5,390 Hits in 5.4 sec

Inferencing Human Spatiotemporal Mobility in Greater Maputo via Mobile Phone Big Data Mining

Mohamed Batran, Mariano Mejia, Hiroshi Kanasugi, Yoshihide Sekimoto, Ryosuke Shibasaki
2018 ISPRS International Journal of Geo-Information  
We adopted some of the techniques used and proven in these studies to demonstrate the mining of mobile phone big data to extract meaningful information for understanding the daily mobility of people in  ...  This paper proposes a method based on proven techniques to extract the origin-destination (OD) trips from the raw CDR data of mobile phone users and process the data to capture the mobility of those users  ...  Acknowledgments: The authors gratefully acknowledge Instituto Nacional das Comunicações de Moçambique (INCM) and Mozambique Road Fund for facilitating CDR data acquisition used in this study.  ... 
doi:10.3390/ijgi7070259 fatcat:cv4d476b75gg3jcz4yvlv6a2p4

Tensor-Based CUDA Optimization for ANN Inferencing Using Parallel Acceleration on Embedded GPU [chapter]

Ahmed Khamis Abdullah Al Ghadani, Waleeja Mateen, Rameshkumar G. Ramaswamy
2020 IFIP Advances in Information and Communication Technology  
Thus, efficient techniques in ANN inferencing are required for real-time performance.  ...  Furthermore, the current CUDA model and TensorRT optimization techniques are studied, comments are made on its implementation for inferencing, and improvements are proposed based on the results acquired  ...  This can be seen in examples like [12] open source GPU-Accelerated feature extraction tool and Bonnet framework for semantic segmentation in robotics [13] .  ... 
doi:10.1007/978-3-030-49161-1_25 fatcat:kijobfe7j5bv7cca57rcluqgd4

Modular ontology techniques and their applications in the biomedical domain

Jyotishman Pathak, Thomas M. Johnson, Christopher G. Chute
2008 2008 IEEE International Conference on Information Reuse and Integration  
We analyze and compare how such approaches can be leveraged in developing tools and applications in the biomedical domain.  ...  Toward this end, a growing body of work is emerging in the area of modular ontologies where the emphasis is on either extracting and managing "modules" of an ontology relevant to a particular application  ...  The crux of the technique is to divide an ontology into two mutually exclusive parts, visible and hidden, and answering queries by inferencing on both the visible and hidden parts, however at the same  ... 
doi:10.1109/iri.2008.4583056 pmid:21625409 pmcid:PMC3101570 dblp:conf/iri/PathakJC08 fatcat:kcxx3f4dovafzhxy57yzxspcqe

Slicing knowledge-based systems: techniques and applications

W.W. Vasconcelos, M.A.T. Aragão
2000 Knowledge-Based Systems  
We have adapted and extended slicing techniques originally proposed for procedural languages, to knowledge-based systems.  ...  Our techniques comprise a representation proposal for the successful and failed inferences performed by the system, a means to detect and represent the dependences among parts of the system, a formal de  ...  The ®rst author was partially sponsored by CNPq (Brazilian National Research Council) initially under grant no. 352850/96-5 and later on by Post-Doctoral grant 201340/91-7.  ... 
doi:10.1016/s0950-7051(00)00058-7 fatcat:57naqgsaivapzmznaw56hi7mm4

Applications of Soft Computing Techniques for Pulmonary Tuberculosis Diagnosis

2019 International journal of recent technology and engineering  
Different Soft computing techniques or approaches have been applied in medical care data for effective diagnosis prediction.  ...  Therefore, the diagnosis of tuberculosis still requires further improvements to new rapid and accurate diagnostic model and techniques that enable higher sensitivity and specificity to be achieved, thus  ...  In conventional neural system application such information are designated "highlights".  ... 
doi:10.35940/ijrte.c1020.1083s219 fatcat:shhgmex2tzebpnnuqzahf5fpnu

Image Reconstruction from Contrast Information

Asim A. Khwaja, Roland Goecke
2008 2008 Digital Image Computing: Techniques and Applications  
The paper provides a novel approach to manipulating an image in its contrast domain. Digital Image Computing: Techniques and Applications 978-0-7695-3456-5/08 $25.00  ...  The solution is neuro-physiologically inspired, where the retinal cells, for the most part, transfer only the contrast information to the cortex, which at some stage performs reconstruction for perception  ...  Bayesian Inferencing has become a popular tool lately in image processing and computer vision, partially because vision [5] now is believed by some to be a Bayesian inferencing process [11] .  ... 
doi:10.1109/dicta.2008.66 dblp:conf/dicta/KhwajaG08 fatcat:5s2byokb4reixnlilnal4oz5qu

Inferencing in information retrieval

Alexa T. McCray
1992 Proceedings of the workshop on Speech and Natural Language - HLT '91   unpublished
in information retrieval.  ...  The purpose of the investigation has been to determine the type of information that is required in order to effect a map between the language of queries and the language of relevant documents. 1During  ...  in order to test the extent to which NLP techniques may improve information retrieval.  ... 
doi:10.3115/1075527.1075575 fatcat:nv2cgfunzzcyba6qsvobnqwf64

