Filters








378 Hits in 7.1 sec

Weak factor automata: the failure of failure factor oracles?

Loek Cleophas, Derrick G. Kourie, Bruce W. Watson
2014 South African Computer Journal  
In indexing of, and pattern matching on, DNA and text sequences, it is often important to represent all factors of a sequence. One efficient, compact representation is the factor oracle (FO).  ...  We also empirically compared the use of FOs and FFOs in such backward reading pattern matching algorithms, using both DNA and natural language (English) data sets.  ...  The factor oracle (FO) (and its variations) provides one particular data structure for efficient factor representation [9] .  ... 
doi:10.18489/sacj.v53i0.199 fatcat:quriyhvdevf3hjyyqcx3ulhlwa

Lessons from Biology: Genes, Neurons, Neocortex and the New Computing Model for Cognitive Information Technologies

Rao Mikkilineni
2017 Proceedings (MDPI)  
any physical system using a Universal Turing Machine model.  ...  In this paper we analyze our current understanding of genes, neurons and the neocortex and draw a parallel to current implementations of cognitive computing in Silicon.  ...  He goes on to say "the basic algorithm of the neocortical pattern recognition module is equivalent across the neocortex from "low-level" modules, which deal with the most basic sensory patterns, to "high  ... 
doi:10.3390/is4si-2017-03989 fatcat:iidrmd6fzfgijofz2hyt6ivram

Cyberspace Security Using Adversarial Learning and Conformal Prediction

Harry Wechsler
2015 Intelligent Information Management  
Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns  ...  The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric  ...  Failure to recognize pathogens or subterfuge such as Trojan horses, characteristic of malware, can be fatal. Recognition is continuous and multi-layered.  ... 
doi:10.4236/iim.2015.74016 fatcat:wqiu3pkl6zeurlr3mizdahhgd4

A Kernel Autoassociator Approach to Pattern Classification

H. Zhang, W. Huang, Z. Huang, B. Zhang
2005 IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)  
Autoassociators are a special type of neural networks which, by learning to reproduce a given set of patterns, grasp the underlying concept that is useful for pattern classification.  ...  While conventional nonlinear autoassociation models emphasize searching for the nonlinear representations of input patterns, a kernel autoassociator takes a kernel feature space as the nonlinear manifold  ...  The Glass Recognition data is also acquired from UCL Repository of Machine Learning Databases. The data set contains instances of six types of glasses.  ... 
doi:10.1109/tsmcb.2005.843980 pmid:15971928 fatcat:rue4excouvcmfalpghcwcxh36a

Machine Learning Applications for Therapeutic Tasks with Genomics Data [article]

Kexin Huang, Cao Xiao, Lucas M. Glass, Cathy W. Critchlow, Greg Gibson, Jimeng Sun
2021 arXiv   pre-print
Thanks to the increasing availability of genomics and other biomedical data, many machine learning approaches have been proposed for a wide range of therapeutic discovery and development tasks.  ...  In this survey, we review the literature on machine learning applications for genomics through the lens of therapeutic development.  ...  One of the main factors for this failure is the gap between animal and human biology and physiology. Animal models do not mimic the human disease condition.  ... 
arXiv:2105.01171v1 fatcat:d2nbrjt4tvak7momoxxjlmqk2m

A dynamic overproduce-and-choose strategy for the selection of classifier ensembles

Eulanda M. Dos Santos, Robert Sabourin, Patrick Maupin
2008 Pattern Recognition  
and using it to predict the class of all the samples in the test data set.  ...  proposed method to a static overproduce-and-choose strategy and a classical dynamic classifier selection approach demonstrate that our method outperforms both these selection-based methods, and is also more efficient  ...  Performance is the most obvious of these, since it allows the main objective of pattern recognition, i.e. finding predictors with a high recognition rate, to be achieved.  ... 
doi:10.1016/j.patcog.2008.03.027 fatcat:wuglpp5ojfbbnkukd2zalbx7ku

Text Searching: Theory and Practice [chapter]

Ricardo Baeza-Yates, Gonzalo Navarro
2004 Studies in Fuzziness and Soft Computing  
We survey the relevant techniques in use today for text searching and explore the gap between theoretical and practical algorithms. The main observation is that simpler ideas are better in practice.  ...  We present the state of the art of the main component of text retrieval systems: the search engine. We outline the main lines of research and issues involved.  ...  Construction of the oracle for a string S is rather simple compared to the deterministic suffix automaton. It reminds the construction of the failure transitions for KMP.  ... 
doi:10.1007/978-3-540-39886-8_30 fatcat:wvt7jqjbn5gebjr3depc3uopxq

