12 results on '"Dominguez, Javier"'
Search Results
2. Minimally invasive dentistry in the treatment of dental caries: literature review
- Author
-
Chuqui Dominguez, Javier Vicente, Espinoza Toral, Esteban Fernando, Tamariz Ordoñez, Pablo Esteban, Chuqui Dominguez, Javier Vicente, Espinoza Toral, Esteban Fernando, and Tamariz Ordoñez, Pablo Esteban
- Abstract
In recent years, due to a better understanding of caries pathology and advances in dental materials, the use of non-invasive and minimally invasive techniques that delay or avoid the need for traditional restorations has gained importance. Objective: To present an update of concepts of minimally invasive dentistry in the treatment of dental caries. Methodology: The present investigation had an approach based on a literary review, allowing the comparison of studies by different authors on minimally invasive dentistry. Conclusion: Currently, minimally invasive dentistry has become the most common philosophy of dental treatment. The possibility of its inclusion is due in large part to the advent of new dental materials that adhere to the dental structure, more conservative methods for a healthy dental structure, achieving a treatment with a less invasive surgical approach and minimal removal of healthy tissue.
- Published
- 2022
3. Quality Characteristics of a Software Platform for Human-AI Teaming in Smart Manufacturing
- Author
-
Haindl, Philipp, Hoch, Thomas, Dominguez, Javier, Aperribai, Julen, Ure, Nazim Kemal, Tunçel, Mehmet, Haindl, Philipp, Hoch, Thomas, Dominguez, Javier, Aperribai, Julen, Ure, Nazim Kemal, and Tunçel, Mehmet
- Abstract
As AI-enabled software systems become more prevalent in smart manufacturing, their role shifts from a reactive to a proactive one that provides context-specific support to machine operators. In the context of an international research project, we develop an AI-based software platform that shall facilitate the collaboration between human operators and manufacturing machines. We conducted 14 structured interviews with stakeholders of the prospective software platform in order to determine the individual relevance of selected quality characteristics for human-AI teaming in smart manufacturing. These characteristics include the ISO 25010:2011 standard for software quality and AI-specific quality characteristics such as trustworthiness, explicability, and auditability. The interviewees rated trustworthiness, functional suitability, reliability, and security as the most important quality characteristics for this context, and portability, compatibility, and maintainability as the least important. Also, we observed agreement regarding the relevance of the quality characteristics among interviewees having the same role. On the other hand, the relevance of each quality characteristics varied depending on the concrete use case of the prospective software platform. The interviewees also were asked about the key success factors related to human-AI teaming in smart manufacturing. They identified improving the production cycle, increasing operator efficiency, reducing scrap, and reducing ergonomic risks as key success criteria. In this paper, we also discuss metrics for measuring the fulfillment of these quality characteristics, which we intend to operationalize and monitor during operation of the prospective software platform., Comment: Preprint: to appear in QUATIC'22 International Conference on the Quality of Information and Communications Technology
- Published
- 2022
4. Cohomología de de Rham
- Author
-
Ruiz Sacho, Jesús M., González Dominguez, Javier, Ruiz Sacho, Jesús M., and González Dominguez, Javier
- Abstract
La memoria busca introducir los conceptos y resultados básicos de cohomología para después tratar la cohomología de de Rham. Primero se desarrolla la teoría sin soporte compacto y a continuación con soporte compacto. Más adelante estudiamos lo necesario de teoría de grado y de funciones de Morse para poder enunciar y demostrar el teorema de Poincaré-Hopf para funciones de Morse. También incluiremos una aplicación topológica de los resultados sobre grado para aplicaciones diferenciables. Por último usaremos un resultado de la teoría de Morse para demostrar el teorema de Gauss-Bonnet y probamos el teorema de Reeb que caracteriza topológicamente las esferas mediante funciones de Morse., This work seeks to introduce cohomology’s basic concepts and results, so they can be applied to de Rham cohomology. First non-compact support theory is developed, then with compact support. Afterwards we study the required theory about degree and Morse functions to be able to state and prove the Poincar´e-Hopf theorem for Morse functions. We will also include a nice topological application of degree theory. Then we show a proof of Gauss-Bonnet theorem using a result from Morse theory. Finally we prove Reeb’s theorem which gives a topological characterization of spheres through Morse functions.
