Search results for " Mach"

showing 10 items of 1388 documents

Superior Performances of the Neural Network on the Masses Lesions Classification through Morphological Lesion Differences

2007

Purpose of this work is to develop an automatic classification system that could be useful for radiologists in the breast cancer investigation. The software has been designed in the framework of the MAGIC-5 collaboration. In an automatic classification system the suspicious regions with high probability to include a lesion are extracted from the image as regions of interest (ROIs). Each ROI is characterized by some features based generally on morphological lesion differences. A study in the space features representation is made and some classifiers are tested to distinguish the pathological regions from the healthy ones. The results provided in terms of sensitivity and specificity will be p…

Computer Aided DetectionSupport Vector MachineNeural NetworksK-Nearest Neighbours
researchProduct

What is it about humanity that we can't give away to intelligent machines? A European perspective

2021

Abstract One of the most significant recent technological developments concerns the development and implementation of ‘intelligent machines’ that draw on recent advances in artificial intelligence (AI) and robotics. However, there are growing tensions between human freedoms and machine controls. This article reports the findings of a workshop that investigated the application of the principles of human freedom throughout intelligent machine development and use. Forty IS researchers from ten different countries discussed four contemporary AI and humanity issues and the most relevant IS domain challenges. This article summarizes their experiences and opinions regarding four AI and humanity th…

Computer Networks and Communications05 social sciencesPerspective (graphical)02 engineering and technologyLibrary and Information SciencesROBÔSDomain (software engineering)020204 information systems0502 economics and businessHumanity0202 electrical engineering electronic engineering information engineering050211 marketingEngineering ethicsSociologyIntelligent machineInformation SystemsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

BELM: Bayesian Extreme Learning Machine

2011

The theory of extreme learning machine (ELM) has become very popular on the last few years. ELM is a new approach for learning the parameters of the hidden layers of a multilayer neural network (as the multilayer perceptron or the radial basis function neural network). Its main advantage is the lower computational cost, which is especially relevant when dealing with many patterns defined in a high-dimensional space. This brief proposes a bayesian approach to ELM, which presents some advantages over other approaches: it allows the introduction of a priori knowledge; obtains the confidence intervals (CIs) without the need of applying methods that are computationally intensive, e.g., bootstrap…

Computer Networks and CommunicationsComputer scienceComputer Science::Neural and Evolutionary ComputationBayesian probabilityOverfittingMachine learningcomputer.software_genrePattern Recognition AutomatedReduction (complexity)Artificial IntelligenceComputer SimulationRadial basis functionExtreme learning machineArtificial neural networkbusiness.industryEstimation theoryBayes TheoremGeneral MedicineComputer Science ApplicationsMultilayer perceptronNeural Networks ComputerArtificial intelligencebusinesscomputerAlgorithmsSoftwareIEEE Transactions on Neural Networks
researchProduct

SAGECELL: Software-Defined Space-Air-Ground Integrated Moving Cells

2018

Ultra-dense networks (UDNs) provide an effective solution to accommodate the explosively growing data traffic of multimedia services and real-time applications. However, the densification of large numbers of static small cells faces many fundamental challenges, including deployment cost, energy consumption and control, and so on. This motivates us to develop software-defined space-air-ground integrated moving cells (SAGECELL), a programmable, scalable, and flexible framework to integrate space, air, and ground resources for matching dynamic traffic demands with network capacity supplies. First, we provide a comprehensive review of state-of-the-art literature. Then the conceptual architectur…

Computer Networks and CommunicationsComputer scienceDistributed computingInteroperability02 engineering and technologyaerospace electronics0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringresource managementResource managementcomputer architecturevirtual machine monitorsElectrical and Electronic Engineeringta113Flexibility (engineering)ta213Quality of service020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionmiehittämättömät ilma-aluksetConceptual architectureComputer Science ApplicationsSoftware deploymentScalabilityquality of serviceunmanned aerial vehicleslangattomat verkotIEEE Communications Magazine
researchProduct

