Search results for " learning"
showing 10 items of 5299 documents
Combining Supervised and Unsupervised Learning to Discover Emotional Classes
2017
Most previous work in emotion recognition has fixed the available classes in advance, and attempted to classify samples into one of these classes using a supervised learning approach. In this paper, we present preliminary work on combining supervised and unsupervised learning to discover potential latent classes which were not initially considered. To illustrate the potential of this hybrid approach, we have used a Self-Organizing Map (SOM) to organize a large number of Electroencephalogram (EEG) signals from subjects watching videos, according to their internal structure. Results suggest that a more useful labelling scheme could be produced by analysing the resulting topology in relation t…
Learning Improved Feature Rankings through Decremental Input Pruning for Support Vector Based Drug Activity Prediction
2010
The use of certain machine learning and pattern recognition tools for automated pharmacological drug design has been recently introduced. Different families of learning algorithms and Support Vector Machines in particular have been applied to the task of associating observed chemical properties and pharmacological activities to certain kinds of representations of the candidate compounds. The purpose of this work, is to select an appropriate feature ordering from a large set of molecular descriptors usually used in the domain of Drug Activity Characterization. To this end, a new input pruning method is introduced and assessed with respect to commonly used feature ranking algorithms.
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
2016
International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
2013
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…
How neurophysiological measures can be used to enhance the evaluation of remote tower solutions
2019
New solutions in operational environments are often, among objective measurements, evaluated by using subjective assessment and judgment from experts. Anyhow, it has been demonstrated that subjective measures suffer from poor resolution due to a high intra and inter-operator variability. Also, performance measures, if available, could provide just partial information, since an operator could achieve the same performance but experiencing a different workload. In this study, we aimed to demonstrate: (i) the higher resolution of neurophysiological measures in comparison to subjective ones; and (ii) how the simultaneous employment of neurophysiological measures and behavioral ones could allow a…
Automated prostate gland segmentation based on an unsupervised fuzzy C-means clustering technique using multispectral T1w and T2w MR imaging
2017
Prostate imaging analysis is difficult in diagnosis, therapy, and staging of prostate cancer. In clinical practice, Magnetic Resonance Imaging (MRI) is increasingly used thanks to its morphologic and functional capabilities. However, manual detection and delineation of prostate gland on multispectral MRI data is currently a time-expensive and operator-dependent procedure. Efficient computer-assisted segmentation approaches are not yet able to address these issues, but rather have the potential to do so. In this paper, a novel automatic prostate MR image segmentation method based on the Fuzzy C-Means (FCM) clustering algorithm, which enables multispectral T1-weighted (T1w) and T2-weighted (T…
Adaptive Importance Sampling: The past, the present, and the future
2017
A fundamental problem in signal processing is the estimation of unknown parameters or functions from noisy observations. Important examples include localization of objects in wireless sensor networks [1] and the Internet of Things [2]; multiple source reconstruction from electroencephalograms [3]; estimation of power spectral density for speech enhancement [4]; or inference in genomic signal processing [5]. Within the Bayesian signal processing framework, these problems are addressed by constructing posterior probability distributions of the unknowns. The posteriors combine optimally all of the information about the unknowns in the observations with the information that is present in their …
CSCL for NGO's Cross cultural Virtual Teams in Africa: An Ethiopian Children Advocacy Case Study against Exclusion and toward Facilitation of Express…
2005
This exploratory pilot study shows that NGO's involved in Children Advocacy through Arts in Africa are willing to use a groupware, meaning a computer supported collaborative learning (CSCL) environment. Innovative ideas and best practices among NGOs would be shared easily worldwide. Little scientific information is available to help them make a sound choice. This study suggests that some NGOs based in Ethiopia/Africa have specific needs which should translate in specific context analysis and interface development: 1) an intercultural approach to creativity, arts and innovation, and 2) emphasis should be placed on tools to facilitate asynchronous systematic conception and sharing of intra an…
CORENup: a combination of convolutional and recurrent deep neural networks for nucleosome positioning identification
2020
Abstract Background Nucleosomes wrap the DNA into the nucleus of the Eukaryote cell and regulate its transcription phase. Several studies indicate that nucleosomes are determined by the combined effects of several factors, including DNA sequence organization. Interestingly, the identification of nucleosomes on a genomic scale has been successfully performed by computational methods using DNA sequence as input data. Results In this work, we propose CORENup, a deep learning model for nucleosome identification. CORENup processes a DNA sequence as input using one-hot representation and combines in a parallel fashion a fully convolutional neural network and a recurrent layer. These two parallel …
Learning paths on elementary university courses in Finnish as a second language
2015
Along with the growing degree of internationalisation, Finnish university education needs to address issues related to learning and teaching Finnish as a second language. From the perspective of teaching Finnish and related pedagogical development, it is essential to recognise when, where and for which purposes learners need Finnish at the various stages of the language acquisition process. This article focuses on the learning paths of three international students who studied Finnish on a one-term elementary course at the University of Jyvaskyla Language Centre. The article is based on a socio-cultural and ecological view on language learning and teaching. The data consist of learning diary…