269 research outputs found
Integrated Chest Image Analysis System "BU-MIA"
We introduce "BU-MIA," a Medical Image Analysis system that integrates various advanced chest image analysis methods for detection, estimation, segmentation, and registration. BU-MIA evaluates repeated computed tomography (CT) scans of the same patient to facilitate identification and evaluation of pulmonary nodules for interval growth. It provides a user-friendly graphical user interface with a number of interaction tools for development, evaluation, and validation of chest image analysis methods. The structures that BU-MIA processes include the thorax, lungs, and trachea, pulmonary structures, such as lobes, fissures, nodules, and vessels, and bones, such as sternum, vertebrae, and ribs
Recommended from our members
Semi-automatic assessment of I/O behavior by inspecting the individual client-node timelines— an explorative study on 10^6 jobs
HPC applications with suboptimal I/O behavior interfere
with well-behaving applications and lead to increased application runtime. In some cases, this may even lead to unresponsive systems and unfinished jobs. HPC monitoring systems can aid users and support staff to identify problematic behavior and support optimization of problematic applications. The key issue is how to identify relevant applications? A profile of an application doesn’t allow to identify problematic phases during the execution but tracing of each individual I/O is too invasive.
In this work, we split the execution into segments, i.e., windows of fixed size and analyze profiles of them. We develop three I/O metrics to identify three relevant classes of inefficient I/O behaviors, and evaluate them on raw data of 1,000,000 jobs on the supercomputer Mistral. The advantages of our method is that temporal information about I/O activities during job runtime is preserved to some extent and can be used to identify phases of inefficient I/O.
The main contribution of this work is the segmentation of time series and computation of metrics (Job-I/O-Utilization, Job-I/O-Problem-Time, and Job-I/O-Balance) that are effective to identify problematic I/O phases and jobs
Partitioning the triangles of the cross polytope into surfaces
We present a constructive proof that there exists a decomposition of the
2-skeleton of the k-dimensional cross polytope into closed surfaces
of genus , each with a transitive automorphism group given by the
vertex transitive -action on . Furthermore we show
that for each the 2-skeleton of the (k-1)-simplex is a union
of highly symmetric tori and M\"obius strips.Comment: 13 pages, 1 figure. Minor update. Journal-ref: Beitr. Algebra Geom. /
Contributions to Algebra and Geometry, 53(2):473-486, 201
Collaborative Delivery with Energy-Constrained Mobile Robots
We consider the problem of collectively delivering some message from a
specified source to a designated target location in a graph, using multiple
mobile agents. Each agent has a limited energy which constrains the distance it
can move. Hence multiple agents need to collaborate to move the message, each
agent handing over the message to the next agent to carry it forward. Given the
positions of the agents in the graph and their respective budgets, the problem
of finding a feasible movement schedule for the agents can be challenging. We
consider two variants of the problem: in non-returning delivery, the agents can
stop anywhere; whereas in returning delivery, each agent needs to return to its
starting location, a variant which has not been studied before.
We first provide a polynomial-time algorithm for returning delivery on trees,
which is in contrast to the known (weak) NP-hardness of the non-returning
version. In addition, we give resource-augmented algorithms for returning
delivery in general graphs. Finally, we give tight lower bounds on the required
resource augmentation for both variants of the problem. In this sense, our
results close the gap left by previous research.Comment: 19 pages. An extended abstract of this paper was published at the
23rd International Colloquium on Structural Information and Communication
Complexity 2016, SIROCCO'1
Lattice-point enumerators of ellipsoids
Minkowski's second theorem on successive minima asserts that the volume of a
0-symmetric convex body K over the covolume of a lattice \Lambda can be bounded
above by a quantity involving all the successive minima of K with respect to
\Lambda. We will prove here that the number of lattice points inside K can also
accept an upper bound of roughly the same size, in the special case where K is
an ellipsoid. Whether this is also true for all K unconditionally is an open
problem, but there is reasonable hope that the inductive approach used for
ellipsoids could be extended to all cases.Comment: 9 page
Outbreak of tropical rat mite (Ornithonyssus bacoti) dermatitis in a home for disabled persons
