106 research outputs found

    Discriminative power of the receptors activated by k-contiguous bits rule

    Get PDF
    The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.Facultad de Informátic

    Discriminative power of the receptors activated by k-contiguous bits rule

    Get PDF
    The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.Facultad de Informátic

    Motor response influences perceptual awareness judgements

    Get PDF
    Acknowledgments The authors would like to thank Michał Wereszczyński for helping with data collection. This work was supported by the National Science Centre, Poland [grant HARMONIA number 2014/14/M/HS6/00911 given to MW].Peer reviewedPostprin

    A cross linguistic database of children's printed words in three Slavic languages

    Get PDF
    We describe a lexical database consisting of morphologically and phonetically tagged words that occur in the texts primarily used for language arts instruction in the Czech Republic, Poland and Slovakia in the initial period of primary education (up to grade 4 or 5). The database aims to parallel the contents and usage of the British English Children's Printed Word Database. It contains words from texts of the most widely used Czech, Polish and Slovak textbooks. The corpus is accessible via a simple WWW interface, allowing regular expression searches and boolean expression across word forms, lemmas, morphology tags and phonemic transcription, and providing useful statistics on the textwords included. We anticipate extensive usage of the database as a reference in the developmentof psychodiagnostic batteries for literacy impairments in the three languages, as well as for the creation of experimental materials in psycholinguistic research

    Computer Information Systems and Industrial Management

    Get PDF
    This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September 2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection; pattern recognition and image processing; biometric applications; algorithms and data management; networking; and system models and risk assessment

    Personalization for the Semantic Web III

    Get PDF
    This report provides an overview of the achievements of working group A3 for bringing personalization functionality to the Semantic Web. It continues the work started in the deliverable A3-D1 and A3-D4. In the deliverable at hand, we report on a successfully held workshop on Semantic Web Personalization at the 3rd European Semantic Web Conference, and the research results on techniques and algorithms for enabling personalization in the Semantic Web, and achievements on developing suitable architectures for the personalized information systems in the Semantic Web.peer-reviewe

    A travelling heads study investigating qMRI metrics on cortical regions

    Get PDF
    Technological advances in magnetic resonance imaging (MRI) have facilitated numerous studies on neural architecture, such as studies addressing pathology, behaviour or individual differences in brain activity. It is important, however, to first ascertain what variation can arise due to site-specific scanner properties (hard- and software). A certain amount of noise in MR images can indeed be attributable to such properties, even when the same scanner is used across different sites. Reproducibility across sites is possible with the use of quantitative MRI metrics (qMRI), where physical properties assigned to voxels allow for non-invasive analysis of brain tissue including sensitivity to iron and myelin content. Leutritz et al. (2020) investigated intra-site (scan-rescan) and intersite (between sites) variability on Siemens and Philips scanners through multi-parameter mapping techniques (MPM). The authors found intra-site scan-rescan coefficients of variance (CoV) ranging between 4% and 16% across parameters, with similar results for inter-site CoV. The current study implements a similar strategy to Leutritz et al. (2020) in that it investigates inter-site and interscanner variability in a "travelling heads" type of study. Using scanners by the same manufacturer (but two different models), the study investigates qMRI metrics for inter-site and inter-scanner differences and their corresponding effects on cortical regions.peer-reviewe
    corecore