Dissertations / Theses on the topic 'Traces clustering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'Traces clustering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Iegorov, Oleg. "Une approche de fouille de données pour le débogage temporel des applications embarquées de streaming." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM032/document.
Full textDebugging streaming applications run on multimedia embedded systems found in modern consumer electronics (e.g. in set-top boxes, smartphones, etc) is one of the most challenging areas of embedded software development. With each generation of hardware, more powerful and complex Systems-on-Chip (SoC) are released, and developers constantly strive to adapt their applications to these new platforms. Embedded software must not only return correct results but also deliver these results on time in order to respect the Quality-of-Service (QoS) properties of the entire system. The non-respect of QoS properties lead to the appearance of temporal bugs which manifest themselves in multimedia embedded systems as, for example, glitches in the video or cracks in the sound. Temporal debugging proves to be tricky as temporal bugs are not related to the functional correctness of the code, thus making traditional GDB-like debuggers essentially useless. Violations of QoS properties can stem from complex interactions between a particular application and the system or other applications; the complete execution context must be, therefore, taken into account in order to perform temporal debugging. Recent advances in tracing technology allow software developers to capture a trace of the system's execution and to analyze it afterwards to understand which particular system activity is responsible for the violations of QoS properties. However, such traces have a large volume, and understanding them requires data analysis skills that are currently out of the scope of the developers' education.In this thesis, we propose SATM (Streaming Application Trace Miner) - a novel temporal debugging approach for embedded streaming applications. SATM is based on the premise that such applications are designed under the dataflow model of computation, i.e. as a directed graph where data flows between computational units called actors. In such setting, actors must be scheduled in a periodic way in order to meet QoS properties expressed as real-time constraints, e.g. displaying 30 video frames per second. We show that an actor which does not eventually respect its period at runtime causes the violation of the application’s real-time constraints. In practice, SATM is a data analysis workflow combining statistical measures and data mining algorithms. It provides an automatic solution to the problem of temporal debugging of streaming applications. Given an execution trace of a streaming application exhibiting low QoS as well as a list of its actors, SATM firstly determines exact actors’ invocations found in the trace. It then discovers the actors’ periods, as well as parts of the trace in which the periods are not respected. Those parts are further analyzed to extract patterns of system activity that differentiate them from other parts of the trace. Such patterns can give strong hints on the origin of the problem and are returned to the developer. More specifically, we represent those patterns as minimal contrast sequences and investigate various solutions to mine such sequences from execution trace data.Finally, we demonstrate SATM’s ability to detect both an artificial perturbation injected in an open source multimedia framework, as well as temporal bugs from two industrial use cases coming from STMicroelectronics. We also provide an extensive analysis of sequential pattern mining algorithms applied on execution trace data and explain why state-of-the-art algorithms fail to efficiently mine sequential patterns from real-world traces
Teboul, Bruno. "Le développement du neuromarketing aux Etats-Unis et en France. Acteurs-réseaux, traces et controverses." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLED036/document.
Full textOur research explores the comparative development of neuromarketing between the United States and France. We start by analyzing the literature on neuromarketing. We use as theoretical and methodological framework the Actor Network Theory (ANT) (in the wake of the work of Bruno Latour and Michel Callon). We show how “human and non-human” entities (“actants”): actor-network, traces (publications) and controversies form the pillars of a new discipline such as the neuromarketing. Our hybrid approach “qualitative-quantitative” allows us to build an applied methodology of the ANT: bibliometric analysis (Publish Or Perish), text mining, clustering and semantic analysis of the scientific literature and web of the neuromarketing. From these results, we build data visualizations, mapping of network graphs (Gephi) that reveal the interrelations and associations between actors, traces and controversies about neuromarketing
Hamdi, Marwa. "Modélisation des processus utilisateurs à partir des traces d’exécution, application aux systèmes d’information faiblement structurés." Electronic Thesis or Diss., La Rochelle, 2022. http://www.theses.fr/2022LAROS036.