- Published
- 2021
5. A Sharpe-ratio-based measure for currencies
- Author
-
Prado-Dominguez, Javier, Fernández-Herráiz, Carlos, Prado-Dominguez, Javier, and Fernández-Herráiz, Carlos
- Abstract
The Sharpe Ratio offers an excellent summary of the excess return required per unit of risk invested. This work presents an adaptation of the ex-ante Sharpe Ratio for currencies where we consider a random walk approach for the currency behavior and implied volatility as a proxy for market expectations of future realized volatility. The outcome of the proposed measure seems to gauge some information on the expected required return attached to the “peso problemâ€.
- Published
- 2015
6. Improving short utterance i-vector speaker verification using utterance variance modelling and compensation techniques
- Author
-
Kanagasundaram, Ahilan, Dean, David, Sridharan, Sridha, Gonzalez-Dominguez, Javier, Gonzalez Rodriguez, Joaquin, Ramos, Daniel, Kanagasundaram, Ahilan, Dean, David, Sridharan, Sridha, Gonzalez-Dominguez, Javier, Gonzalez Rodriguez, Joaquin, and Ramos, Daniel
- Abstract
This paper proposes techniques to improve the performance of i-vector based speaker verification systems when only short utterances are available. Short-length utterance i-vectors vary with speaker, session variations, and the phonetic content of the utterance. Well established methods such as linear discriminant analysis (LDA), source-normalized LDA (SN-LDA) and within-class covariance normalisation (WCCN) exist for compensating the session variation but we have identified the variability introduced by phonetic content due to utterance variation as an additional source of degradation when short-duration utterances are used. To compensate for utterance variations in short i-vector speaker verification systems using cosine similarity scoring (CSS), we have introduced a short utterance variance normalization (SUVN) technique and a short utterance variance (SUV) modelling approach at the i-vector feature level. A combination of SUVN with LDA and SN-LDA is proposed to compensate the session and utterance variations and is shown to provide improvement in performance over the traditional approach of using LDA and/or SN-LDA followed by WCCN. An alternative approach is also introduced using probabilistic linear discriminant analysis (PLDA) approach to directly model the SUV. The combination of SUVN, LDA and SN-LDA followed by SUV PLDA modelling provides an improvement over the baseline PLDA approach. We also show that for this combination of techniques, the utterance variation information needs to be artificially added to full-length i-vectors for PLDA modelling.
- Published
- 2014
7. Improving the PLDA based speaker verification in limited microphone data conditions
- Author
-
Lamel, L, Bimbot, F, Gravier, G, Perrier, P, Cerisara, C, Fougeron, C, Pellegrino, F, Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, Gonzalez Rodriguez, Joaquin, Lamel, L, Bimbot, F, Gravier, G, Perrier, P, Cerisara, C, Fougeron, C, Pellegrino, F, Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, and Gonzalez Rodriguez, Joaquin
- Abstract
A significant amount of speech data is required to develop a robust speaker verification system, but it is difficult to find enough development speech to match all expected conditions. In this paper we introduce a new approach to Gaussian probabilistic linear discriminant analysis (GPLDA) to estimate reliable model parameters as a linearly weighted model taking more input from the large volume of available telephone data and smaller proportional input from limited microphone data. In comparison to a traditional pooled training approach, where the GPLDA model is trained over both telephone and microphone speech, this linear-weighted GPLDA approach is shown to provide better EER and DCF performance in microphone and mixed conditions in both the NIST 2008 and NIST 2010 evaluation corpora. Based upon these results, we believe that linear-weighted GPLDA will provide a better approach than pooled GPLDA, allowing for the further improvement of GPLDA speaker verification in conditions with limited development data.
