1,038 research outputs found
Efficient, decentralized detection of qualitative spatial events in a dynamic scalar field
This paper describes an efficient, decentralized algorithm to monitor qualitative spatial events in a dynamic scalar field. The events of interest involve changes to the critical points (i.e., peak, pits and passes) and edges of the surface network derived from the field. Four fundamental types of event (appearance, disappearance, movement and switch) are defined. Our algorithm is designed to rely purely on qualitative information about the neighborhoods of nodes in the sensor network and does not require information about nodes' coordinate positions. Experimental investigations confirm that our algorithm is efficient, with O(n) overall communication complexity (where n is the number of nodes in the sensor network), an even load balance and low operational latency. The accuracy of event detection is comparable to established centralized algorithms for the identification of critical points of a surface network. Our algorithm is relevant to a broad range of environmental monitoring applications of sensor networks
Graphical aids to the estimation and discrimination of uncertain numerical data
This research investigates the performance of graphical dot arrays designed to make discrimination of relative numerosity as effortless as possible at the same time as making absolute (quantitative) numerosity estimation as effortful as possible. Comparing regular, random, and hybrid (randomized regular) configurations of dots, the results indicate that both random and hybrid configurations reduce absolute numerosity estimation precision, when compared with regular dots arrays. However, discrimination of relative numerosity is significantly more accurate for hybrid dot arrays than for random dot arrays. Similarly, human subjects report significantly lower levels of subjective confidence in judgments when using hybrid dot configurations as compared with regular configurations; and significantly higher levels of subjective confidence as compared with random configurations. These results indicate that data graphics based on the hybrid, randomized-regular configurations of dots are well-suited to applications that require decisions to be based on numerical data in which the absolute quantities are less certain than the relative values. Examples of such applications include decision-making based on the outputs of empirically- based mathematical models, such as health-related policy decisions using data from predictive epidemiological models
Mining candidate causal relationships in movement patterns
This is an Accepted Manuscript of an article published by Taylor & Francis in the International Journal of Geographical Information Science on 01 October 2013, available online: http://wwww.tandfonline.com/10.1080/13658816.2013.841167In many applications, the environmental context for, and drivers of movement patterns are just as important as the patterns themselves. This paper adapts standard data mining techniques, combined with a foundational ontology of causation, with the objective of helping domain experts identify candidate causal relationships between movement patterns and their environmental
context. In addition to data about movement and its dynamic environmental context, our approach requires as input definitions of the states and events of interest. The technique outputs causal and causal-like relationships of potential interest, along with associated measures of support and confidence. As a validation of our approach, the analysis is applied to real data about fish
movement in the Murray River in Australia. The results demonstrate the technique is capable of identifying statistically significant patterns of movement indicative of causal and causal-like relationships. 1365-8816Australian Research Council Discovery Projec
On redundant topological constraints
© 2015 Elsevier B.V. All rights reserved. Redundancy checking is an important task in the research of knowledge representation and reasoning. In this paper, we consider redundant qualitative constraints. For a set Γ of qualitative constraints, we say a constraint (xRy) in Γ is redundant if it is entailed by the rest of Γ. A prime subnetwork of Γ is a subset of Γ which contains no redundant constraints and has the same solution set as Γ. It is natural to ask how to compute such a prime subnetwork, and when it is unique. We show that this problem is in general intractable, but becomes tractable if Γ is over a tractable subalgebra S of a qualitative calculus. Furthermore, if S is a subalgebra of the Region Connection Calculus RCC8 in which weak composition distributes over nonempty intersections, then Γ has a unique prime subnetwork, which can be obtained in cubic time by removing all redundant constraints simultaneously from Γ. As a by-product, we show that any path-consistent network over such a distributive subalgebra is minimal and globally consistent in a qualitative sense. A thorough empirical analysis of the prime subnetwork upon real geographical data sets demonstrates the approach is able to identify significantly more redundant constraints than previously proposed algorithms, especially in constraint networks with larger proportions of partial overlap relations
Broadening the scope of Differential Privacy Using Metrics ⋆
Abstract. Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention in statistical databases. It provides a formal privacy guarantee, ensuring that sensitive information relative to individuals cannot be easily inferred by disclosing answers to aggregate queries. If two databases are adjacent, i.e. differ only for an individual, then the query should not allow to tell them apart by more than a certain factor. This induces a bound also on the distinguishability of two generic databases, which is determined by their distance on the Hamming graph of the adjacency relation. In this paper we explore the implications of differential privacy when the indistinguishability requirement depends on an arbitrary notion of distance. We show that we can naturally express, in this way, (protection against) privacy threats that cannot be represented with the standard notion, leading to new applications of the differential privacy framework. We give intuitive characterizations of these threats in terms of Bayesian adversaries, which generalize two interpretations of (standard) differential privacy from the literature. We revisit the well-known results stating that universally optimal mechanisms exist only for counting queries: We show that, in our extended setting, universally optimal mechanisms exist for other queries too, notably sum, average, and percentile queries. We explore various applications of the generalized definition, for statistical databases as well as for other areas, such that geolocation and smart metering.
