Online computational ethology based on modern IT infrastructure

نویسندگان

چکیده

In the study of animal behaviour, annotation and analysis is largely done manually either directly in field or from recordings. An emerging field, computational ethology, challenging this approach by using machine learning to automate process. However, use such methods general complicated a lack modularity, leading high cost long development times. At same time, benefits implementing fully automated pipeline are often minuscule. We propose online as way gain more automating process, making it easier ensure that equipment properly configured calibrated, enabling recording follow animals, even closed-loop experiments. work, we discuss requirements challenges for system an implementation based on modern IT infrastructure. Finally, demonstrate case studies bats mongoose. As algorithms developed expect systems enable new experimental setups insights field.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward a Science of Computational Ethology

The new field of “Computational Ethology” is made possible by advances in technology, mathematics, and engineering that allow scientists to automate the measurement and the analysis of animal behavior. We explore the opportunities and long-term directions of research in this area.

متن کامل

Modern Computational Applications of Dynamic Programming

Computational dynamic programming, while of some use for situations typically encountered in industrial and systems engineering, has proved to be of much greater significance in many areas of computer science. We review some of these applications here.

متن کامل

Batch-Mode Computational Advertising Based on Modern Portfolio Theory

The research on computational advertising so far has focused on finding the single best ad. However, in many real situations, more than one ad can be presented. Although it is possible to address this problem myopically by using a single-ad optimisation technique in serial-mode, i.e., one at a time, this approach can be ineffective and inefficient because it ignores the correlation between ads....

متن کامل

Whitelisting for Critical IT-Based Infrastructure

Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propose a whitelist-based detection system. Network a...

متن کامل

Computational Science and Engineering Online (CSE-Online): A Cyber-Infrastructure for Scientific Computing

With the expansion of the Internet and World Wide Web (or the Web), research environments have changed dramatically. As a result, the need to be able to efficiently and securely access information and resources from remote computer systems is becoming even more critical. This paper describes the development of an extendable integrated Web-accessible simulation environment for computational scie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ecological Informatics

سال: 2021

ISSN: ['1878-0512', '1574-9541']

DOI: https://doi.org/10.1016/j.ecoinf.2021.101290