Moving Learning Machine Towards Fast Real-Time Applications: A High-Speed FPGA-based Implementation of the OS-ELM Training Algorithm

2018

Currently, there are some emerging online learning applications handling data streams in real-time. The On-line Sequential Extreme Learning Machine (OS-ELM) has been successfully used in real-time condition prediction applications because of its good generalization performance at an extreme learning speed, but the number of trainings by a second (training frequency) achieved in these continuous learning applications has to be further reduced. This paper proposes a performance-optimized implementation of the OS-ELM training algorithm when it is applied to real-time applications. In this case, the natural way of feeding the training of the neural network is one-by-one, i.e., training the neur…

Computer Networks and CommunicationsComputer scienceReal-time computingParameterized complexitylcsh:TK7800-836002 engineering and technologyextreme learning machine0202 electrical engineering electronic engineering information engineeringSensitivity (control systems)Electrical and Electronic EngineeringEnginyeria d'ordinadorsField-programmable gate arrayFPGAExtreme learning machineEnginyeria elèctricaArtificial neural networkData stream mininglcsh:Electronics020206 networking & telecommunicationsOS-ELMreal-time learningHardware and ArchitectureControl and Systems Engineeringon-chip trainingSignal Processingon-line learning020201 artificial intelligence & image processingDistributed memoryonline sequential ELMhardware implementationAlgorithm
researchProduct

Perceptual adaptive insensitivity for support vector machine image coding.

2005

Support vector machine (SVM) learning has been recently proposed for image compression in the frequency domain using a constant epsilon-insensitivity zone by Robinson and Kecman. However, according to the statistical properties of natural images and the properties of human perception, a constant insensitivity makes sense in the spatial domain but it is certainly not a good option in a frequency domain. In fact, in their approach, they made a fixed low-pass assumption as the number of discrete cosine transform (DCT) coefficients to be used in the training was limited. This paper extends the work of Robinson and Kecman by proposing the use of adaptive insensitivity SVMs [2] for image coding u…

Computer Networks and CommunicationsImage processingPattern Recognition AutomatedArtificial IntelligenceDistortionImage Interpretation Computer-AssistedDiscrete cosine transformComputer SimulationMathematicsModels StatisticalArtificial neural networkbusiness.industryPattern recognitionSignal Processing Computer-AssistedGeneral MedicineData CompressionComputer Science ApplicationsSupport vector machineFrequency domainVisual PerceptionA priori and a posterioriArtificial intelligencebusinessSoftwareAlgorithmsImage compressionIEEE transactions on neural networks
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

Predicting overweight and obesity in later life from childhood data: A review of predictive modeling approaches

2019

Background: Overweight and obesity are an increasing phenomenon worldwide. Predicting future overweight or obesity early in the childhood reliably could enable a successful intervention by experts. While a lot of research has been done using explanatory modeling methods, capability of machine learning, and predictive modeling, in particular, remain mainly unexplored. In predictive modeling models are validated with previously unseen examples, giving a more accurate estimate of their performance and generalization ability in real-life scenarios. Objective: To find and review existing overweight or obesity research from the perspective of employing childhood data and predictive modeling metho…

Computer Science - Machine LearningStatistics - Machine LearningStatistics - Applications
researchProduct

Computational Complexity and Communication: Coordination in Two-Player Games

2002

The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by means of computationally restricted unmediated communication. This result provides an example in game theory where limitations of computational abilities of players are helpful in solv…

Computer Science::Computer Science and Game TheoryEconomics and EconometricsCorrelated equilibriumTheoretical computer scienceComputational complexity theorybusiness.industryCryptographyComputational resourceTuring machinesymbols.namesakeNash equilibriumsymbolsbusinessCommunications protocolGame theoryAlgorithmMathematicsEconometrica
researchProduct