Full textThis research focuses on extracting users’ journeys in a digital library characterized by weakly structured business processes. In this thesis, we investigate whether it is possible to model user journeys using process mining. The discovered models allow system designers to respond more efficiently to users’ needs and to present them with a set of recommendations. For our study, we have chosen to extract the users’ journey models of the digital library Gallica, based on real traces generated by their users. First, we adapt these browsing traces in a well-defined format compatible with process mining techniques. The originality of our contribution concerns the grouping of similar paths, considering the existing characteristics in the traces, to avoid the generation of complex models, often not exploitable, from such voluminous and unstructured traces. Finally, we validate our method on two simulated and real data sets. We compare our method to two other methods inspired by existing works. The results show that our method outper forms the existing ones on both datasets in clustering and modeling
Mauss, Benoit. "Réactions élastiques et inélastiques résonantes pour la caractérisation expérimentale de la cible active ACTAR TPC." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMC226/document.
Full textACTAR TPC (ACtive TARget and Time Projection Chamber) is a next generation active target that was designed and built at GANIL (Grand Accélérateur d'Ions Lourds). Active targets are gaseous targets in which the gas is also used to track charged particles following the principles of time projection chambers (TPC). The TPC of ACTAR has a segmented anode of 16384 2 mm side square pixels. The high density of pixels is processed using the GET (General Electronics for TPCs) electronic system. This system also digitizes the signals over a time interval, enabling a full 3D event reconstruction. An eight time smaller demonstrator was first built to verify the electronics operation and the mechanical design. ACTAR TPC's final design was based on results obtained with the demonstrator which was tested using 6Li, 24Mg and 58Ni beams. The commissioning of ACTAR TPC was then carried out for the case of resonant scattering on a proton target using 18O and 20Ne beams. A track reconstruction algorithm is used to extract the angles and energies of the ions involved in the reactions. Results are compared to previous data to determine the detection system performances. Comparing the commissioning data with R matrix calculations, excitation functions resolutions in different cases are obtained. The use of ACTAR TPC is validated for future experiments. Furthermore, alpha clustering was studied in 10B through the resonant scattering 6Li + 4He, carried out with the demonstrator. Two resonances at 8.58 MeV and 9.52 MeV are observed for the first time in elastic scattering with this reaction channel
Lallouache, Mehdi. "Clustering in foreign exchange markets : price, trades and traders." Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0040/document.
Full textThe aim of this thesis is to study three types of clustering in foreign exchange markets, namely in price, trades arrivals and investors decisions. We investigate the statistical properties of the EBS order book for the EUR/USD and USD/JPY currency pairs and the impact of a ten-fold tick size reduction on its dynamics. A large fraction of limit orders are still placed right at or halfway between the old allowed prices. This generates price barriers where the best quotes lie for much of the time, which causes the emergence of distinct peaks in the average shape of the book at round distances. Furthermore, we argue that this clustering is mainly due to manual traders who remained set to the old price resolution. Automatic traders easily take price priority by submitting limit orders one tick ahead of clusters, as shown by the prominence of buy (sell) limit orders posted with rightmost digit one (nine).The clustering of trades arrivals is well-known in financial markets and Hawkes processes are particularly suited to describe this phenomenon. We raise the question of what part of market dynamics Hawkes processes are able to account for exactly. We document the accuracy of such processes as one varies the time interval of calibration and compare the performance of various types of kernels made up of sums of exponentials. Because of their around-the-clock opening times, FX markets are ideally suited to our aim as they allow us to avoid the complications of the long daily overnight closures of equity markets. One can achieve statistical significance according to three simultaneous tests provided that one uses kernels with two exponentials for fitting an hour at a time, and two or three exponentials for full days, while longer periods could not be fitted within statistical satisfaction because of the non-stationarity of the endogenous process. Fitted timescales are relatively short and endogeneity factor is high but sub-critical at about 0.8.Most agent-based models of financial markets implicitly assume that the agents interact through asset prices and exchanged volumes. Some of them add an explicit trader-trader interaction network on which rumors propagate or that encode groups that take common decisions. Contrarily to other types of data, such networks, if they exist, are necessarily implicit, which makes their determination a more challenging task. We analyze transaction data of all the clients of two liquidity providers, encompassing several years of trading. By assuming that the links between agents are determined by systematic simultaneous activity or inactivity, we show that interaction networks do exist. In addition, we find that the (in)activity of some agents systematically triggers the (in)activity of other traders, defining lead-lag relationships between the agents. This implies that the global investment flux is predictable, which we check by using sophisticated machine learning methods
Abonyi, J., FD Tamás, S. Potgieter, and H. Potgieter. "Analysis of Trace Elements in South African Clinkers using Latent Variable Model and Clustering." South African Journal of Chemistry, 2003. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000893.
Full textPetraro, Alessandro. "Clustering di tracce di mobilità per l’identificazione di stili di guida." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13003/.
