Algorithm

Algorithm (673)

Synopsis: Ict: Computing: Computer science: Computer science: Algorithm:


BBC 00411.txt

One of the features of Orca is an algorithm a set of rules that assigns each member of the network a probability of belonging to a particular gang.


bloomberg.com 2014 00003.txt

Airbnb uses a variation of these algorithms to predict which renters and guests would be the best fit.

but the techniques and the algorithms and the tools are general, Sabah says. By combining company data on employee hiring, promotions, relocations, compensation, employee satisfaction surveys, managerial decisions and job cuts with public data sets like the standard of living in the region


bloomberg.com 2014 000040.txt

algorithms. The U k. government has overhauled the way it teaches computing to the country's children by adding mandatory programming classes.

and complete puzzles to familiarize themselves with the concept of algorithms without the complexity. By the time they hit 14,

Or perhaps the nine years of force-fed algorithms and coding will scare them away forever."


ec.europa.eu 2015 0000135.txt

The researchers are also developing intelligent algorithms (small programs) to efficiently manage the energy obtained from the environment.

The algorithms are used then with advanced signal processing techniques to reduce the amount of data that has to be sent for a given monitoring application.

and the industrial partners are incorporating the algorithms and hardware innovations into commercial products. In the longer term, Nicola Bui, the former CEO of Patavina Technologies, a project partner based in Italy,


ec.europa.eu 2015 0000158.txt

Dr Hurtos says. ou just need internet access to an online platform where algorithms anonymise the medical images for confidentiality,


ec.europa.eu 2015 00002.txt

The project biomedical engineers combined algorithms and statistical models to enable analysts to accurately predict the outcome of planned treatments for individual patients. here is quite often missing data.


ec.europa.eu 2015 0000229.txt

The Cablebot team are also developing control algorithms and systems to operate the cable robots, according to industrial requirements.


ec.europa.eu 2015 0000670.txt

and image dataset that is being collected Europe-wide can be exploited by a large neuroscience community through the application of sophisticated brain analysis algorithms.


ec.europa.eu 2015 0000748.txt

and then analysed using specially developed algorithms. The Healthy Aims project, involving 25 partners from 10 countries,


futurity_medicine 00133.txt

An algorithm translates the temperature data into an accurate health report all in less than 30 seconds.


futurity_medicine 00196.txt

#Heart disease could be written on your face University of Rochester rightoriginal Studyposted by Mark Michaud-Rochester on September 2 2014new technology that uses software algorithms

The technology described in the study employs a software algorithm developed by Xerox Corp. that scans the face


futurity_medicine 00604.txt

and a control algorithm closing the loop between glucose sensing and insulin delivery, he says. ut creating an artificial pancreas that delivers the right amount of insulin at the right times has been a challenge

because it is difficult to create a control algorithm that can handle the variability among individuals.


futurity_sci_tech 00015.txt

and algorithms to handle ig datasuch as these is another notable accomplishment of the 1kite team


futurity_sci_tech 00095.txt

All this gesturing wizardry is made possible by a new type of algorithm developed by Jie Song a master s student in the working group headed by Otmar Hilliges professor of computer science at ETH Zurich.

and memory powerexplains Hilliges adding that their new algorithm uses a far smaller portion of computer memory


futurity_sci_tech 00120.txt

An algorithm translates the temperature data into an accurate health report all in less than 30 seconds. hese results provide the first examples of epidermal photonic sensorssays John A. Rogers the paper s corresponding author


futurity_sci_tech 00201.txt

#Algorithms could adjust screens to your vision University of California Berkeley Original Studyposted by Sarah Yang-Berkeley on August 15 2014.

and it is non-intrusive. he algorithm which was developed at UC Berkeley works by adjusting the intensity of each direction of light that emanates from a single pixel in an image based upon a user s specific visual impairment.