- Published
- 2013
8. Improving short utterance based I-vector speaker recognition using source and utterance-duration normalization techniques
- Author
-
Lamel, L, Bimbot, F, Gravier, G, Perrier, P, Cerisara, C, Fougeron, C, Pellegrino, F, Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, Gonzalez Rodriguez, Joaquin, Lamel, L, Bimbot, F, Gravier, G, Perrier, P, Cerisara, C, Fougeron, C, Pellegrino, F, Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, and Gonzalez Rodriguez, Joaquin
- Abstract
A significant amount of speech is typically required for speaker verification system development and evaluation, especially in the presence of large intersession variability. This paper introduces a source and utterance duration normalized linear discriminant analysis (SUN-LDA) approaches to compensate session variability in short-utterance i-vector speaker verification systems. Two variations of SUN-LDA are proposed where normalization techniques are used to capture source variation from both short and full-length development i-vectors, one based upon pooling (SUN-LDA-pooled) and the other on concatenation (SUN-LDA-concat) across the duration and source-dependent session variation. Both the SUN-LDA-pooled and SUN-LDA-concat techniques are shown to provide improvement over traditional LDA on NIST 08 truncated 10sec-10sec evaluation conditions, with the highest improvement obtained with the SUN-LDA-concat technique achieving a relative improvement of 8% in EER for mis-matched conditions and over 3% for matched conditions over traditional LDA approaches.
- Published
- 2013
9. VUMES - Vulnerability Management Expert System - Design development and implementation
- Author
-
Burguera Dominguez, Javier, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, González Suárez, Eliana Karina, Burguera Dominguez, Javier, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, and González Suárez, Eliana Karina
- Abstract
Català: La Seguretat de la Informació s'ha convertit en un servei de gran demanda en els últims anys ja que les tecnologies de la informació i la comunicació han cobert gairebé tot el món empresarial. Per descomptat, no qualsevol empresa és capaç d'aplicar solucions de seguretat per als seus propis sistemes, és per això que comunament aquest servei és externalitzat i companyies professionals són contractats per proporcionar-lo. T-Systems és una consultora informàtica que entre la seva cartera ofereix aquest tipus de serveis gràcies al departament de Serveis de Seguretat i Solucions (SS&S), i un d'ells és la gestió de vulnerabilitats. D'acord a les polítiques i estratègies de seguretat, el departament de SS&S ha creat un flux de treball per a atorgar als seus clients el millor servei possible. Amb el pas del temps a més clients es van interessar i noves contractacions es van realitzar, per tant, les eines utilitzades en el departament es van veure insuficients. Aquest projecte s'inicia amb l'objectiu d'una reestructuració de flux de treball i una manera de concentrar i administrar eficientment les necessitats dels clients. Després de l'avaluació dels principals conceptes i passos del procés de gestió de vulnerabilitats, es va decidir dissenyar, desenvolupar i implementar una aplicació web amb la finalitat de satisfer els principals requeriments del departament de SS&S: un Sistema Expert de Gestió de Vulnerabilitats (VUMES)., Castellano: La Seguridad de la Información se ha convertido en un servicio de gran demanda en los últimos años ya que las tecnologías de la información y la comunicación han abarcado casi todo el mundo empresarial. Por supuesto, no cualquier empresa es capaz de aplicar soluciones de seguridad para sus propios sistemas, es por eso que comúnmente este servicio es externalizado y compañías profesionales son contratados para proporcionarlo. T-Systems es una empresa de consultoría informática que en su cartera ofrece este tipo de servicios gracias al departamento de Servicios de Seguridad y Soluciones (SS&S), y uno de ellos es la gestión de vulnerabilidades. De acuerdo a las políticas y estrategias de seguridad, el departamento de SS&S creó un flujo de trabajo para ofrecer a sus clientes