This document analyzes the use of sparse feature analysis for detecting clustered microcalcifications in mammogram images. It compares different feature types, combinations of features, and dictionary construction techniques for sparse representation based classification (SRC) of mammogram images. The experimental results show that texture features like Laws' texture features (LAW) are more effective than shape/morphology features. SRC using LAW features alone or combined with local binary patterns (LBP) achieved high performance. Larger dictionaries containing more atoms resulted in higher discriminative power for the SRC-based detection system.
Towards a 2-dimensional Self-organized Framework for Structured Population-ba...Carlos M. Fernandes
Presentation of the paper "Towards a 2-dimensional Self-organized Framework for Structured Population-based Metaheuristics". IEEE International Congress on Complex Systems, Agadir, Morocco, 2012
Presentation of the paper "Pherogenic Drawings: Generating Colored 2-Dimensional Abstract Representations of Sleep EEG with the KANTS Algorithm". ECTA 2012, Barcelona, Spain.
Towards a 2-dimensional Self-organized Framework for Structured Population-ba...Carlos M. Fernandes
Presentation of the paper "Towards a 2-dimensional Self-organized Framework for Structured Population-based Metaheuristics". IEEE International Congress on Complex Systems, Agadir, Morocco, 2012
Presentation of the paper "Pherogenic Drawings: Generating Colored 2-Dimensional Abstract Representations of Sleep EEG with the KANTS Algorithm". ECTA 2012, Barcelona, Spain.
Modeling XCS in class imbalances: Population sizing and parameter settingskknsastry
This paper analyzes the scalability of the population size required in XCS to maintain niches that are infrequently activated. Facetwise models have been developed to predict the effect of the imbalance ratio—ratio between the number of instances of the majority class and the minority class that are sampled to XCS—on population initialization, and on the creation and deletion of classifiers of the minority class. While theoretical models show that, ideally, XCS scales linearly with the imbalance ratio, XCS with standard configuration scales exponentially.
The causes that are potentially responsible for this deviation from the ideal scalability are also investigated. Specifically, the inheritance procedure of classifiers’ parameters, mutation, and subsumption are analyzed, and improvements in XCS’s mechanisms are proposed to effectively and efficiently handle imbalanced problems. Once the recommendations are incorporated to XCS, empirical results show that the population size in XCS indeed scales linearly with the imbalance ratio.
Substructrual surrogates for learning decomposable classification problems: i...kknsastry
This paper presents a learning methodology based on a substructural classification model to solve decomposable classification problems. The proposed method consists of three important components: (1) a structural model that represents salient interactions between attributes for a given data, (2) a surrogate model which provides a functional approximation of the output as a function of attributes, and (3) a classification model which predicts the class for new inputs. The structural model is used to infer the functional form of the surrogate and its coefficients are estimated using linear regression methods. The classification model uses a maximally-accurate, least-complex surrogate to predict the output for given inputs. The structural model that yields an optimal classification model is searched using an iterative greedy search heuristic. Results show that the proposed method successfully detects the interacting variables in hierarchical problems, group them in linkages groups, and build maximally accurate classification models. The initial results on non-trivial hierarchical test problems indicate that the proposed method holds promise and have also shed light on several improvements to enhance the capabilities of the proposed method.
Key lecture for the EURO-BASIN Training Workshop on Introduction to Statistical Modelling for Habitat Model Development, 26-28 Oct, AZTI-Tecnalia, Pasaia, Spain (www.euro-basin.eu)
Application of Survival Data Analysis- Introduction and Discussion (存活数据分析及应用- 简介和讨论), will give an overview of survival data analysis, including parametric and non-parametric approaches and proportional hazard model, providing a real life example of survival data-based field return analysis. Several common issues in survival data analysis will also be discussed.