The new display combines light field display optics with novel algorithms. Huang now a software engineer at Microsoft corp. in Seattle notes that the research prototype could easily be developed into a thin screen protector


futurity_sci_tech 00225.txt

#Algorithm edits boring bits out of Gopro videos Carnegie mellon University Posted by Byron Spice-Carnegie mellon on August 5 2014.

and Pattern Recognition Conference in Columbus Ohio. he algorithm never looks backsays Zhao whose research specialty is computer vision.

Rather as the algorithm processes the video it compiles a dictionary of its content. The algorithm then uses the learned dictionary to decide in a very efficient way

if a newly seen segment is similar to previously observed events such as routine traffic on a highway.


futurity_sci_tech 00765.txt

#Search tool finds pics of you based on tag relationships University of Toronto Posted by Michael Kennedy-Toronto on December 2 2013a new algorithm could profoundly change the way we find photos among the billions on social media sites such as Facebook

Because of your close aggingrelationship with both your mother in the first picture and your father in the second the algorithm can determine that a relationship exists between those two

when you search for photos of your father the algorithm can return the untagged photo because of the very high likelihood he s pictured. wo things are happening:

and Computer engineering at the University of Toronto who helped develop the algorithm. The tool called relational social image search achieves high reliability without using computationally intensive objector facial recognition software. f you want to search a trillion photos normally that takes at least a trillion operations.

but a billion usersâ##it s almost a 500 order of magnitude difference. ur algorithm is simply based on the number of tags not on the number of photos

which makes it more efficient to search than standard approaches. urrently the algorithm s interface is primarily for research


futurity_sci_tech 00893.txt

The Stanford researchers created a powerful algorithm that maps out a circuit layout that is guaranteed to work no matter


futurity_sci_tech 01007.txt

For instance, Limpaecher says algorithms have previously been created for identifying whether a person is drawing a face,


futurity_sci_tech 01078.txt

A cooperative control algorithm allows them to form a network and learn from the data they take in for example by adjusting their course when needed.


impactlab_2013 00034.txt

#The NSA s $10 million secret deal to get RSA to use backdoored encryption algorithm RSA had been paid by the NSA to set the backdoored algorithm as the default method of random number generation.

A secret $10 million deal between the NSA and the security firm RSA has resulted in RSA incorporating a flawed algorithm for generating random numbers into its products,

In the spotlight was flawed a algorithm known as Dual ec drbg, or the Dual Elliptic Curve Deterministic Random Bit Generator.

The deliberately crippled Dual ec drbg algorithm was being used as the default pseudo-random number generator a crucial component in RSA s BSAFE toolkit.

##What wasn known t until#Reuters#reported it was that RSA had been paid by the NSA to set the backdoored algorithm as the default method of random number generation.


impactlab_2013 00055.txt

and a computer algorithm can tell you#how likely you are to get the flu.


impactlab_2013 00094.txt

The system s algorithms constantly monitor electricity supply and demand charging and discharging the battery to minimize drawing expensive electricity from the power grid.


impactlab_2013 00114.txt

#When algorithms grow accustomed to your face Face-reading technology raises many questions about privacy and surveillance.

and control all of the apps that emerge from its algorithms, Dr. Kaliouby said. Face-reading technology may one day be paired with programs that have complementary ways of recognizing emotion,

##The software uses its algorithms to read your expressions, ##she said, ##but it doesn t store the frames.##

##So far, the company s algorithms have been used mainly to monitor people s expressions as a way to test ads, movie trailers and television shows in advance.

The algorithms have improved, but##they are not perfect, and probably never will be said,##he. Apps that can respond to facial cues may find wide use in education


impactlab_2013 00239.txt

It uses proprietary algorithms to reduce false alarms. Lockheed touts the##field -and-forget##technology as providing maximum coverage at minimal costs,


impactlab_2014 00034.txt

The technology uses algorithms to alter an image based on a person's glasses prescription together with a light filter set in front of the display.