el mejor servicio posible. Con el paso del tiempo a más clientes se interesaron y se realizaron nuevas contrataciones del servicio, y por tanto, las herramientas utilizadas en el departamento se vieron insuficientes. Este proyecto se inicia con el objetivo de una reestructuración de flujo de trabajo y una manera de concentrar y administrar eficientemente las necesidades de los clientes. Después de la evaluación de los principales conceptos y pasos del proceso de gestión de vulnerabilidades, se decidió diseñar, desarrollar e implementar una aplicación web con el fin de satisfacer los principales requerimientos del departamento de SS&S: un Sistema Experto de Gestión Vulnerabilidad (VUMES)., English: Information Security has become a highly demanded service in the last years since information and communication technologies have covered almost the entire business world. Of course, not any business is able to apply security solutions to their own systems, that?s why commonly this service is externalized and professional companies are hired to provide it. T-Systems is an informatics consulting company that among their offering portfolio counts with this kind of features thanks to the Security Services & Solutions (SS&S) department, and one of them is the Vulnerability Management. According to security policies and strategies, the SS&S department created a workflow to grant their clients the best possible service. With the pass of time more clients were interested and new recruitments were made, consequently, the tools used in the department were overwhelmed. This project begins with the goal of a workflow restructuration and a way to concentrate and manage efficiently the clients? issues. After the evaluation of the main concepts and steps of the vulnerability management process, it was decided to design, develop and implement a web application in order to fulfill the main needs of the SS&S department: a VUlnerability Management Expert System (VUMES)., Projecte final de carrera fet en col.laboració amb T-Systems
- Published
- 2011
10. VUMES - Vulnerability Management Expert System - Design development and implementation
- Author
-
Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, Burguera Dominguez, Javier, González Suárez, Eliana Karina, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, Burguera Dominguez, Javier, and González Suárez, Eliana Karina
- Abstract
Projecte final de carrera fet en col.laboració amb T-Systems, Català: La Seguretat de la Informació s'ha convertit en un servei de gran demanda en els últims anys ja que les tecnologies de la informació i la comunicació han cobert gairebé tot el món empresarial. Per descomptat, no qualsevol empresa és capaç d'aplicar solucions de seguretat per als seus propis sistemes, és per això que comunament aquest servei és externalitzat i companyies professionals són contractats per proporcionar-lo. T-Systems és una consultora informàtica que entre la seva cartera ofereix aquest tipus de serveis gràcies al departament de Serveis de Seguretat i Solucions (SS&S), i un d'ells és la gestió de vulnerabilitats. D'acord a les polítiques i estratègies de seguretat, el departament de SS&S ha creat un flux de treball per a atorgar als seus clients el millor servei possible. Amb el pas del temps a més clients es van interessar i noves contractacions es van realitzar, per tant, les eines utilitzades en el departament es van veure insuficients. Aquest projecte s'inicia amb l'objectiu d'una reestructuració de flux de treball i una manera de concentrar i administrar eficientment les necessitats dels clients. Després de l'avaluació dels principals conceptes i passos del procés de gestió de vulnerabilitats, es va decidir dissenyar, desenvolupar i implementar una aplicació web amb la finalitat de satisfer els principals requeriments del departament de SS&S: un Sistema Expert de Gestió de Vulnerabilitats (VUMES)., Castellano: La Seguridad de la Información se ha convertido en un servicio de gran demanda en los últimos años ya que las tecnologías de la información y la comunicación han abarcado casi todo el mundo empresarial. Por supuesto, no cualquier empresa es capaz