations in time series and longitudinal studies. This note proves the Bahadur representation of sample quantiles for strongly mixing random variables (including ½-mixing and Á-mixing) under very weak mixing coe±cients. As application, the asymptotic normality is derived. These results greatly improves those recently reported in literature.
Resumo:
Half-Unit-Biased format is based on shifting the representation line of the binary numbers by half Unit in the Last Place. The main feature of this format is that the round to nearest is carried out by a simple truncation, preventing any carry propagation and saving time and area. Algorithms and architectures have been defined for addition/substraction and multiplication operations under this format. Nevertheless, the division operation has not been confronted yet. In this paper we deal with the floating-point division under HUB format, studying the architecture for the digit recurrence method, including the on-the-fly conversion of the signed digit quotient.
Resumo:
Mycobacterium bovis populations in countries with persistent bovine tuberculosis usually show a prevalent spoligotype with a wide geographical distribution. This study applied mycobacterial interspersed repetitive-unit-variable-number tandem-repeat (MIRU-VNTR) typing to a random panel of 115 M. bovis isolates that are representative of the most frequent spoligotype in the Iberian Peninsula, SB0121. VNTR typing targeted nine loci: ETR-A (alias VNTR2165), ETR-B (VNTR2461), ETR-D (MIRU4, VNTR580), ETR-E (MIRU31, VNTR3192), MIRU26 (VNTR2996), QUB11a (VNTR2163a), QUB11b (VNTR2163b), QUB26 (VNTR4052), and QUB3232 (VNTR3232). We found a high degree of diversity among the studied isolates (discriminatory index [D] = 0.9856), which were split into 65 different MIRU-VNTR types. An alternative short-format MIRU-VNTR typing targeting only the four loci with the highest variability values was found to offer an equivalent discriminatory index. Minimum spanning trees using the MIRU-VNTR data showed the hypothetical evolution of an apparent clonal group. MIRU-VNTR analysis was also applied to the isolates of 176 animals from 15 farms infected by M. bovis SB0121; in 10 farms, the analysis revealed the coexistence of two to five different MIRU types differing in one to six loci, which highlights the frequency of undetected heterogeneity.
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
One of the main features of nineteenth-century fiction is the quasi-total disappearance of the epistolary novel that had had its heydays in the previous century. For this reason, some scholars have declared the “death” of the letter in literature after the transitional romantic period. However, Victorian novels overflow with letters that are embedded, quoted in part or described and commented on by narrators or characters. Even when its content is not revealed to the reader, the letter becomes a signifier loaded with meanings, also and particularly so, when it is burnt, torn, hidden, found or buried. The Postal Reform of 1839-40 caused the number of letters sent every year in Britain to grow from 75 to 410 million in only 14 years, and the mediatic campaign that supported it drew the attention of the population to the material aspects concerning this means of communication. Newspapers became more affordable too and they promoted a taste for sensationalism that often involved the “spectacularization” of private correspondence. Starting from an excursus on the history of the letter aimed at identifying the key aspects of the genre, this work deals with some real love correspondences from people belonging to different classes in the period from 1840 to the 1870s, to then analyse their fictional and pictorial counterparts. The general picture that emerges from this analysis is that of a Victorian society where letters were able to break down the boundaries between high and low forms of cultural expressions and where, more than ever, letters were present in people’s everyday lives as well as in the art and literature they enjoyed.
Resumo:
Negative-ion mode electrospray ionization, ESI(-), with Fourier transform ion cyclotron resonance mass spectrometry (FT-ICR MS) was coupled to a Partial Least Squares (PLS) regression and variable selection methods to estimate the total acid number (TAN) of Brazilian crude oil samples. Generally, ESI(-)-FT-ICR mass spectra present a power of resolution of ca. 500,000 and a mass accuracy less than 1 ppm, producing a data matrix containing over 5700 variables per sample. These variables correspond to heteroatom-containing species detected as deprotonated molecules, [M - H](-) ions, which are identified primarily as naphthenic acids, phenols and carbazole analog species. The TAN values for all samples ranged from 0.06 to 3.61 mg of KOH g(-1). To facilitate the spectral interpretation, three methods of variable selection were studied: variable importance in the projection (VIP), interval partial least squares (iPLS) and elimination of uninformative variables (UVE). The UVE method seems to be more appropriate for selecting important variables, reducing the dimension of the variables to 183 and producing a root mean square error of prediction of 0.32 mg of KOH g(-1). By reducing the size of the data, it was possible to relate the selected variables with their corresponding molecular formulas, thus identifying the main chemical species responsible for the TAN values.
Resumo:
The basic reproduction number is a key parameter in mathematical modelling of transmissible diseases. From the stability analysis of the disease free equilibrium, by applying Routh-Hurwitz criteria, a threshold is obtained, which is called the basic reproduction number. However, the application of spectral radius theory on the next generation matrix provides a different expression for the basic reproduction number, that is, the square root of the previously found formula. If the spectral radius of the next generation matrix is defined as the geometric mean of partial reproduction numbers, however the product of these partial numbers is the basic reproduction number, then both methods provide the same expression. In order to show this statement, dengue transmission modelling incorporating or not the transovarian transmission is considered as a case study. Also tuberculosis transmission and sexually transmitted infection modellings are taken as further examples.