Full textAbonyia, J., FD Tamas, and S. Potgieter. "Analysis of trace elements in South African clinkers using latent variable model and clustering." South African Journal of Chemistry, 2003. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001952.
Full textQin, Tian. "Estimation of Water Demands Using an MCMC Algorithm with Clustering Methods." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544002222852385.
Full textLiang, Xuwei. "MODELING AND QUANTITATIVE ANALYSIS OF WHITE MATTER FIBER TRACTS IN DIFFUSION TENSOR IMAGING." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/818.
Full textSiless, Viviana. "Multi-modal registration of T1 brain image and geometric descriptors of white matter tracts." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112147/document.
Full textBrain image registration aims at reducing anatomical variability across subjects to create a common space for group analysis. Multi-modal approaches intend to minimize cortex shape variations along with internal structures, such as fiber bundles. These approaches require prior identification of the structures, which remains a challenging task in the absence of a complete reference atlas. We propose an extension of the Diffeomorphic Demons image registration to jointly register images and fiber bundles. In this thesis we analyze differents representations of the fiber bundles such as ordered points, clouds of points, Currents and Measures. Different distances are analyzed and implemented into the registration algorithm. To simplify white matter representation we also analyze, use and extend existing clustering algorithms. By extending the image registration to include geometric fiber bundles descriptors we hope to improve future analyses regarding both, grey and white matter. We demonstrate the efficacy of our algorithm by registering simultaneously T1 images and fiber bundles and compare results with a multi-modal T1+Fractional Anisotropy (FA) and a tensor-based registration algorithms and obtain superior performance with our approach. We provide preliminary evidence that our implementation improves the sensitivity of activation detection in fMRI group studies
Arico, Giovanni. "Testing the methods to reconstruct and model the Baryonic Acoustic Oscillations of different tracers using N-body simulations." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13167/.
Full textLi, Jinpeng. "Extraction de connaissances symboliques et relationnelles appliquée aux tracés manuscrits structurés en-ligne." Phd thesis, Nantes, 2012. http://tel.archives-ouvertes.fr/tel-00785984.
Full textRos, Christian [Verfasser], Jens [Akademischer Betreuer] Haueisen, Jürgen R. [Akademischer Betreuer] Reichenbach, and Thomas [Akademischer Betreuer] Knösche. "Clustering of fiber tracts and quantitative analysis of white matter fiber bundles in the human brain / Christian Ros. Gutachter: Jürgen, R. Reichenbach ; Thomas Knösche. Betreuer: Jens Haueisen." Ilmenau : Universitätsbibliothek Ilmenau, 2015. http://d-nb.info/1070819387/34.
Full textBandieramonte, Marilena. "Muon Portal project: Tracks reconstruction, automated object recognition and visualization techniques for muon tomography data analysis." Doctoral thesis, Università di Catania, 2015. http://hdl.handle.net/10761/3751.
Full textBorlase, Nadia Miree. "The thalamus in Parkinson's disease: a multimodal investigation of thalamic involvement in cognitive impairment." Thesis, University of Canterbury. Psychology, 2013. http://hdl.handle.net/10092/8689.
Full textPeltonen, Joanna. "Effective Spatial Mapping for Coupled Code Analysis of Thermal–Hydraulics/Neutron–Kinetics of Boiling Water Reactors." Doctoral thesis, KTH, Kärnkraftsäkerhet, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122088.
Full textQC 20130516
Dos, Santos Morgane. "Modélisation de la topologie des dépôts d’énergie créés par un rayonnement ionisant à l’échelle nanométrique dans les noyaux cellulaires et relation avec les événements précoces radio-induits." Thesis, Bordeaux 1, 2013. http://www.theses.fr/2013BOR14865/document.