The algorithm alters the light from each individual pixel so that, when fed through a tiny hole in the plastic filter,

and a detail of a Vincent Van gogh self-portrait and applied algorithms that warped the image by taking into account the specific eye condition it was told to account for.


impactlab_2014 00336.txt

the algorithms are able to learn and improve from a much wider data set. Semantria business is booming, growing at 20%per month.


impactlab_2014 00423.txt

while also developing advanced algorithms to help the aircraft better traverse wind patterns and flight routes.


impactlab_2014 00553.txt

Sharkey noted that warrior robots would do battle with other warrior robots equipped with algorithms designed by an enemy army. f you have two competing algorithms

and you don know the contents of the other person algorithm, you don know the outcome.

the interactions of their two algorithms resulted in prices in the millions of dollars. Competing robot armies could destroy cities as their algorithms exponentially escalated,

Sharkey said. An even likelier outcome would be that human enemies would target the weaknesses of the robotsalgorithms to produce undesirable outcomes.


insidehpc.com 2015 000017.txt

#New Algorithm for Real-time Simulations in Materials Research Researchers at LBNL have have developed a new algorithm that opens the door for real-time simulations in atomic-level materials research.

and visiting scholar Zhi Wang from the Chinese Academy of Sciences, have developed a new real-time time-dependent density function theory (rt-TDDFT) algorithm that increases the small time

The traditional algorithms work by directly manipulating these equations. Wang new approach, which involves adding a new algorithm on top of his PETOT (parallel total energy) code,

originally developed by Wang when he worked at the National Renewable energy Laboratory and later parallelized by Wang

"With this new algorithm, the rt-TDDFT simulation can have speed comparable to the Born-Oppenheim ab initio molecular dynamics simulations,

"To achieve this, the algorithm expands the equations in PETOT into individual terms, based on which states are excited at a given time.

describing the key to the algorithm success: Solving the equations in bigger time steps reduces the computational cost and increases the speed of the simulations."

"Comparing the new algorithm with the old, slower algorithm yields similar results, e g.,, the predicted energies and velocities of an atom passing through a layer of material are the same for both models,


mininginnovationnews.com 2014 000046.txt

Returned pictures are reconstructed into 3-D images using algorithms developed by Menon and Kim. nlike miniature microscopes,


mininginnovationnews.com 2014 000091.txt

The extremely fast hierarchical 3d reconstruction software speeds up imaging internal microstructures 10-100 times compared to traditional or GPU-accelerated micro-CT algorithms.


mnn.com 2014 0000176.txt

with a unique algorithm developed by computer scientists at MIT. The microprocessor tells the robot what to do what shape to take and how to move.


Nature 04284.txt

and then use data-compression algorithms such as JPEG to store the image in a smaller file."

An algorithm compiles data from each wavelength to generate a complete image every 0. 1 seconds.


Nature 04407.txt

and Google is sure to refine its algorithms. But as flu-tracking techniques based on mining of web data

But the latest US flu season seems to have confounded its algorithms. Its estimate for the Christmas national peak of flu is almost double the CDC s (see Fever peaks),

In 2009, Flu Trends had to tweak its algorithms after its models badly underestimated ILI in the United states at the start of the H1n1 (swine flu) pandemic###a glitch attributed to changes in people s search behaviour as a result of the exceptional nature of the pandemic (S. Cook et al.


Nature 04416.txt

An algorithm devised by researchers in Canada and California now offers an answer#in this case, bituqen.

but the authors say that earlier algorithms tended to be rather intractable and prescriptive. Bouchard-C# t#and colleagues'method can factor in a large number of languages to improve the quality of reconstruction,

The algorithm can automatically identify cognate words (ones with the same root) in the languages. It then applies rules known to govern sound changes to deduce the probable root of each set of cognates.