Five mentally handicapped individuals living in a home for disabled persons in Southern Germany were seen in our outpatient department with pruritic, red papules predominantly located in groups on the upper extremities, neck, upper trunk and face. Over several weeks 40 inhabitants and 5 caretakers were affected by the same rash. Inspection of their home and the sheds nearby disclosed infestation with rat populations and mites. Finally the diagnosis of tropical rat mite dermatitis was made by the identification of the arthropod Ornithonyssus bacoti or so-called tropical rat mite. The patients were treated with topical corticosteroids and antihistamines. After elimination of the rats and disinfection of the rooms by a professional exterminator no new cases of rat mite dermatitis occurred. The tropical rat mite is an external parasite occurring on rats, mice, gerbils, hamsters and various other small mammals. When the principal animal host is not available, human beings can become the victim of mite infestation. Copyright (c) 2007 S. Karger AG, Base
OpenFraming: we brought the ML; you bring the data. Interact with your data and discover its frames
When journalists cover a news story, they can cover the story from multiple angles or perspectives. A news article written about COVID-19 for example, might focus on personal preventative actions such as mask-wearing, while another might focus on COVID-19's impact on the economy. These perspectives are called "frames," which when used may influence public perception and opinion of the issue. We introduce a Web-based system for analyzing and classifying frames in text documents. Our goal is to make effective tools for automatic frame discovery and labeling based on topic modeling and deep learning widely accessible to researchers from a diverse array of disciplines. To this end, we provide both state-of-the-art pre-trained frame classification models on various issues as well as a user-friendly pipeline for training novel classification models on user-provided corpora. Researchers can submit their documents and obtain frames of the documents. The degree of user involvement is flexible: they can run models that have been pre-trained on select issues; submit labeled documents and train a new model for frame classification; or submit unlabeled documents and obtain potential frames of the documents. The code making up our system is also open-sourced and well-documented, making the system transparent and expandable. The system is available on-line at http://www.openframing.org and via our GitHub page https://github.com/davidatbu/openFraming .Published versio
Multi-resolution image analysis for vehicle detection
Proceeding of: Second Iberian Conference, IbPRIA 2005, Estoril, Portugal, June 7-9, 2005Computer Vision can provide a great deal of assistance to Intelligent Vehicles. In this paper an Advanced Driver Assistance Systems for Vehicle Detection is presented. A geometric model of the vehicle is defined where its energy function includes information of the shape and symmetry of the vehicle and the shadow it produces. A genetic algorithm finds the optimum parameter values. As the algorithm receives information from a road detection module some geometric restrictions can be applied. A multi-resolution approach is used to speed up the algorithm and work in realtime. Examples of real images are shown to validate the algorithm.Publicad
Tools for analyzing parallel I/O
Parallel application I/O performance often does not meet user expectations. Additionally, slight access pattern modifications may lead to significant changes in performance due to complex interactions between hardware and software. These issues call for sophisticated tools to capture, analyze, understand, and tune application I/O. In this paper, we highlight advances in monitoring tools to help address these issues. We also describe best practices, identify issues in measure- ment and analysis, and provide practical approaches to translate parallel I/O analysis into actionable outcomes for users, facility operators, and researchers
More efficient periodic traversal in anonymous undirected graphs
We consider the problem of periodic graph exploration in which a mobile
entity with constant memory, an agent, has to visit all n nodes of an arbitrary
undirected graph G in a periodic manner. Graphs are supposed to be anonymous,
that is, nodes are unlabeled. However, while visiting a node, the robot has to
distinguish between edges incident to it. For each node v the endpoints of the
edges incident to v are uniquely identified by different integer labels called
port numbers. We are interested in minimisation of the length of the
exploration period.
This problem is unsolvable if the local port numbers are set arbitrarily.
However, surprisingly small periods can be achieved when assigning carefully
the local port numbers. Dobrev et al. described an algorithm for assigning port
numbers, and an oblivious agent (i.e. agent with no memory) using it, such that
the agent explores all graphs of size n within period 10n. Providing the agent
with a constant number of memory bits, the optimal length of the period was
previously proved to be no more than 3.75n (using a different assignment of the
port numbers). In this paper, we improve both these bounds. More precisely, we
show a period of length at most 4 1/3 n for oblivious agents, and a period of
length at most 3.5n for agents with constant memory. Moreover, we give the
first non-trivial lower bound, 2.8n, on the period length for the oblivious
case
- …