Full textIonizing radiations are known to induce critical damages on biological matter and especially on DNA. Among these damages, DNA double strand breaks (DSB) are considered as key precursor of lethal effects of ionizing radiations. Understand and predict how DNA double and simple strand breaks are created by ionising radiation and repaired in cell nucleus is nowadays a major challenge in radiobiology research. This work presents the results on the simulation of the DNA double strand breaks produced from the energy deposited by the irradiation at the intracellular level. At the nanometric scale, the only method to accurately simulate the topological details of energy deposited on the biological matter is the use of Monte Carlo codes. In this work, we used the Geant4 Monte Carlo code and, in particular, the low energy electromagnetic package extensions, referred as Geant4-DNA processes.In order to evaluate DNA radio-induced damages, the first objective of this work consisted in implementing a detailed geometry of the DNA on the Monte Carlo simulations. Two types of cell nuclei, representing a fibroblast and an endothelium, were described in order to evaluate the influence of the DNA density on the topology of the energy deposits contributing to strand breaks. Indeed, the implemented geometry allows the selection of energy transfer points that can lead to strand breaks because they are located on the backbone. Then, these energy transfer points were analysed with a clustering algorithm in order to reveal groups of aggregates and to study their location and complexity.In this work, only the physical interactions of ionizing radiations are simulated. Thus, it is not possible to achieve an absolute number of strand breaks as the creation and transportation of radical species which could lead to indirect DNA damages is not included. Nevertheless, the aim of this work was to evaluate the relative dependence of direct DNA damages with the DNA density, radiation quality, cell nuclei morphology or also chromatin condensation. The results presented in this work have allowed the quantification of the influence of these different parameters in the number and complexity of directs DNA damages which can then contribute to the late effects on cell fate
Guevara, Alvez Pamela Beatriz. "Inference of a human brain fiber bundle atlas from high angular resolution diffusion imaging." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00638766.
Full textCunha, Mariana da Cruz. "Privacy-Preserving Mechanisms for Location Traces." Master's thesis, 2019. http://hdl.handle.net/10316/87304.
Full textLocation-Based Services are increasingly present in our daily lives. However, regardless of the benefits that these services offer to users, the shared data are not always and only used for the initial purpose. These data can be made public or sold, for example, for commercial purposes. The fact that location data contain information that can reveal the person’s identity, routines and habits, raises serious privacy concerns. In order to respond to this problem, there are privacy-preserving mechanisms, namely, for obfuscation and for anonymization of data. However, the correlation between location reports, which can potentially be used by an adversary to estimate the position of the user, has been underlooked in privacy protection. The aim of this thesis is to develop a user-centric Location Privacy-Preserving Mechanism, that is, a mechanism that protects privacy of a user at collection time. In addition, it is intended to protect the users not only against single reports, but also over time, against continuous reports. In this latter scenario, we intent to develop a protection mechanism that is suitable to different frequency of updates and/or to the correlation between reports as to mitigate possible privacy violations that advent from exploring these intrinsic characteristics of location data. Towards this end, we started by evaluating the impact of the frequency of updates on location privacy. For that, we implemented a state-of-the-art tracking attack that allows us to assess the effect of the frequency of updates by estimating the exact user locations. According to the performed analysis, we developed a new mechanism based on geo-indistinguishability that creates obfuscation clusters to aggregate closer locations. This developed mechanism is designated clustering geo-indistinguishability. To evaluate the utility of the mechanism, we resorted to a real use-case based on geofencing. Lastly, the evaluation of the mechanism enables us to conclude that it safeguards the level of privacy and the utility of continuous reports of location data, in a way that it can still be used for the purpose of a service.
Os serviços baseados em localização estão cada vez mais presentes no nosso quotidiano. No entanto, apesar do benefício que estes serviços oferecem aos utilizadores, os dados partilhados nem sempre são usados apenas com o propósito inicial. Estes dados podem ser tornados públicos ou vendidos, por exemplo, para fins comerciais. O facto dos dados de localização conterem informações passíveis de revelar a identidade, as rotinas e os hábitos de uma pessoa, levantam sérias preocupações de privacidade. Para dar resposta a este desiderato, existem mecanismos de preservação de privacidade, nomeadamente, de ofuscação e anonimização dos dados. Contudo, a correlação entre os dados de localização partilhados, que pode ser usada por um adversário para estimar a posição de um utilizador, tem sido negligenciada na proteção da privacidade. O objetivo desta tese é desenvolver um mecanismo de preservação de privacidade de localização centrado no utilizador, isto é, um mecanismo que proteja os utilizadores no momento da partilha de dados. Para além disso, pretende-se proteger o utilizador não só quando este reporta localizações únicas, mas também ao longo do tempo, isto é, quando reporta localizações de modo contínuo. Neste último cenário, pretendemos desenvolver um mecanismo de proteção que seja adequado a diferentes frequências de atualização de localização e/ou à correlação existente entre as localizações partilhadas, de modo a mitigar possíveis violações de privacidade que advenham da exploração destas características intrínsecas dos dados de localização. Neste sentido, começámos por avaliar o impacto da frequência na privacidade de localização. Para tal, implementámos um ataque considerado estado da arte que permite localizar o utilizador ao longo do tempo e do espaço, viabilizando a avaliação do efeito da frequência através da estimação da localização exata do utilizador. De acordo com a análise efetuada, desenvolvemos um mecanismo novo baseado em geo-indistinguishability que cria áreas de ofuscação para agregar localizações próximas. O mecanismo desenvolvido é designado clustering geo-indistinguisahbility. Para avaliar a utilidade do mecanismo, utilizámos um caso de uso real baseado em geofencing. Por fim, a avaliação do mecanismo permitiu-nos concluir que este salvaguarda o nível de privacidade e a utilidade dos dados, de tal modo que continuam a poder ser usados para o propósito do serviço.
