6,135 research outputs found

    Image Robust Hashing for Malware Detection

    Get PDF
    This research is focused on a novel approach to detect malware based on static analysis of executable files. Specifically, we treat each executable file as a twodimensional image and use robust hashing techniques to identify whether a given executable belongs to a particular family or not. The hashing stage comprises two steps, namely, feature extraction, and compression. We compare our robust hashing approach to other machine learning-based techniques

    The Emergent Landscape of Detecting EGFR Mutations Using Circulating Tumor DNA in Lung Cancer.

    Get PDF
    The advances in targeted therapies for lung cancer are based on the evaluation of specific gene mutations especially the epidermal growth factor receptor (EGFR). The assays largely depend on the acquisition of tumor tissue via biopsy before the initiation of therapy or after the onset of acquired resistance. However, the limitations of tissue biopsy including tumor heterogeneity and insufficient tissues for molecular testing are impotent clinical obstacles for mutation analysis and lung cancer treatment. Due to the invasive procedure of tissue biopsy and the progressive development of drug-resistant EGFR mutations, the effective initial detection and continuous monitoring of EGFR mutations are still unmet requirements. Circulating tumor DNA (ctDNA) detection is a promising biomarker for noninvasive assessment of cancer burden. Recent advancement of sensitive techniques in detecting EGFR mutations using ctDNA enables a broad range of clinical applications, including early detection of disease, prediction of treatment responses, and disease progression. This review not only introduces the biology and clinical implementations of ctDNA but also includes the updating information of recent advancement of techniques for detecting EGFR mutation using ctDNA in lung cancer

    A Comparative Study of Two Combinatorial Reverse Auction Models

    Get PDF
    Online group-buying is one of the most innovative business models employed by many companies. From the perspective of buyers, quantity based discounts provide a huge incentive to form coalitions and take advantage of lower prices without ordering more than their actual demand. Traditional group-buying mechanisms are usually based on a single item and uniform cost sharing. One way to reduce the cost for acquiring the required items is to take into account the complementarities between items provided by the sellers. By holding a combinatorial reverse auction, the total cost to acquire the required items will be significantly reduced due to complementarities between items. However, combinatorial reverse auctions suffer from high computational complexity. If there are multiple buyers, there are two different business models for procurement based on combinatorial reverse auctions: (1) independent combinatorial reverse auctions: each buyer may hold a combinatorial reverse auction independently and (2) combinatorial reverse auctions based on group buying: multiple buyers delegate the auction to a group buyer and the group buyer holds only one combinatorial reverse auction for all the buyers. In developing an effective tool to support the decision of multiple buyers’ procurement, a comparative study on the performance and efficiency of these two different business models is needed. In this paper, we compare the performance as well as the computational efficiency for these two combinatorial reverse auction models. Our analysis indicates that group buying combinatorial reverse auction outperforms multiple separate combinatorial reverse auctions not only in performance but also in efficiency

    Digit Recognition Using Composite Features With Decision Tree Strategy

    Get PDF
    At present, check transactions are one of the most common forms of money transfer in the market. The information for check exchange is printed using magnetic ink character recognition (MICR), widely used in the banking industry, primarily for processing check transactions. However, the magnetic ink card reader is specialized and expensive, resulting in general accounting departments or bookkeepers using manual data registration instead. An organization that deals with parts or corporate services might have to process 300 to 400 checks each day, which would require a considerable amount of labor to perform the registration process. The cost of a single-sided scanner is only 1/10 of the MICR; hence, using image recognition technology is an economical solution. In this study, we aim to use multiple features for character recognition of E13B, comprising ten numbers and four symbols. For the numeric part, we used statistical features such as image density features, geometric features, and simple decision trees for classification. The symbols of E13B are composed of three distinct rectangles, classified according to their size and relative position. Using the same sample set, MLP, LetNet-5, Alexnet, and hybrid CNN-SVM were used to train the numerical part of the artificial intelligence network as the experimental control group to verify the accuracy and speed of the proposed method. The results of this study were used to verify the performance and usability of the proposed method. Our proposed method obtained all test samples correctly, with a recognition rate close to 100%. A prediction time of less than one millisecond per character, with an average value of 0.03 ms, was achieved, over 50 times faster than state-of-the-art methods. The accuracy rate is also better than all comparative state-of-the-art methods. The proposed method was also applied to an embedded device to ensure the CPU would be used for verification instead of a high-end GPU

    Gait Based Directional Bias Detection of Four-Legged Walking Robots

    Get PDF

    Theoretic Analysis and Extremely Easy Algorithms for Domain Adaptive Feature Learning

    Full text link
    Domain adaptation problems arise in a variety of applications, where a training dataset from the \textit{source} domain and a test dataset from the \textit{target} domain typically follow different distributions. The primary difficulty in designing effective learning models to solve such problems lies in how to bridge the gap between the source and target distributions. In this paper, we provide comprehensive analysis of feature learning algorithms used in conjunction with linear classifiers for domain adaptation. Our analysis shows that in order to achieve good adaptation performance, the second moments of the source domain distribution and target domain distribution should be similar. Based on our new analysis, a novel extremely easy feature learning algorithm for domain adaptation is proposed. Furthermore, our algorithm is extended by leveraging multiple layers, leading to a deep linear model. We evaluate the effectiveness of the proposed algorithms in terms of domain adaptation tasks on the Amazon review dataset and the spam dataset from the ECML/PKDD 2006 discovery challenge.Comment: ijca
    • …
    corecore