Survey of modular ontology techniques and their applications in the biomedical domain

Jyotishman Pathak, Thomas M. Johnson, Christopher G. Chute, S.H. Rubin, S.-C. Chen
2009 Integrated Computer-Aided Engineering  
We analyze and compare how such approaches can be leveraged in developing tools and applications in the biomedical domain.  ...  Toward this end, a growing body of work is emerging in the area of modular ontologies where the emphasis is on either extracting and managing "modules" of an ontology relevant to a particular application  ...  Acknowledgments The authors would like to thank Jesse Erdmann for his assistance and participation in numerous discussions leading to this work.  ... 
doi:10.3233/ica-2009-0315 pmid:21686030 pmcid:PMC3113511 fatcat:pzy4wpoepndvlhi6jwt3qyurgm

Applications of Semantic Web Methodologies and Techniques to Social Networks and Social Websites [chapter]

Sheila Kinsella, John G. Breslin, Alexandre Passant, Stefan Decker
2008 Lecture Notes in Computer Science  
for representing and navigating the content items in these sites: both within and across social websites.  ...  This requires representation mechanisms to interconnect people and objects on the Social Web in an interoperable and extensible way.  ...  ) techniques 2 .  ... 
doi:10.1007/978-3-540-85658-0_5 fatcat:jmn3vzcxencuba2zfhnlx5ek7m

Applying Formal Methods to Networking: Theory, Techniques, and Applications

Junaid Qadir, Osman Hasan
2015 IEEE Communications Surveys and Tutorials  
In this paper, we present a self-contained tutorial of the formidable amount of work that has been done in formal methods, and present a survey of its applications to networking.  ...  This has also led to a great resurgence in interest of applying formal methods to specification, verification, and synthesis of networking protocols and applications.  ...  of formal methods and techniques and learn about their applications in the context of networking.  ... 
doi:10.1109/comst.2014.2345792 fatcat:oc6l6pn4tnddjbbr5v4gbbuycq

The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis

George Markowsky, Oleg Savenko, Sergii Lysenko, Andrii Nicheporuk
2018 International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications  
The obfuscation features were obtained on the basis of the equivalent functional block search in the suspicious program and its modified version.  ...  research demonstrated that the efficiency of metamorphic viruses detection based on the proposed obfuscation quantitative features depends on the choice of the similarity metric at the stages of the search and  ...  Let us take a closer look at each step of the technique. In order to detect metamorphic viruses the main stage is the obfuscation features extraction.  ... 
dblp:conf/icteri/MarkowskySLN18 fatcat:smtwukkfnfaubamua6qf53qjza

Real-time tool condition monitoring using wavelet transforms and fuzzy techniques

Jun Wang, Shiu Kit Tso, Xiaoli Li
2000 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
His main areas of research are manufacturing process monitoring, machining error compensation, fuzzy systems, neural networks, and wavelet transform and its applications.  ...  He has carried out research in the broad field of industrial electronics and automation and control and supervised numerous Ph.D., M.Phil., and M.Sc. students.  ...  Recently, wavelet transforms (WT) has provided a significant new technique in signal processing, because it offers solutions in the time-frequency domain and is able to extract more information in the  ... 
doi:10.1109/5326.885116 fatcat:kudco6xtzncxlprhubpps7de7q

A Survey on Heterogeneous Graph Embedding: Methods, Techniques, Applications and Sources [article]

Xiao Wang and Deyu Bo and Chuan Shi and Shaohua Fan and Yanfang Ye and Philip S. Yu
2020 arXiv   pre-print
In addition, we further present several widely deployed systems that have demonstrated the success of HG embedding techniques in resolving real-world application problems with broader impacts.  ...  In this survey, we perform a comprehensive review of the recent development on HG embedding methods and techniques.  ...  These two reasons are important for the real-world applications. However, they still suffer from the huge time costing in inferencing and retraining.  ... 
arXiv:2011.14867v1 fatcat:phfoxj7qsrfshfednomeok7pau

Expert System in Enhancing Efficiency in Basic Educational Management using Data Mining Techniques

Fuseini Inusah, Yaw Marfo Missah, Najim Ussiph, Frimpong Twum
2021 International Journal of Advanced Computer Science and Applications  
prediction. systems stressed on documenting and reporting extracted Rule based inferencing is to be used in the expert system to knowledge for successful application of practical data mining  ...  The former refers to the data mining mining techniques to extract the information from already task that tends to give a general description of the information existing information of  ... 
doi:10.14569/ijacsa.2021.0121148 fatcat:z6g46vpxkngjvas6ue54e4tnia

Unsupervised Long-Term Routine Modelling Using Dynamic Bayesian Networks

Yangdi Xu, David Bull, Dima Damen
2017 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA)  
to obtain clean silhouettes using our own customised background subtraction technique(result shown in sec IV-B).  ...  Since our proposed model is a dynamic model with full observations, we use the junction tree inference engine together with Expectation Maximisation (EM) for inferencing and parameter tuning.  ... 
doi:10.1109/dicta.2017.8227502 dblp:conf/dicta/XuBD17 fatcat:6doozo2slfeexcx7unl6pzovda
« Previous Showing results 1 — 15 out of 5,390 results