Outro - Este trabalho é suportado pelos projetos SWING2 (PTDC/EEI-TEL/3684/2014) e Mobiwise (P2020 SAICTPAC/001/2015), financiado pelos Fundos Europeus Estruturais e de Investimento (FEEI) Europeus através do Programa Operacional Competitividade e Internacionalização - COMPETE 2020 e por Fundos Nacionais através da FCT - Fundação para a Ciência e a Tecnologia no âmbito do projeto POCI-01-0145-FEDER-016753, e pelo Fundo Europeu de Desenvolvimento Regional.
Chu, Ching-Feng, and 朱慶峯. "Clustering Malware via Measuring Similarity of Instruction Trace." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/59376726252762726733.
Full text國立交通大學
資訊科學與工程研究所
100
Although a large number of malicious programs are created every day, most of them mutate from existing ones. These mutant malware programs may seemingly appear differently, but actually act with similar behavior patterns. By clustering these malware programs into the same cluster, the malware analysis effort can be reduced significantly. In this paper, we propose a clustering approach to malware classification by comparing instruction trace similarity of binary programs being tested. We take advantage of dynamic analysis to trace malware instructions at runtime. Our method can discover malware in disguise by using techniques such as polymorphism or code injection. By tracing malware instructions, our scheme ensure that the detection mechanism cannot be circumvented or sabotaged by malicious API tampering. The taint technique we adopted can filter massive instructions created by normal system library as noise to the malware analysis. Collected instruction traces are then compared to measure their similarity so that the clustering can be performed. The results demonstrate that our system is able to cluster malware with similar codes, and can recognize new malware which is undetected by anti-virus tools.
Huang, Kuan-Wei, and 黃冠維. "Study on Edge Trace Preservation and Clustering of Computerized Embroidery." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/9959eh.
Full text國立勤益科技大學
電子工程系
105
Nowadays many pictures can be produced on the cloth by a sewing machine. However, there are some drawback must be solved, like too many colors. In addition, color down of the original pictures to a few colors will appear some fragmented objects. Therefore, this research proposes a Color reduction and eliminate bitty pixels (CREBP) algorithm. There are two parts in this algorithm: The first part is: when the picture is used by the image clustering, we exclude the edge and then let the edge recolored. The second part is: find out the fragmented objects and let it recolored again.
Zhang, Zhihan. "Selected results from clustering and analyzing stock market trade data." 2018. http://hdl.handle.net/2097/39297.
Full textDepartment of Statistics
Michael Higgins
The amount of data generated from stock market trading is massive. For example, roughly 10 million trades are performed each day on the NASDAQ stock exchange. A significant proportion of these trades are made by high-frequency traders. These entities make on the order of thousands or more trades a day. However, the stock-market factors that drive the decisions of high-frequency traders are poorly understood. Recently, hybridized threshold clustering (HTC) has been proposed as a way of clustering large-to-massive datasets. In this report, we use three months of NASDAQ HFT data---a dataset containing information on all trades of 120 different stocks including identifiers on whether the buyer and/or seller were high-frequency traders---to investigate the trading patterns of high-frequency traders, and we explore the use of HTC to identify these patterns. We find that, while HTC can be successfully performed on the NASDAQ HFT dataset, the amount of information gleaned from this clustering is limited. Instead, we show that an understanding of the habits of high-frequency traders may be gained by looking at \textit{janky} trades---those in which the number of shares traded is not a multiple of 10. We demonstrate evidence that janky trades are more common for high-frequency traders. Additionally, we suggest that a large number of small, janky trades may help signal that a large trade will happen shortly afterward.