Resumo:
Metastasizing pleomorphic adenoma (MPA) is a rare tumour, and its mechanism of metastasis still is unknown. To date, there has been no study on MPA genomics. We analysed primary and secondary MPAs with array comparative genomic hybridization to identify somatic copy number alterations and affected genes. Tumour DNA samples from primary (parotid salivary gland) and secondary (scalp skin) MPAs were subjected to array comparative genomic hybridization investigation, and the data were analysed with NEXUS COPY NUMBER DISCOVERY. The primary MPA showed copy number losses affecting 3p22.2p14.3 and 19p13.3p123, and a complex pattern of four different deletions at chromosome 6. The 3p deletion encompassed several genes: CTNNB1, SETD2, BAP1, and PBRM1, among others. The secondary MPA showed a genomic profile similar to that of the primary MPA, with acquisition of additional copy number changes affecting 9p24.3p13.1 (loss), 19q11q13.43 (gain), and 22q11.1q13.33 (gain). Our findings indicated a clonal origin of the secondary MPA, as both tumours shared a common profile of genomic copy number alterations. Furthermore, we were able to detect in the primary tumour a specific pattern of copy number alterations that could explain the metastasizing characteristic, whereas the secondary MPA showed a more unbalanced genome.
Resumo:
Typical orofacial clefts (OFCs) comprise cleft lip, cleft palate and cleft lip and palate. The complex etiology has been postulated to involve chromosome rearrangements, gene mutations and environmental factors. A group of genes including IRF6, FOXE1, GLI2, MSX2, SKI, SATB2, MSX1 and FGF has been implicated in the etiology of OFCs. Recently, the role of the copy number variations (CNVs) has been studied in genetic defects and diseases. CNVs act by modifying gene expression, disrupting gene sequence or altering gene dosage. The aims of this study were to screen the above-mentioned genes and to investigate CNVs in patients with OFCs. The sample was composed of 23 unrelated individuals who were grouped according to phenotype (associated with other anomalies or isolated) and familial recurrence. New sequence variants in GLI2, MSX1 and FGF8 were detected in patients, but not in their parents, as well as in 200 control chromosomes, indicating that these were rare variants. CNV screening identified new genes that can influence OFC pathogenesis, particularly highlighting TCEB3 and KIF7, that could be further analyzed. The findings of the present study suggest that the mechanism underlying CNV associated with sequence variants may play a role in the etiology of OFC.
Resumo:
The family Malpighiaceae presents species with different habits, fruit types and cytological characters. Climbers are considered the most derived habit, followed, respectively, by the shrubby and arboreal ones. The present study examines the relationship between basic chromosome numbers and the derivation of climbing habit and fruit types in Malpighiaceae. A comparison of all the chromosome number reports for Malpighiaceae showed a predominance of chromosome numbers based on x=5 or 10 in the genera of sub-family Malpighioideae, mainly represented by climbers with winged fruits, whereas non-climbing species with non-winged fruits, which predominate in sub-family Byrsonimoideae, had counts based on x=6, which is considered the less derived basic number for the family. Based on such data, confirmed by statistic assays, and on the monophyletic origin of this family, we admit the hypothesis that morphological derivation of habit and fruit is correlated with chromosome basic number variation in the family Malpighiaceae.
Resumo:
PURPOSE: To determine the association between language and number of citations of ophthalmology articles published in Brazilian journals. METHODS: This study was a systematic review. Original articles were identified by review of documents published at the two Brazilian ophthalmology journals indexed at Science Citation Index Expanded - SCIE [Arquivos Brasileiros de Oftalmologia (ABO) and Revista Brasileira de Oftalmologia (RBO)]. All document types (articles and reviews) listed at SCIE in English (English Group) or in Portuguese (Portuguese Group) from January 1, 2008 to December 31, 2009 were included, except: editorial materials; corrections; letters; and biographical items. The primary outcome was the number of citations through the end of second year after publication date. Subgroup analysis included likelihood of citation (cited at least once versus no citation), journal, and year of publication. RESULTS: The search at the web of science revealed 382 articles [107 (28%) in the English Group and 275 (72%) in the Portuguese Group]. Of those, 297 (77.7%) were published at the ABO and 85 (23.3%) at the RBO. The citation counts were statistically significantly higher (P<0.001) in the English Group (1.51 - SD 1.98 - range 0 to 11) compared with the Portuguese Group (0.57 - SD 1.06 - range 0 to 7). The likelihood citation was statistically significant higher (P<0.001) in the English Group (70/107 - 65.4%) compared with the Portuguese Group (89/275 - 32.7%). There were more articles published in English at the ABO (98/297 - 32.9%) than at the RBO (9/85 - 10.6%) [P<0.001]. There were no significant difference (P=0.967) at the proportion of articles published in English at the years 2008 (48/172 - 27.9%) and 2009 (59/210 - 28.1%). CONCLUSION: The number of citations of articles published in Portuguese at Brazilian ophthalmology journals is lower than the published in English. The results of this study suggest that the editorial boards should strongly encourage the authors to adopt English as the main language in their future articles.
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física