Komogortsev Qualitative And Quantitative Scoring And Evaluation Of The Eye Mo...Kalle
This paper presents a set of qualitative and quantitative scores designed to assess performance of any eye movement classification algorithm. The scores are designed to provide a foundation for the eye tracking researchers to communicate about the performance validity of various eye movement classification algorithms. The paper concentrates on the five algorithms in particular: Velocity Threshold Identification (I-VT), Dispersion Threshold Identification (I-DT), Minimum Spanning Tree Identification (MST), Hidden Markov Model Identification (IHMM) and Kalman Filter Identification (I-KF). The paper presents an evaluation of the classification performance of each algorithm in the case when values of the input parameters are varied. Advantages provided by the new scores are discussed. Discussion on what is the "best" classification algorithm is provided for several applications. General recommendations for the selection of the input parameters for each algorithm are
provided.
"These relaxation would take away some of the hardships from small companies. It will help facilitate listing of SMEs," said SMC Capitals equity head Jagannadham Thunuguntla.
Exporter and Supplier of Bike side Stand, Components for Auto Industry 2, Components for Auto Industry 3, Componenets for Auto Industry 5, Machine 5, Wire Uncoler, Machine 2.
Modeling XCS in class imbalances: Population sizing and parameter settingskknsastry
This paper analyzes the scalability of the population size required in XCS to maintain niches that are infrequently activated. Facetwise models have been developed to predict the effect of the imbalance ratio—ratio between the number of instances of the majority class and the minority class that are sampled to XCS—on population initialization, and on the creation and deletion of classifiers of the minority class. While theoretical models show that, ideally, XCS scales linearly with the imbalance ratio, XCS with standard configuration scales exponentially.
The causes that are potentially responsible for this deviation from the ideal scalability are also investigated. Specifically, the inheritance procedure of classifiers’ parameters, mutation, and subsumption are analyzed, and improvements in XCS’s mechanisms are proposed to effectively and efficiently handle imbalanced problems. Once the recommendations are incorporated to XCS, empirical results show that the population size in XCS indeed scales linearly with the imbalance ratio.
Substructrual surrogates for learning decomposable classification problems: i...kknsastry
This paper presents a learning methodology based on a substructural classification model to solve decomposable classification problems. The proposed method consists of three important components: (1) a structural model that represents salient interactions between attributes for a given data, (2) a surrogate model which provides a functional approximation of the output as a function of attributes, and (3) a classification model which predicts the class for new inputs. The structural model is used to infer the functional form of the surrogate and its coefficients are estimated using linear regression methods. The classification model uses a maximally-accurate, least-complex surrogate to predict the output for given inputs. The structural model that yields an optimal classification model is searched using an iterative greedy search heuristic. Results show that the proposed method successfully detects the interacting variables in hierarchical problems, group them in linkages groups, and build maximally accurate classification models. The initial results on non-trivial hierarchical test problems indicate that the proposed method holds promise and have also shed light on several improvements to enhance the capabilities of the proposed method.
Key lecture for the EURO-BASIN Training Workshop on Introduction to Statistical Modelling for Habitat Model Development, 26-28 Oct, AZTI-Tecnalia, Pasaia, Spain (www.euro-basin.eu)
Application of Survival Data Analysis- Introduction and Discussion (存活数据分析及应用- 简介和讨论), will give an overview of survival data analysis, including parametric and non-parametric approaches and proportional hazard model, providing a real life example of survival data-based field return analysis. Several common issues in survival data analysis will also be discussed.
Komogortsev Qualitative And Quantitative Scoring And Evaluation Of The Eye Mo...Kalle
This paper presents a set of qualitative and quantitative scores designed to assess performance of any eye movement classification algorithm. The scores are designed to provide a foundation for the eye tracking researchers to communicate about the performance validity of various eye movement classification algorithms. The paper concentrates on the five algorithms in particular: Velocity Threshold Identification (I-VT), Dispersion Threshold Identification (I-DT), Minimum Spanning Tree Identification (MST), Hidden Markov Model Identification (IHMM) and Kalman Filter Identification (I-KF). The paper presents an evaluation of the classification performance of each algorithm in the case when values of the input parameters are varied. Advantages provided by the new scores are discussed. Discussion on what is the "best" classification algorithm is provided for several applications. General recommendations for the selection of the input parameters for each algorithm are
provided.