Nature 04482.txt

and run their own algorithms. Source: BCC Researchother firms offer a range of approaches. Seven Bridges Genomics, based in Cambridge, Massachusetts,


news.discovery.com 2015 01605.txt.txt

e developed a modulation algorithm that increases the throughput of data in visible light communications, Maite Brandt-Pearce,


news.discovery.com 2015 01750.txt.txt

Algorithms interpret the data in the light spectrum, and identification information is delivered back to your phone within seconds.


newsoffice 00006.txt

CSAIL is home to much of the technology that is at the core of cybersecurity such as the RSA cryptography algorithm that protects most online financial transactions and the development of web standards via the MIT-based World wide web Consortium.


newsoffice 00044.txt

they were able to spot problems in the underlying algorithms, and make improvements much faster than before. here are a lot of problems that pop up because of uncertainty in the real world,

or restructure your vision of how your algorithm works. You could see applications where you might cut down a whole month of work into a few days.

who was involved not in the research. t will also enable the testing of decision-making algorithms in very harsh environments that are not readily available to scientists.


newsoffice 00046.txt

The AMO technology was a new transmitter architecture where algorithms could choose from different voltages needed to transmit data in each power amplifier


newsoffice 00086.txt

so a lot of algorithms we develop, we need to think about geometry. Grinspun had upgraded previously a code he developed to simulate hair to model the flow of viscous fluids like honey.

so we thought that we should port some of his algorithms into engineering, and test if these patterns can be predicted,


newsoffice 00098.txt

Then the lipidoid-RNA complex was injected automatically guided by a computer vision algorithm. The system can be adapted to target any organ


newsoffice 00106.txt

The control algorithm constantly adjusts the velocity of the water pumped through each of the six jets to keep the robot on course.


newsoffice 00139.txt

Now MIT researchers have developed an algorithm for bounding that they ve successfully implemented in a robotic cheetah a sleek four-legged assemblage of gears batteries

The key to the bounding algorithm is in programming each of the robot s legs to exert a certain amount of force in the split second during

and graduate student Meng Yee Chuah will present details of the bounding algorithm this month at the IEEE/RSJ International Conference on Intelligent Robots and Systems in Chicago.

Kim and his colleagues developed an algorithm that determines the amount of force a leg should exert in the short period of each cycle that it spends on the ground.

#In experiments the team ran the robot at progressively smaller duty cycles finding that following the algorithm s force prescriptions the robot was able to run at higher speeds without falling.

Kim says the team s algorithm enables precise control over the forces a robot can exert while running.


newsoffice 00144.txt

or underwatered. hey don have to know the flight algorithms, or underlying hardware, they just need to connect their software or piece of hardware to the platform,


newsoffice 00156.txt

Then for each trip their algorithm identifies the set of other trips that overlap with it the ones that begin before it ends.

Next the algorithm represents the shareability of all 150 million trips in the database as a graph.

The graphical representation itself was the key to the researchers analysis. With that in hand well-known algorithms can efficiently find the optimal matchings to either maximize sharing

The researchers also conducted experiments to ensure that their matching algorithm would work in real time if it ran on a server used to coordinate data from cellphones running a taxi-sharing app.


newsoffice 00159.txt

Algorithms distinguish the pills by matching them against a database of nearly all pills in circulation.


newsoffice 00169.txt

algorithms can do less work and hence finish more quickly. hese days, with cloud technology, storing lots of data is no big deal.


newsoffice 00184.txt

In prior work Rus Demaine and Wood developed an algorithm that could automatically convert any digitally specified 3-D shape into an origami folding pattern.

but that s probably tolerable for many applications In the meantime Demaine is planning to revisit the theoretical analysis that was the basis of the researchers original folding algorithm to determine


newsoffice 00195.txt

#Extracting audio from visual information Algorithm recovers speech from the vibrations of a potato-chip bag filmed through soundproof glass.

and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video.

So the researchers borrowed a technique from earlier work on algorithms that amplify minuscule variations in video

The researchers developed an algorithm that combines the output of the filters to infer the motions of an object as a whole

so the algorithm first aligns all the measurements so that they won cancel each other out. And it gives greater weight to measurements made at very distinct edges clear boundaries between different color values.

The researchers also produced a variation on the algorithm for analyzing conventional video. The sensor of a digital camera consists of an array of photodetectors millions of them, even in commodity devices.


newsoffice 00201.txt

The algorithm that computes the image to be displayed onscreen can exploit that redundancy allowing individual screen pixels to participate simultaneously in the projection of different viewing angles.

