Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Computer Engineering
Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci
Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci
Turkish Journal of Electrical Engineering and Computer Sciences
In this work, the use of t-SNE is proposed to embed 3D point clouds of plants into 2D space for plant characterization. It is demonstrated that t-SNE operates as a practical tool to flatten and visualize a complete 3D plant model in 2D space. The perplexity parameter of t-SNE allows 2D rendering of plant structures at various organizational levels. Aside from the promise of serving as a visualization tool for plant scientists, t-SNE also provides a gateway for processing 3D point clouds of plants using their embedded counterparts in 2D. In this paper, simple methods were proposed to perform semantic …
Analysis Of Microscopic Objects Using Computer Vision Methods, Yuan Dao
Analysis Of Microscopic Objects Using Computer Vision Methods, Yuan Dao
UNLV Theses, Dissertations, Professional Papers, and Capstones
As an essential and powerful tool to observe living organisms, three-dimensional fluorescence microscopy is widely used in biological research and diagnosis. The 4D fluorescence microscopy data can be obtained using time-lapsed videos of 3D images. To analyze and extract useful information from the increasingly large and complex biological image dataset, efficient and effective computational tools are in need but still lagging behind. In analyzing biological data, two major challenges are faced. First, time-lapsed fluorescence microscopic images typically have a low SNR. Second, biological objects often change their morphology and internal structure frequently. As such, conventional image processing methods may not …
Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao
Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao
Theses and Dissertations--Computer Science
With exponential growth on a daily basis, there is potentially valuable information hidden in complex electronic medical records (EMR) systems. In this thesis, several efficient data mining algorithms were explored to discover hidden knowledge in insurance claims data. The first aim was to cluster three levels of information overload(IO) groups among chronic rheumatic disease (CRD) patient groups based on their clinical events extracted from insurance claims data. The second aim was to discover hidden patterns using three renowned pattern mining algorithms: Apriori, frequent pattern growth(FP-Growth), and sequential pattern discovery using equivalence classes(SPADE). The SPADE algorithm was found to be the …
A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald
A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald
Journal of Digital Forensics, Security and Law
Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Journal of Digital Forensics, Security and Law
Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …
Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty
Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty
Michigan Tech Research Institute Publications
Thermal remote sensing has a wide range of applications, though the extent of its use is inhibited by cost. Robotic and computer components are now widely available to consumers on a scale that makes thermal data a readily accessible resource. In this project, thermal imagery collected via a lightweight remote sensing Unmanned Aerial Vehicle (UAV) was used to create a surface temperature map for the purpose of providing wildland firefighting crews with a cost-effective and time-saving resource. The UAV system proved to be flexible, allowing for customized sensor packages to be designed that could include visible or infrared cameras, GPS, …
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo
Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo
Makara Journal of Technology
The visualization of plant growth modeling using computer simulation has rarely been conducted with Lindenmayer System (L-System) approach. L-System generally has been used as framework for improving and designing realistic modeling on plant growth. It is one kind of tools for representing plant growth based on grammar sintax and mathematic formulation. This research aimed to design modeling and visualizing plant growth structure generated using L-System. The environment on modeling design used three dimension graphic on standart OpenGL format. The visualization on system design has been developed by some of L-System grammar, and the output graphic on three dimension reflected on …
Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Journal of Digital Forensics, Security and Law
This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.
A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik
A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik
Turkish Journal of Electrical Engineering and Computer Sciences
Engineering is based on practice. The minima of this practice should be given during the university education. This has become more and more comprehensive and expensive parallel to high-technology devices developed and presented to societies. Computers, microprocessor-based devices, programmable systems on Chip (PSoC), etc., make engineering education not only very complex but interdisciplinary as well. Building undergraduate labs has become more and more expensive if only physical experimentation and hands-on training are targeted. On the other hand, simple, comparatively much cheaper software may turn a regular personal computer (PC) into a virtual lab. The key question therefore is, to establish …