Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Genes that share transcription factors are biologically driven to show a more likely measurable correlation in their gene expression. No modern method of visualization displays these intricate co-expression and correlation patterns better than a graph. Structural observations about a co-expression graph can reveal the secrets of the biological system that it models, but experimentally validated co-expression...
Many scientific experiments in Bioinformatics are executed as computational workflows. Frequently, it is necessary to re-run an experiment under the original circumstances in which it was run to recognize and validate it. Data provenance concerns the origin of data. Knowing the data source facilitates the understanding and analysis of the results, by detailing and documenting the history and the paths...
In the past two decades, targeted online advertising has led to massive data collection, aggregation, and exchange. This infrastructure raises significant privacy concerns. While several prominent theories of data privacy have been proposed over the same period of time, these notions have limited application to advertising ecosystems. Differential privacy, the most robust of them, is inherently inapplicable...
The emergence of a new paradigm such as ubiquitous or IoT implies that the members of future software systems can vary dynamically, rather than being predetermined according to the purpose of the system. Unlike in the case of the conventional systems, in order to give adaptability to systems that change dynamically, the system rules should be designed and applied considering the dynamic changes of...
In this paper an advanced iris-biometric comparator is presented. In the proposed scheme an analysis of bit-error patterns produced by Hamming distance-based iris-code comparisons is performed. The lengths of sequences of horizontal consecutive mis-matching bits are measured and a frequency distribution is estimated. The difference of the extracted frequency distribution to that of an average genuine...
De-duplication is defined as the technique to eliminate or link duplicate copies of repeating data. We consider a specific de-duplication application where a subject applies for a new passport and we want to check if he possesses a passport already under another name. To determine this, a facial photograph of the subject is compared to all photographs of the national database of passports. We investigate...
Human machine interaction fieldhas potentialapplications in different domainssuch as medicine therapies for vulnerable persons. Thus, allowing the machine to identify and understand emotional states is one of the primordial stages for affective interactivity with Humans. Recent studies have proved that physiological signals contribute to recognize the emotion. In this paper, we aim to classify the...
ElectroCardioGram ECG biometrics has recently been identified as a promising technique to identify subjects. Meanwhile, as ECG related data can reveal other factors like medical disease, the protection of the ECG biometric template is mandatory. The challenge is to guaranty the privacy of the ECG data, while keeping adequate performance results in terms of false acceptance rate and false rejection...
Big-data bioinformatics workflows are usually complex and data-intensive. They need to analyze large volumes of data using one or more analysis tools either from existing datasets or that from the new intermediate datasets generated during the workflow execution. Traditionally, the workflows are executed by moving the data to analysis tools. With the advent of big-data in bioinformatics workflows,...
We studied the problem of classifying textured-materials from their single-imaged appearance, under general viewing and illumination conditions, using the theory of random matrices. To evaluate the performance of our algorithm, two distinct databases of images were used: The CUReT database and our database of colorectal polyp images collected from patients undergoing colon capsule endoscopy for early...
In the field of signal processing, pattern recognition and also modeling and simulation, it is often necessary to use large data sets. These allow reliable, independent and test case spanning development of algorithms or even of complete systems. The data is usually taken from existing data sets such as TIMIT for speech recognition and processing or EPILEPSIAE to develop algorithms for epileptic seizure...
Biometric authentication systems verify the identity of individuals based on what they are. As they are error prone, they can reject genuine individuals or accept impostors. Researchers of the field quantify the quality of their algorithm by benchmarking it on several databases. However, although the standard evaluation metrics state the performance of their system, they are unable to explain the...
Models are the cornerstone of Model-Driven Engineering (MDE). Their size is constantly growing, becoming one of the main problems when it comes to manipulating them, via model-to-model transformations, model-to-text transformations or simply parsing them. In this paper we propose a way of distributing Ecore models representing them as JSON and URLs as identifiers, since HTTP is one of the most successful...
During the last two decades the theory of model transformation has been extensively studied and subject of many research. So far, several transformation languages have been developed and implemented. Recently, a metamodel matching technique has been proposed in order to find mapping models that support the deduction of transformations definitions. The model matching aims at searching semantic similarity...
In building software systems, the integration of tools with the purpose of exchanging data (i.e. tool interoperability) is common practice. Such an integration is one of the application scenarios of Model-Driven Engineering (MDE), which is often called Model-Driven Interoperability (MDI). In the last few years, some MDI approaches have been presented, and they have shown how MDE techniques are useful...
Demand Side Response (DSR) Aggregators play a key intermediary role in facilitating the uptake of DSR services by enabling individual non-domestic end-users to access complex system operator programmes. However, there is limited research on how DSR Aggregators determine the suitability of an end-user site. This research increases the body of knowledge about the Aggregator's role in affecting the adoption...
Mass Spectrometry (Surface Enhanced Laser Desorption Time of Flight (SELDI-TOF) assay technique) for proteomics is based on the consistency and reproducibility of protein/peptide expressions. In this study, we opine that mining collections of mass spectra data instead of detailed study of individual ions generated in the course of Mass Spectrometer assay process, will generate discriminative factors...
Nowadays, news are available ubiquitously in heterogeneous forms, from both offline and online sources. An example of offline news resource includes newspaper which contains only text and pictures. Online news articles have recently emerged to enhance news consuming experiences, such as embedding videos to allow readers to illustrate real situations. However, to read news articles online, users may...
In recent years, several countries have placed strong emphasis on openness, especially open data, which can be shared and further processed into various applications. Based on studies, the majority of open data providers are government organizations. This study presents two cases in which the data providers are companies. The cases are analyzed using a framework for open data based business models...
Oriented graphs belong to a part of Mathematics - Combinatorics called Graph Theory. One of the fundamental terms here is a tree. The tree structures have widespread use not only in Mathematics. They can be used in Decision Theory as data mining tools as well. In the present paper we point out to the use of decision trees as models for financial services, namely, by credit scoring, fraud and churn...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.