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
cryptographically secure neural networks for the private classification of 3D templates of users' faces 2) a private Liveness detection mechanism for identification of real human beings 3) a Substrate  ...  All of these implemented technologies have nuances that are crucial for the integrity of the network.  ...  Errors can also occur in the transmission of data or local failures in executing the algorithm and obtaining the results.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
Wireless data broadcast is an efficient way of disseminating data to users in the mobile computing environments.  ...  A Security use of decryption with decryption key stored in RFID tags embedded within ID cards.  ...  useful patterns among the huge set of patterns.  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

Genomic and Proteomic Databases: Foundations, Current Status and Future Applications

Shamkant B. Navathe, Upen Patil, Wei Guan
2007 Journal of Computing Science and Engineering  
Initially we give an overview of the concepts and principles that are fundamental in understanding the basis of the data that has been captured in these databases.  ...  We briefly trace the evolution of biological advances and point out the importance of capturing data about genes, the fundamental building blocks that encode the characteristics of life and proteins that  ...  ACKNOWLEDGMENTS The authors are grateful for the contributions of Ying Liu, Saurav Sahay and Neha Narkhede during the development of this paper. The anonymous referees also provided useful comments.  ... 
doi:10.5626/jcse.2007.1.1.001 fatcat:sawebfga3bfybdibfq3yvhjf5u

Automatic License Plate Recognition using OpenCV

Pratiksha Jain, Neha Chopra, Vaishali Gupta
2014 International Journal of Computer Applications Technology and Research  
Automatic license plate recognition (ALPR) has complex characteristics due to diverse effects such as of light and speed. Most of the ALPR systems are built using proprietary tools like Matlab.  ...  Automatic License Plate Recognition system is a real time embedded system which automatically recognizes the license plate of vehicles.  ...  areas of pattern recognition, computer vision, signal processing, and so on.  ... 
doi:10.7753/ijcatr0312.1001 fatcat:ystj5xcmxnf2hg5fwp2lsvp5ny

Using computable knowledge mined from the literature to elucidate confounders for EHR-based pharmacovigilance [article]

Scott Alexander Malec, Elmer Victor Bernstam, Peng Wei, Trevor Cohen, Richard David Boyce
2020 medRxiv   pre-print
This paper introduces a framework for identifying confounding factors by exploiting literature-derived computable knowledge.  ...  For our knowledge-base, we use SemMedDB, a database of computable knowledge mined from the biomedical literature.  ...  Accurate named entity recognition (NER) is necessary for causal inference because inference requires data representations faithful to the source information.  ... 
doi:10.1101/2020.07.08.20113035 fatcat:symhqu3l25ayjdoxy457del6jq

Functional and structural genomics using PEDANT

D. Frishman, K. Albermann, J. Hani, K. Heumann, A. Metanomski, A. Zollner, H.-W. Mewes
2001 Bioinformatics  
Results: The principal features of PEDANT are: (i) completely automatic processing of data using a wide range of bioinformatics methods, (ii) manual refinement of annotation, (iii) automatic and manual  ...  Using SQL queries, it is possible to correlate a large variety of pre-computed properties of gene products encoded in complete genomes with each other and compare them with data sets of special scientific  ...  ACKNOWLEDGEMENTS We would like to thank Ole Bents and Norman Strack for their assistance with the system software and Birgitta Geier, Friedhelm Pfeiffer, Susanne Stocker and Christian Gruber for many valuable  ... 
doi:10.1093/bioinformatics/17.1.44 pmid:11222261 fatcat:ab7kex426bguhpegx6dfhn42na

How In-memory Technology Can Create Business Value: Insights from the Hilti Case

Jan vom Brocke, Stefan Debortoli, Oliver Müller, Nadine Reuter
2014 Communications of the Association for Information Systems  
large volumes of data or complex data.  ...  data (big data processing) that lead to the second-order effects of advanced business analytics and the convergence of OLTP and OLAP that themselves lead to business value through improved organizational  ...  Second, process mining [van der Aalst, 2012] can use richer log data to identify patterns in process execution that may shed new light on how to manage processes.  ... 
doi:10.17705/1cais.03407 fatcat:6r575sviavbfbckffmfkhxpxza

Genomic Signature Tags (GSTs): A System for Profiling Genomic DNA

J. J. Dunn
2002 Genome Research  
An oligonucleotide adaptor containing a recognition site for MmeI, a type IIS restriction enzyme, is then used to release 21-bp tags from fixed positions in the DNA relative to the sites recognized by  ...  GSTs are shown to be long enough for use as oligonucleotide primers to amplify adjacent segments of the DNA, which can then be sequenced to provide additional nucleotide information or used as probes to  ...  ACKNOWLEDGMENTS We thank Willy Crockett, Kimberly Pellechi, Jutta Paparelli, and Judi Romeo for assistance in DNA sequencing, as well as Keith Thompson for statistical analysis.  ... 
doi:10.1101/gr.306102 pmid:12421763 pmcid:PMC187557 fatcat:s362reus5rcebm4cshr6osi2x4
« Previous Showing results 1 — 15 out of 378 results