Search results for " intelligence"

showing 10 items of 6677 documents

Complex objects classified by morphological shape analysis and elliptical Fourier descriptors

2005

This chapter deals with the classification of complex objects by morphological shape analysis and elliptical Fourier descriptors. An unsupervised method has been proposed to identify components with specific shapes by a simple edge detector and to classify them via the description of their contours. A particular application has been arranged in order to evaluate the goodness of this approach when discriminating between normal and pathological human megakaryocytes. Alterations in these cells can occur in many pathological processes and in such cases the pattern, size and shape of the cytoplasm and/or of the nucleus are extremely varied.

symbols.namesakeFourier transformSettore INF/01 - InformaticaComputer sciencebusiness.industrysymbolsComputer visionArtificial intelligenceComplex objects classified by morphological shape analysis and elliptical Fourier descriptorsbusinessShape analysis (digital geometry)
researchProduct

Recenzja: J. Widacki, A. Szuba-Boroń, Sprawy o szpiegostwo przed sądami wileńskimi w okresie II RP. Przyczynek do historii zmagań polskiego wywiadu i…

2021

Problematyka badawcza, którą podjęli J. Widacki i A. Szuba-Boroń nie była dotąd przedmiotem zainteresowań naukowych. Jan Widacki podczas sprawowania misji dyplomatycznej w Wilnie kontynuował swoje zainteresowania naukowe, docierając do akt spraw o szpiegostwo z okresu międzywojennego. Natomiast Anna Szuba- -Boroń badając m.in. akta spraw o szpiegostwo zajęła się prozą Sergiusza Piaseckiego, pisarza i byłego szpiega. Obraz pogranicza, a w nim walka wywiadów sowieckiego, litewskiego oraz polskiego kontrwywiadu to niewątpliwie interesujące tło do ba-dań. Autorzy zdają sobie sprawę z ograniczeń badawczych, nie dotarli bowiem do spraw sądzonych w innych sądach okręgowych znajdujących się na tere…

szpiegostwo litewskieespionage in criminal law Second Polish Republicszpiegostwo w prawie karnym II RPintelligence KOP (Border Protection Corps)Soviet intelligenceLithuanian espionagewywiad sowieckiwywiad KOP (Korpusu Ochrony Pogranicza)wywiad litewskiLithuanian intelligenceMiscellanea Historico-Iuridica
researchProduct

Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system

2017

We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…

ta1130209 industrial biotechnologyMathematical optimizationnumerical modelsOptimization problemlineaarinen optimointiLinear programmingComputer sciencesoftwarehydraulijärjestelmätventilationEvolutionary algorithmlinear programming02 engineering and technologyFunction (mathematics)Set (abstract data type)resistance020901 industrial engineering & automationhydraulic systemsilmanvaihto0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingShape optimizationoptimization
researchProduct

Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music

2011

Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…

ta113Acoustics and UltrasonicsComputer sciencebusiness.industryDimensionality reductionEmotion classificationFeature selectionOverfittingMachine learningcomputer.software_genreNaive Bayes classifierFeature (machine learning)Music information retrievalGeneralizability theoryArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

Acoustic detection and classification of river boats

2011

We present a robust algorithm to detect the arrival of a boat of a certain type when other background noises are present. It is done via the analysis of its acoustic signature against an existing database of recorded and processed acoustic signals. We characterize the signals by the distribution of their energies among blocks of wavelet packet coefficients. To derive the acoustic signature of the boat of interest, we use the Best Discriminant Basis method. The decision is made by combining the answers from the Linear Discriminant Analysis (LDA) classifier and from the Classification and Regression Trees (CART) that is also accompanied with an additional unit, called Aisles, that reduces fal…

ta113Acoustics and UltrasonicsNetwork packetbusiness.industryPattern recognitionLinear discriminant analysisRegressionWaveletDiscriminantAcoustic signatureProcess controlArtificial intelligencebusinessClassifier (UML)MathematicsApplied Acoustics
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

DOBRO : a prediction error correcting robot under drifts

2016

We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.

ta113Concept driftComputer scienceMean squared prediction error02 engineering and technologyARIMAconcept drifton-line prediction error correction020204 information systems0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingAutoregressive integrated moving averageSimulation
researchProduct

A Cooperative Coevolution Framework for Parallel Learning to Rank

2015

We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…

ta113Cooperative coevolutionTheoretical computer scienceLearning to RankComputer sciencebusiness.industryRank (computer programming)Genetic ProgrammingEvolutionary algorithmContext (language use)Genetic programmingImmune ProgrammingMachine learningcomputer.software_genreEvolutionary computationComputer Science ApplicationsComputational Theory and MathematicsCooperative CoevolutionInformation RetrievalBenchmark (computing)Learning to rankArtificial intelligencebusinesscomputerInformation SystemsIEEE Transactions on Knowledge and Data Engineering
researchProduct

Gear classification and fault detection using a diffusion map framework

2015

This article proposes a system health monitoring approach that detects abnormal behavior of machines. Diffusion map is used to reduce the dimensionality of training data, which facilitates the classification of newly arriving measurements. The new measurements are handled with Nyström extension. The method is trained and tested with real gear monitoring data from several windmill parks. A machine health index is proposed, showing that data recordings can be classified as working or failing using dimensionality reduction and warning levels in the low dimensional space. The proposed approach can be used with any system that produces high-dimensional measurement data. peerReviewed

ta113Diffusion (acoustics)Training setta214Computer scienceDimensionality reductiondiffusion mapExtension (predicate logic)computer.software_genreFault detection and isolationfault detectionsystem health monitoringArtificial IntelligenceSignal ProcessingComputer Vision and Pattern RecognitionData miningCluster analysiscomputerSoftwareCurse of dimensionalityclustering
researchProduct