The MIT and Berkeley researchers were able to adapt that algorithm to the problem of vision correction so the new display incurs only a modest loss in resolution.


newsoffice 00202.txt

Machine learning algorithms track facial cues focusing prominently on the eyes eyebrows and mouth. A smile for instance would mean the corners of the lips curl upward and outward teeth flash and the skin around their eyes wrinkles.

Years of data-gathering have trained the algorithms to be very discerning. As a Phd student at Cambridge university in the early 2000s el Kaliouby began developing facial-coding software.

and training the algorithms by collecting vast stores of data. Coming from a traditional research background the Media Lab was completely different el Kaliouby says.

Kaliouby says training its software s algorithms to discern expressions from all different face types and skin colors.


newsoffice 00219.txt

A novel control algorithm enables it to move in sync with the wearer s fingers to grasp objects of various shapes and sizes.

To develop an algorithm to coordinate the robotic fingers with a human hand the researchers first looked to the physiology of hand gestures learning that a hand s five fingers are highly coordinated.

The researchers used this information to develop a control algorithm to correlate the postures of the two robotic fingers with those of the five human fingers.

Asada explains that the algorithm essentially teaches the robot to assume a certain posture that the human expects the robot to take.


newsoffice 00317.txt

which can then be recombined using a computer algorithm to recreate the 3-D structure. f you have one light-emitting molecule in your sample,


newsoffice 00319.txt

but by tailoring their algorithm to the architecture of the graphics processing units designed for video games,

Again, the researchers have developed an algorithm that can calculate those patterns on the fly. As content creators move to so-called uad HD, video with four times the resolution of today high-definition video, the combination of higher contrast and higher resolution could make a commercial version of the researcherstechnology appealing to theater owners,

and project through it and use this software algorithm, and you end up with a 4k image.


newsoffice 00321.txt

When the anemometers detect optimal wind speed a custom algorithm adjusts the system s tethers to extend

and design build electronics and circuit boards develop algorithms and test winches and cables Looking back Glass credits his undergraduate years on MIT s Solar Electrical Vehicle Team a student organization that builds and races solar


newsoffice 00323.txt

Among the tools that computer scientists are developing to make the profusion of video more useful are algorithms for activity recognition or determining

-recognition algorithm that has several advantages over its predecessors. One is that the algorithm s execution time scales linearly with the size of the video file it s searching.

That means that if one file is 10 times the size of another the new algorithm will take 10 times as long to search it not 1000 times

as long as some earlier algorithms would. Another is that the algorithm is able to make good guesses about partially completed actions

so it can handle streaming video. Partway through an action it will issue a probability that the action is of the type that it s looking for.

It may revise that probability as the video continues but it doesn t have to wait until the action is complete to assess it.

Finally the amount of memory the algorithm requires is fixed regardless of how many frames of video it s already reviewed.

The grammar of actionenabling all of these advances is the appropriation of a type of algorithm used in natural language processing the computer science discipline that seeks techniques for interpreting sentences written in natural language.

For any given action Pirsiavash and Ramanan s algorithm must thus learn a new grammar.

Pirsiavash and Ramanan feed their algorithm training examples of videos depicting a particular action and specify the number of subactions that the algorithm should look for.

But they don t give it any information about what those subactions are or what the transitions between them look like.

Pruning possibilitiesthe rules relating subactions are the key to the algorithm s efficiency. As a video plays the algorithm constructs a set of hypotheses about

which subactions are being depicted where and it ranks them according to probability. It can t limit itself to a single hypothesis as each new frame could require it to revise its probabilities.

The researchers tested their algorithm on eight different types of athletic endeavor such as weightlifting and bowling with training videos culled from Youtube.

They found that according to metrics standard in the field of computer vision their algorithm identified new instances of the same activities more accurately than its predecessors.

Action-detection algorithms could also help determine whether for instance elderly patients remembered to take their medication


newsoffice 00339.txt

The researchers also developed an algorithm that determines the optimal pattern for the sensors distribution.

