349,043 research outputs found
Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database
In this paper we present a novel architecture for storing visual data.
Effective storing, browsing and searching collections of images is one of the
most important challenges of computer science. The design of architecture for
storing such data requires a set of tools and frameworks such as SQL database
management systems and service-oriented frameworks. The proposed solution is
based on a multi-layer architecture, which allows to replace any component
without recompilation of other components. The approach contains five
components, i.e. Model, Base Engine, Concrete Engine, CBIR service and
Presentation. They were based on two well-known design patterns: Dependency
Injection and Inverse of Control. For experimental purposes we implemented the
SURF local interest point detector as a feature extractor and -means
clustering as indexer. The presented architecture is intended for content-based
retrieval systems simulation purposes as well as for real-world CBIR tasks.Comment: Accepted for the 14th International Conference on Artificial
Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Polan
A Tutorial on Bayesian Nonparametric Models
A key problem in statistical modeling is model selection, how to choose a
model at an appropriate level of complexity. This problem appears in many
settings, most prominently in choosing the number ofclusters in mixture models
or the number of factors in factor analysis. In this tutorial we describe
Bayesian nonparametric methods, a class of methods that side-steps this issue
by allowing the data to determine the complexity of the model. This tutorial is
a high-level introduction to Bayesian nonparametric methods and contains
several examples of their application.Comment: 28 pages, 8 figure
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
A graph-based mathematical morphology reader
This survey paper aims at providing a "literary" anthology of mathematical
morphology on graphs. It describes in the English language many ideas stemming
from a large number of different papers, hence providing a unified view of an
active and diverse field of research
ABCD Neurocognitive Prediction Challenge 2019: Predicting individual fluid intelligence scores from structural MRI using probabilistic segmentation and kernel ridge regression
We applied several regression and deep learning methods to predict fluid
intelligence scores from T1-weighted MRI scans as part of the ABCD
Neurocognitive Prediction Challenge (ABCD-NP-Challenge) 2019. We used voxel
intensities and probabilistic tissue-type labels derived from these as features
to train the models. The best predictive performance (lowest mean-squared
error) came from Kernel Ridge Regression (KRR; ), which produced a
mean-squared error of 69.7204 on the validation set and 92.1298 on the test
set. This placed our group in the fifth position on the validation leader board
and first place on the final (test) leader board.Comment: Winning entry in the ABCD Neurocognitive Prediction Challenge at
MICCAI 2019. 7 pages plus references, 3 figures, 1 tabl
Al-Qaeda in Gaza: isolating âthe baseâ
In 1996, Osama bin Laden declared jihad against the American forces occupying Saudi Arabia, calling for Muslims to expel the infidels from the âland of the two holy places.â The first sacred ground mentioned in this statement, however, was not Saudi Arabia but Palestine. His words seething with hatred, bin Laden scorned the Arab regimes for failing to recapture Jerusalem and described the situation as a festering wound upon the Islamic umma.[1] Fourteen years later, even after orchestrating devastating attacks in three Western capitals, Bin Ladenâs al-Qaeda is still unable to do much against Israel besides issuing scathing diatribes. Its most vigorous efforts to establish itself in the Palestinian arena have been in the Gaza Strip. Here, however, al-Qaeda-linked groups are stymied by a perhaps surprising adversary: Hamas. But despite Hamasâs efforts to suppress them, Salafi-jihadi groups maintain an underground presence. Even if al-Qaeda affiliates remain weak operationally in comparison to Hamas, al-Qaedaâs ideology of global jihad seems to be on the rise in Gaza. Meanwhile, the al-Qaeda leadership is relentless in pursuing new and ingenious ways for its agents to penetrate the Strip. A Hamas weakened by a tightened blockade or another war with Israel would leave an opening for Salafi-jihadi militants. The prospect of these al-Qaeda-linked factions upsetting a fragile peace needs to be considered among the many other factors relevant to engagement with Hamas.Publisher PD
- âŠ