"These relaxation would take away some of the hardships from small companies. It will help facilitate listing of SMEs," said SMC Capitals equity head Jagannadham Thunuguntla.
Exporter and Supplier of Bike side Stand, Components for Auto Industry 2, Components for Auto Industry 3, Componenets for Auto Industry 5, Machine 5, Wire Uncoler, Machine 2.
Clustering chemical structures alleviates the tedious task of browsing a large set of compounds by grouping individual structures into generic categories. ChemAxon's JKlustor product offers clustering solutions ranging from similarity based non-hierarchical method to a pure graph based technique. This latter exhibits some clear advantages over the more conventional approaches: clusters are more likely to meet human expectations and tangible explanation why certain compounds are grouped together is also produced. And even it is faster. If you 'farm your classes' then it's time to 'MCS your library'!
Latest developments are here: http://www.chemaxon.com/product/jklustor.html
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...IDES Editor
The findings of recent studies are showing strong
evidence to the fact that some aspects of biogeography can be
applied to solve specific problems in science and engineering.
The proposed work presents a hybrid biologically inspired
technique that can be adapted according to the database of
expert knowledge for a more focused satellite image
classification. The paper also presents a comparative study of
our hybrid intelligent classifier with the other recent Soft
Computing Classifiers such as ACO, Hybrid Particle Swarm
Optimization-cAntMiner (PSO-ACO2), Fuzzy sets, Rough-
Fuzzy Tie up and the Semantic Web Based Classifiers and
the traditional probabilistic classifiers such as the Minimum
Distance to Mean Classifier (MDMC) and the Maximum
Likelihood Classifier (MLC).
Overview of the CDISC2RDF ontologies and a first overview of the import/transformation for standards-as-is into machine processable OWL/RDF. See also http://cdisc2rdf.com/
Validation of Spacecraft Behaviour Using a Collaborative ApproachDaniele Gianni
Presentation delivered at the 3rd IEEE Track on
Collaborative Modeling & Simulation - CoMetS'12.
Please see http://www.sel.uniroma2.it/comets12/ for further details.
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Wesley De Neve
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional neural networks. Paper presented at the Workshop on Computational Biology at the International Conference on Machine Learning, Long Beach, USA, 2019.
Investigating the biological relevance in trained embedding representations o...Wesley De Neve
Investigating the biological relevance in trained embedding representations of protein sequences. Paper presented at the Workshop on Computational Biology at the International Conference on Machine Learning, Long Beach, USA, 2019.
Towards reading genomic data using deep learning-driven NLP techniquesWesley De Neve
Towards reading genomic data using deep learning-driven NLP techniques. Slides presented at BIOINFO 2016 – Precision Bioinformatics & Machine Learning.
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Wesley De Neve
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to Smart Farming. Presentation given at the Korea-Europe International Conference on the 4th Industry Revolution.
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Wesley De Neve
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Target Interaction and DNA Analysis.
Poster presented at the BIG N2N Symposium 2016.
Towards using multimedia technology for biological data processingWesley De Neve
Towards using multimedia technology for biological data processing.
Presentation given during the Ghent University Global Campus (GUGC) Research Seminar on 19/1/2014.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Pushing the limits of ePRTC: 100ns holdover for 100 days
Sparse feature analysis for detection of clustered microcalcifications in mammogram images
1. SPARSE FEATURE ANALYSIS FOR DETECTION OF CLUSTERED
MICROCALCIFICATIONS IN MAMMOGRAM IMAGES
Wonyong Eom, Wesley De Neve, and Yong Man Ro
Image and Video Systems Lab
Korea Advanced Institute of Science and Technology (KAIST)
Daejeon, South Korea
e-mail: ymro@ee.kaist.ac.kr website: http://ivylab.kaist.ac.kr
- Features
I. INTRODUCTION Table. 1. Feature types and dimensionality
- Observation Features Dimension
• Computer-aided detection (CADe) of clustered microcalcifications First Order Statistics (FOS) 16
(MCs) in mammogram image is one of the most effective tools for Rotation Invariant Moment (RIM) 16
detecting early-stage breast cancer. Spatial Gray Level Difference (SGLD) 52
Gray Level Run Length (GLRL) 20
• A number of CADe systems have recently introduced the use of
Laws’ Texture Features (LAW) 250
sparse representation based classification (SRC). Uniform Local Binary Patterns (LBP) 118
- Problem statement
- Evaluation
- Few attempts have thus far been made to achieve an in-depth
• the area under the ROC curve (AUC)
understanding of the influence of SRC on the effectiveness of these
• the sparsity concentration of the true class (SCTC)
CADe systems.
- Contributions δ T ( x) 1
SCTC (x) = ∈ [0, 1],
- We compare and analyze the influence of commonly used features, x1
different feature combinations and different dictionary construction
where x represents the sparse coefficient vector, and where δT
techniques on the effectiveness of an SRC-based CADe systems.
denotes the true class part of x
2. Feature comparison
II. METHOD Table. 2. Effectiveness of SRC-based detection of MC according the feature used
1. Dictionary construction Feature AUC SCTC
FOS 0.8885 0.7923
f1 RIM 0.8546 0.7855
SGLD 0.8986 0.8011
GLRL 0.8814 0.7891
…
f
[[
Feature LAW 0.9403 0.8402
f 2 normalization/
…
Feature
…
ROI LBP 0.9322 0.8168
detection extraction concatenation
…
… 3. Feature combination comparison
…
…
… … Table. 3. Effectiveness of SRC-based detection of MCs according to the feature
…
ROI combination used
fi
Feature Combination AUC SCTC
…
…
FOS+RIM 0.9047 0.8112
…
Mammogram
Dictionary SGLD+GLRL+LAW+LBP 0.9374 0.8324
Fig. 1. Creating a dictionary of image features FOS+LAW 0.9326 0.8315
2. Sparse representation based classification LAW+LBP 0.9483 0.8392
All features 0.9525 0.8401
Malignant Normal 4. Effectiveness of dictionary size
ROIs ROIs - We gradually reduced the number of dictionary atoms from 90% of the
available samples to 50% of the available samples.
- This implied that smaller dictionaries were subsets of larger dictionaries.
Feature extraction Test sample Dictionary Sparse
coefficient
- We made use of Laws’ texture feature.
vector
Residual for Residual for
malignant ROI normal ROI
Dictionary
Classify as
Fig. 2. Sparse representation based classification method
III. EXPERIMENTS
1. Experimental setup
- Dataset
• We made use of 180 malignancy-containing X-ray images randomly
taken from the Digital Database for Screening Mammography(DDSM).
• From these images, we obtain 434 malignant ROIs and 2556 normal Fig. 3. Different ROC curves according to the number of dictionary atoms
tissue region using a contrast-based method for candidate region IV. CONCLUSIONS
detection.
- Our experimental results show that the use of texture features is more
• We used 10 percent of the positive samples and 10 percent of the
effective than the use of shape and morphology features.
negative samples for the purpose of testing, while the remaining
- SRC based MCs detection with LAW and the combination LAW+LBP is
samples were used for the purpose of dictionary construction. We
highly promising.
repeated this ten times with different test sets, and then averaged
- Our experimental results show that the more atoms in the dictionary,
the results obtained for each run in order to compute the final
the higher the discriminative power of SRC-based CADe system.
results.
International Forum on Medical Imaging in Asia (IFMIA), November 2012, Daejeon(Korea)