In essence the algorithm maximizes the number of different distances between arbitrary pairs of sensors. With his new colleagues at Lincoln Lab Krieger has performed experiments at radar frequencies using a one-dimensional array of sensors deployed in a parking lot


newsoffice 00341.txt

The researchers also developed an algorithm that lets them calculate the precise amount of dopamine present in each fraction of a cubic millimeter of the ventral striatum.


newsoffice 00365.txt

Then algorithms generate fluctuating power depending on terrain to propel a wearer up and forward. When fitting the prosthesis to patients prosthetists can program appropriate stiffness


newsoffice 00400.txt

Using a computer algorithm that traces the shapes of neurons and groups them based on structural similarity,

Using a computer algorithm, they traced along the many branches, known as dendrites, that extend from each cell to connect with other cells.


newsoffice 00421.txt

Video Melanie Gonick All of our algorithms and control theory are designed pretty much with the idea that we ve got rigid systems with defined joints says Barry Trimmer a biology professor at Tufts University who specializes in biomimetic soft robots.


newsoffice 00533.txt

Now your face could be transformed instantly into a more memorable one without the need for an expensive makeover thanks to an algorithm developed by researchers in MIT s Computer science and Artificial intelligence Laboratory (CSAIL.

The algorithm which makes subtle changes to various points on the face to make it more memorable without changing a person s overall appearance was unveiled earlier this month at the International Conference on Computer Vision in Sydney.

It could also be used for job applications to create a digital version of an applicant s face that will more readily stick in the minds of potential employers says Khosla who developed the algorithm with CSAIL principal research scientist Aude Oliva the senior author of the paper Antonio

To develop the memorability algorithm the team first fed the software a database of more than 2000 images.

The researchers then programmed the algorithm with a set of objectives to make the face as memorable as possible

and so would fail to meet the algorithm s objectives. When the system has a new face to modify it first takes the image

The algorithm then analyzes how well each of these samples meets its objectives. Once the algorithm finds a sample that succeeds in making the face look more memorable without significantly altering the person s appearance it makes yet more copies of this new image with each containing further alterations.

It then keeps repeating this process until it finds a version that best meets its objectives.

When they tested these images on a group of volunteers they found that the algorithm succeeded in making the faces more or less memorable as required in around 75 percent of cases.

Now Oliva and her team have developed a computational algorithm that can do this for us he says.


newsoffice 00606.txt

A new algorithm that determines who speaks when in audio recordings represents every second of speech as a point in a three-dimensional space.


newsoffice 00613.txt

modifying algorithms specified by programmers so that theyl run more efficiently. Sometimes that means simply discarding lines of code that appear to serve no purpose.


newsoffice 00626.txt

and Systems Glover and MIT alumna Sanja Popovic 12 MENG 13 who is now at Google describes a new robot-vision algorithm based on the Bingham distribution that is 15 percent better than its best

That algorithm however is for analyzing high-quality visual data in familiar settings. Because the Bingham distribution is a tool for reasoning probabilistically it promises even greater advantages in contexts where information is patchy or unreliable.

In cases where visual information is particularly poor his algorithm offers an improvement of more than 50 percent over the best alternatives.

because it allows the algorithm to get more information out of each ambiguous local feature.

Most algorithms Glover s included will take a first stab at aligning the points. In the case of the tetrahedron assume that after that provisional alignment every point in the model is near a point in the object but not perfectly coincident with it.

and Popovic s algorithm to explore possible rotations in a principled way quickly converging on the one that provides the best fit between points.

The current version of Glover and Popovic s algorithm integrates point-rotation probabilities with several other such probabilities.

In experiments involving visual data about particularly cluttered scenes depicting the kinds of environments in which a household robot would operate Glover s algorithm had about the same false positive-rate rate as the best existing algorithm:

Glover argues that that difference is because of his algorithm s better ability to determine object orientations.

He also believes that additional sources of information could improve the algorithm s performance even further.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011