Search results for "Intelligence"

showing 10 items of 6959 documents

Automatic dynamic texture segmentation using local descriptors and optical flow

2012

A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…

ta113business.industrySegmentation-based object categorizationComputer scienceTexture DescriptorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowScale-space segmentationPattern recognitionImage segmentationComputer Graphics and Computer-Aided DesignImage textureMotion fieldRegion growingComputer Science::Computer Vision and Pattern RecognitionHistogramComputer visionSegmentationArtificial intelligencebusinessSoftwareIEEE Transactions on Image Processing
researchProduct

Turing's error-revised

2016

Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…

ta113computationClass (set theory)modelformal language02 engineering and technologyconsciousnessArgumentation theoryEpistemologyTuring machineTuring machinesymbols.namesake020204 information systemsFormal language0202 electrical engineering electronic engineering information engineeringsymbolsSelection (linguistics)020201 artificial intelligence & image processingSociologyConstruct (philosophy)TuringcomputermindNatural languagecomputer.programming_languageInternational Journal of Philosophy Study
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct

Biased graph walks for RDF graph embeddings

2017

Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…

ta113graph embeddingsGraph kernelComputer scienceVoltage graphComparability graphdata mining02 engineering and technologycomputer.software_genre020204 information systemsyhdistetty avoin tietolinked open data0202 electrical engineering electronic engineering information engineeringTopological graph theoryGraph (abstract data type)020201 artificial intelligence & image processingData miningtiedonlouhintaGraph propertyNull graphLattice graphavoin tietocomputerProceedings of the 7th International Conference on Web Intelligence, Mining and Semantics
researchProduct

An intelligent learning support system

2017

Fast-growing technologies are shaping many aspects of societies. Educational systems, in general, are still rather traditional: learner applies for school or university, chooses the subject, takes the courses, and finally graduates. The problem is that labor markets are constantly changing and the needed professional skills might not match with the curriculum of the educational program. It might be that it is not even possible to learn a combination of desired skills within one educational organization. For example, there are only a few universities that can provide high-quality teaching in several different areas. Therefore, learners may have to study specific modules and units somewhere e…

ta113intelligent learning systemsoppimisympäristöError-driven learningoppiminenComputer scienceIntelligent decision support system02 engineering and technologyopetuscareer developmenturakehityspersonalized educationHuman–computer interactionadaptive education020204 information systems0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONälytekniikka020201 artificial intelligence & image processingLearning supportta516personointi
researchProduct

Supporting Institutional Awareness and Academic Advising using Clustered Study Profiles

2017

The purpose of academic advising is to help students with developing educational plans that support their academic career and personal goals, and to provide information and guidance on studies. Planning and management of the students’ study path is the main joint activity in advising. Based on a study log of passed courses, we propose to use robust, prototype-based clustering to identify a set of actual study path profiles. Such profiles identify groups of students with similar progress of studies, whose analysis and interpretation can be used for better institutional awareness and to support evidence-based academic advising. A model of automated academic advising system utilizing the possi…

ta113learning analyticsMedical educationKnowledge managementopiskelijatoppiminenComputer sciencebusiness.industry05 social sciencestutorointi050301 education02 engineering and technologyAcademic advisingopintopolutmentorointikorkea-asteen koulutusComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingta516academic advisingbusinessrobust clustering0503 educationarviointi
researchProduct

Determining the number of sources in high-density EEG recordings of event-related potentials by model order selection

2011

To high-density electroencephalography (EEG) recordings, determining the number of sources to separate the signal and the noise subspace is very important. A mostly used criterion is that percentage of variance of raw data explained by the selected principal components composing the signal space should be over 90%. Recently, a model order selection method named as GAP has been proposed. We investigated the two methods by performing independent component analysis (ICA) on the estimated signal subspace, assuming the number of selected principal components composing the signal subspace is equal to the number of sources of brain activities. Through examining wavelet-filtered EEG recordings (128…

ta113medicine.diagnostic_testNoise (signal processing)business.industryPattern recognitionElectroencephalographyExplained variationIndependent component analysisSignalPrincipal component analysismedicineArtificial intelligencebusinessSubspace topologyMathematicsSignal subspace2011 IEEE International Workshop on Machine Learning for Signal Processing
researchProduct

Modelling Recurrent Events for Improving Online Change Detection

2016

The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …

ta113noiseComputer scienceData stream miningMessage passingDetectordata streamsonline change detection02 engineering and technologycomputer.software_genreTask (computing)recurrent eventschange points020204 information systems0202 electrical engineering electronic engineering information engineeringProbability distribution020201 artificial intelligence & image processingNoise (video)Data miningBaseline (configuration management)computerChange detectionProceedings of the 2016 SIAM International Conference on Data Mining
researchProduct

Methods for estimating forest stem volumes by tree species using digital surface model and CIR images taken from light UAS

2012

In this paper we consider methods for estimating forest tree stem volumes by species using images taken from light unmanned aircraft systems (UAS). Instead of using LiDAR and additional multiband imagery a color infrared camera mounted to a light UAS is used to acquire both imagery and the DSM of target area. The goal of this study is to accurately estimate tree stem volumes in three classes. The status of the ongoing work is described and an initial method for delineating and classifying treetops is presented.

ta113precision agriculturebusiness.industryComputer scienceUAVtarget detectionPiezo actuatorsmedical imagingairborneFabry-Perot Interferometerimaging spectrometerTree (data structure)Hyperspectral sensorsLidarRemote sensing (archaeology)Computer visionArtificial intelligencemultispectral image sensorsDigital surfacebusinessTree speciesRemote sensingProceedings of SPIE
researchProduct

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

2014

Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…

ta113random projectionMahalanobis distanceComputer sciencebusiness.industryAnomaly-based intrusion detection systemintrusion detectionDimensionality reductionRandom projectionPattern recognitionIntrusion detection systemcomputer.software_genrekoneoppiminenAnomaly detectionData miningArtificial intelligencetiedonlouhintaAnomaly (physics)mahalanobis distancebusinesscomputerCurse of dimensionality2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct