130 research outputs found

    Accelerating Metric Filtering by Improving Bounds on Estimated Distances

    Get PDF
    Filtering is a fundamental strategy of metric similarity indexes to minimise the number of computed distances. Given a triple of objects for which distances of two pairs are known, the lower and upper bounds on the third distance can be set as the difference and the sum of these two already known distances, due to the triangle inequality rule of the metric space. For efficiency reasons, the tightness of bounds is crucial, but as angles within triangles of distances can be arbitrary, the worst case with zero and straight angles must also be considered for correctness. However, in data of real-life applications, the distribution of possible angles is skewed and extremes are very unlikely to occur. In this paper, we enhance the existing definition of bounds on the unknown distance with information about possible angles within triangles. We show that two lower bounds and one upper bound on each distance exist in case of limited angles. We analyse their filtering power and confirm high improvements of efficiency by experiments on several real-life datasets

    Detecting Advanced Network Threats Using a Similarity Search

    Get PDF
    In this paper, we propose a novel approach for the detection of advanced network threats. We combine knowledge-based detections with similarity search techniques commonly utilized for automated image annotation. This unique combination could provide effective detection of common network anomalies together with their unknown variants. In addition, it offers a similar approach to network data analysis as a security analyst does. Our research is focused on understanding the similarity of anomalies in network traffic and their representation within complex behaviour patterns. This will lead to a proposal of a system for the realtime analysis of network data based on similarity. This goal should be achieved within a period of three years as a part of a PhD thesis

    Mass independence and asymmetry of the reaction: Multi-fragmentation as an example

    Full text link
    We present our recent results on the fragmentation by varying the mass asymmetry of the reaction between 0.2 and 0.7 at an incident energy of 250 MeV/nucleon. For the present study, the total mass of the system is kept constant (ATOT = 152) and mass asymmetry of the reaction is defined by the asymmetry parameter (? = | (AT - AP)/(AT + AP) |). The measured distributions are shown as a function of the total charge of all projectile fragments, Zbound. We see an interesting outcome for rise and fall in the production of intermediate mass fragments (IMFs) for large asymmetric colliding nuclei. This trend, however, is completely missing for large asymmetric nuclei. Therefore, experiments are needed to verify this prediction

    Knowledge is at the Edge! How to Search in Distributed Machine Learning Models

    Full text link
    With the advent of the Internet of Things and Industry 4.0 an enormous amount of data is produced at the edge of the network. Due to a lack of computing power, this data is currently send to the cloud where centralized machine learning models are trained to derive higher level knowledge. With the recent development of specialized machine learning hardware for mobile devices, a new era of distributed learning is about to begin that raises a new research question: How can we search in distributed machine learning models? Machine learning at the edge of the network has many benefits, such as low-latency inference and increased privacy. Such distributed machine learning models can also learn personalized for a human user, a specific context, or application scenario. As training data stays on the devices, control over possibly sensitive data is preserved as it is not shared with a third party. This new form of distributed learning leads to the partitioning of knowledge between many devices which makes access difficult. In this paper we tackle the problem of finding specific knowledge by forwarding a search request (query) to a device that can answer it best. To that end, we use a entropy based quality metric that takes the context of a query and the learning quality of a device into account. We show that our forwarding strategy can achieve over 95% accuracy in a urban mobility scenario where we use data from 30 000 people commuting in the city of Trento, Italy.Comment: Published in CoopIS 201

    Liquid-Drop Model and Quantum Resistance Against Noncompact Nuclear Geometries

    Get PDF
    The importance of quantum effects for exotic nuclear shapes is demonstrated. Based on the example of a sheet of nuclear matter of infinite lateral dimensions but finite thickness, it is shown that the quantization of states in momentum space, resulting from the confinement of the nucleonic motion in the conjugate geometrical space, generates a strong resistance against such a confinement and generates restoring forces driving the system towards compact geometries. In the liquid-drop model, these quantum effects are implicitly included in the surface energy term, via a choice of interaction parameters, an approximation that has been found valid for compact shapes, but has not yet been scrutinized for exotic shapes.Comment: 9 pages with 3 figure

    Techniques for Complex Analysis of Contemporary Data

    Get PDF
    Contemporary data objects are typically complex, semi-structured, or unstructured at all. Besides, objects are also related to form a network. In such a situation, data analysis requires not only the traditional attribute-based access but also access based on similarity as well as data mining operations. Though tools for such operations do exist, they usually specialise in operation and are available for specialized data structures supported by specific computer system environments. In contrary, advance analyses are obtained by application of several elementary access operations which in turn requires expert knowledge in multiple areas. In this paper, we propose a unification platform for various data analytical operators specified as a general-purpose analytical system ADAMiSS. An extensible data-mining and similarity-based set of operators over a common versatile data structure allow the recursive application of heterogeneous operations, thus allowing the definition of complex analytical processes, necessary to solve the contemporary analytical tasks. As a proof-of-concept, we present results that were obtained by our prototype implementation on two real-world data collections: the Twitter Higg's boson and the Kosarak datasets

    Ratio of shear viscosity to entropy density in multifragmentation of Au + Au

    Full text link
    The ratio of the shear viscosity (η\eta) to entropy density (ss) for the intermediate energy heavy-ion collisions has been calculated by using the Green-Kubo method in the framework of the quantum molecular dynamics model. The theoretical curve of η/s\eta/s as a function of the incident energy for the head-on Au+Au collisions displays that a minimum region of η/s\eta/s has been approached at higher incident energies, where the minimum η/s\eta/s value is about 7 times Kovtun-Son- Starinets (KSS) bound (1/4π\pi). We argue that the onset of minimum η/s\eta/s region at higher incident energies corresponds to the nuclear liquid gas phase transition in nuclear multifragmentation.Comment: 6 pages, 8 figure

    Visual Image Search: Feature Signatures or/and Global Descriptors

    Get PDF
    The success of content-based retrieval systems stands or falls with the quality of the utilized similarity model. In the case of having no additional keywords or annotations provided with the multimedia data, the hard task is to guarantee the highest possible retrieval precision using only content-based retrieval techniques. In this paper we push the visual image search a step further by testing effective combination of two orthogonal approaches – the MPEG-7 global visual descriptors and the feature signatures equipped by the Signature Quadratic Form Distance. We investigate various ways of descriptor combinations and evaluate the overall effectiveness of the search on three different image collections. Moreover, we introduce a new image collection, TWIC, designed as a larger realistic image collection providing ground truth. In all the experiments, the combination of descriptors proved its superior performance on all tested collections. Furthermore, we propose a re-ranking variant guaranteeing efficient yet effective image retrieval
    • …
    corecore