de aplicar soluciones de seguridad para sus propios sistemas, es por eso que comúnmente este servicio es externalizado y compañías profesionales son contratados para proporcionarlo. T-Systems es una empresa de consultoría informática que en su cartera ofrece este tipo de servicios gracias al departamento de Servicios de Seguridad y Soluciones (SS&S), y uno de ellos es la gestión de vulnerabilidades. De acuerdo a las políticas y estrategias de seguridad, el departamento de SS&S creó un flujo de trabajo para ofrecer a sus clientes el mejor servicio posible. Con el paso del tiempo a más clientes se interesaron y se realizaron nuevas contrataciones del servicio, y por tanto, las herramientas utilizadas en el departamento se vieron insuficientes. Este proyecto se inicia con el objetivo de una reestructuración de flujo de trabajo y una manera de concentrar y administrar eficientemente las necesidades de los clientes. Después de la evaluación de los principales conceptos y pasos del proceso de gestión de vulnerabilidades, se decidió diseñar, desarrollar e implementar una aplicación web con el fin de satisfacer los principales requerimientos del departamento de SS&S: un Sistema Experto de Gestión Vulnerabilidad (VUMES)., English: Information Security has become a highly demanded service in the last years since information and communication technologies have covered almost the entire business world. Of course, not any business is able to apply security solutions to their own systems, that?s why commonly this service is externalized and professional companies are hired to provide it. T-Systems is an informatics consulting company that among their offering portfolio counts with this kind of features thanks to the Security Services & Solutions (SS&S) department, and one of them is the Vulnerability Management. According to security policies and strategies, the SS&S department created a workflow to grant their clients the best possible service. With the pass of time more clients were interested and new recruitments were made, consequently, the tools used in the department were overwhelmed. This project begins with the goal of a workflow restructuration and a way to concentrate and manage efficiently the clients? issues. After the evaluation of the main concepts and steps of the vulnerability management process, it was decided to design, develop and implement a web application in order to fulfill the main needs of the SS&S department: a VUlnerability Management Expert System (VUMES).
- Published
- 2011
11. European Food Safety Authority; Scientific Report on Technical specifications on harmonized epidemiological indicators for public health hazards to be covered by meat inspection of swine
- Author
-
Andersen, Jens Kirk, Chriél, Mariann, Cook, Alasdair, De Zutter, Lieven, Dominguez, Javier, Dorny, Pierre, Frank, Christina, Lahuerta-Marin, Angela, Molenberghs, Geert, Nolan, David, Pozio, Edoardo, Saegerman, Claude, Salvat, Gilles, Andersen, Jens Kirk, Chriél, Mariann, Cook, Alasdair, De Zutter, Lieven, Dominguez, Javier, Dorny, Pierre, Frank, Christina, Lahuerta-Marin, Angela, Molenberghs, Geert, Nolan, David, Pozio, Edoardo, Saegerman, Claude, and Salvat, Gilles
- Published
- 2011
12. Summary of the third European Veterinary Immunology Workshop (EVIW), september 2009, Berlin, Germany:scientific meeting report
- Author
-
Steinbach, Falko, Müller, Kerstin E., Aasted, Bent, Amadori, Massimo, Büttner, Mathias, Carter, Stuart, Charley, Bernard, Dominguez, Javier, Fossum, Caroline, Fischer, Uwe, Goddeeris, Bruno, Hopkins, John, Kaspers, Bernd, Marti, Eliane, Ollier, William, Rutten, Victor P., Saalmüller, Armin, Storset, Anne K., Toman, Miroslav, Werling, Dirk, Weber, Corinna N., Mauel, Susanne, Steinbach, Falko, Müller, Kerstin E., Aasted, Bent, Amadori, Massimo, Büttner, Mathias, Carter, Stuart, Charley, Bernard, Dominguez, Javier, Fossum, Caroline, Fischer, Uwe, Goddeeris, Bruno, Hopkins, John, Kaspers, Bernd, Marti, Eliane, Ollier, William, Rutten, Victor P., Saalmüller, Armin, Storset, Anne K., Toman, Miroslav, Werling, Dirk, Weber, Corinna N., and Mauel, Susanne
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.