Risk factors for stress fracture in female endurance athletes : a cross-sectional study
Objective To identify psychological and physiological correlates of stress fracture in female endurance athletes.
Design A cross-sectional design was used with a history of stress fractures and potential risk factors assessed at one visit.
Methods Female-endurance athletes (58 runners and 12 triathletes) aged 26.0±7.4 years completed questionnaires on stress fracture history, menstrual history, athletic training, eating psychopathology and exercise cognitions. Bone mineral density, body fat content and lower leg lean tissue mass (LLLTM) were assessed using dual-x-ray absorptiometry. Variables were compared between athletes with a history of stress fracture (SF) and those without (controls; C) using χ², analysis of variance and Mann-Whitney U tests.
Results Nineteen (27%) athletes had previously been clinically diagnosed with SFs. The prevalence of current a/oligomenorrhoea and past amenorrhoea was higher in SF than C (p=0.008 and p=0.035, respectively). SF recorded higher global scores on the eating disorder examination questionnaire (p=0.049) and compulsive exercise test (p=0.006) and had higher LLLTM (p=0.029) compared to C. These findings persisted with weight and height as covariates. In multivariate logistic regression, compulsive exercise, amenorrhoea and LLLTM were significant independent predictors of SF history (p=0.006, 0.009 and 0.035, respectively).
Conclusions Eating psychopathology was associated with increased risk of SF in endurance athletes, but this may be mediated by menstrual dysfunction and compulsive exercise. Compulsive exercise, as well as amenorrhoea, is independently related to SF risk
College physical activity is related to mid-life activity levels in women
It has been suggested, but not clearly established, that physical activity (PA) during the college years is a determinant of long-term PA patterns. The purpose of this study was to examine the relationship between PA during the college years and current PA in college-educated women. Fifty-five college-educated women, aged 39.3 ± 6.5 y, were recruited for this study and were, on average, 14.9 ± 7.4 y post-college. Participant\u27s history of PA during college years and the present time was determined from the Lifetime Physical Activity Questionnaire. A brief demographic questionnaire that addressed current PA patterns was also administered. Results showed a significant correlation between leisure activity (LA) during college years and current LA (r = 0.424, p = 0.001). There was no difference between median college LA and current LA (22.4 and 27.9 MET hours per week, respectively, p = 0.129). However, total college PA reported was significantly lower than total current PA (34.7 and 70.7 MET hours per week, respectively, p = 0.001), with this difference due to an increase in household activities during mid-life. Marital status, the presence of children under the age of 18 in the home, and employment status had no significant impact on LA for this sample. These data suggest that leisure-time PA patterns practiced during college years may carry over to mid- life
Recommended from our members
Modeling Checkpoint-Based Movement with the Earth Mover's Distance
Movement data comes in various forms, including trajectory data and checkpoint data. While trajectories give detailed information about the movement of individual entities, checkpoint data in its simplest form does not give identities, just counts at checkpoints. However, checkpoint data is of increasing interest since it is readily available due to privacy reasons and as a by-product of other data collection. In this paper we propose to use the Earth Mover’s Distance as a versatile tool to reconstruct individual movements or flow based on checkpoint counts at different times. We analyze the modeling possibilities and provide experiments that validate model predictions, based on coarse-grained aggregations of data about actual movements of couriers in London, UK. While we cannot expect to reconstruct precise individual movements from highly granular checkpoint data, the evaluation does show that the approach can generate meaningful estimates of object movements.
B. Speckmann and K. Verbeek are supported by the Netherlands Organisation for Scientific Research (NWO) under project nos. 639.023.208 and 639.021.541, respectively. This paper arose from work initiated at Dagstuhl seminar 12512 “Representation, analysis and visualization of moving objects”, December 2012. The authors gratefully acknowledge Schloss Dagstuhl for their support
- …
