Search results for "Mach"

showing 10 items of 3360 documents

A Sentiment Enhanced Deep Collaborative Filtering Recommender System

2021

Recommender systems use advanced analytic and learning techniques to select relevant information from massive data and inform users’ smart decision-making on their daily needs. Numerous works exploiting user’s sentiments on products to enhance recommendations have been introduced. However, there has been relatively less work exploring higher-order user-item features interactions for sentiment enhanced recommender system. In this paper, a novel Sentiment Enhanced Deep Collaborative Filtering Recommender System (SE-DCF) is developed. The architecture is based on a Neural Attention network component aggregated with the output predictions of a Convolution Neural Network (CNN) recommender. Speci…

business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreConvolutional neural networkAttention networkComponent (UML)Collaborative filteringArtificial intelligenceArchitecturebusinesscomputerRelevant informationMutual influence
researchProduct

Cognitive Reasoning and Inferences through Psychologically based Personalised Modelling of Emotions Using Associative Classifiers

2014

The development of Microsoft Kinect opened up the research field of computational emotions to a wide range of applications, such as learning environments, which are excellent candidates to trial computational emotions based algorithms but were never feasible for given consumer technologies. Whilst Kinect is accessible and affordable technology it comes with its' own additional challenges such as the limited number of extracted Action Units (AUs). This paper presents a new approach that attempts at finding patterns of interaction between AUs and each other on one hand and patterns that link the related AUs to a given emotion. In doing so, this paper presents the ground work necessary to reac…

business.industryComputer scienceSentiment analysisNumerical modelsMachine learningcomputer.software_genreField (computer science)Range (mathematics)Action (philosophy)Encoding (memory)Artificial intelligenceSet (psychology)businesscomputerAssociative property
researchProduct

Evaluating Classifiers for Mobile-Masquerader Detection

2006

As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…

business.industryComputer scienceSmall numberLinear classifierPattern recognitionMachine learningcomputer.software_genreRandom subspace methodInformation sensitivityComputingMethodologies_PATTERNRECOGNITIONArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

On the Generalizability of Programs Synthesized by Grammar-Guided Genetic Programming

2021

Grammar-guided Genetic Programming is a common approach for program synthesis where the user’s intent is given by a set of input/output examples. For use in real-world software development, the generated programs must work on previously unseen test cases too. Therefore, we study in this work the generalizability of programs synthesized by grammar-guided GP with lexicase selection. As benchmark, we analyze proportionate and tournament selection too. We find that especially for program synthesis problems with a low output cardinality (e.g., a Boolean output) lexicase selection overfits the training cases and does not generalize well to unseen test cases. An analysis using common software metr…

business.industryComputer scienceSoftware developmentGenetic programming02 engineering and technologyMachine learningcomputer.software_genreTournament selectionSoftware metricTest case020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryArtificial intelligencebusinesscomputerSelection (genetic algorithm)Program synthesis
researchProduct

A Support Vector Machine Signal Estimation Framework

2018

Support vector machine (SVM) were originally conceived as efficient methods for pattern recognition and classification, and the SVR was subsequently proposed as the SVM implementation for regression and function approximation. Nowadays, the SVR and other kernel‐based regression methods have become a mature and recognized tool in digital signal processing (DSP). This chapter starts to pave the way to treat all the problems within the field of kernel machines, and presents the fundamentals for a simple, framework for tackling estimation problems in DSP using support vector machine SVM. It outlines the particular models and approximations defined within the framework. The chapter concludes wit…

business.industryComputer scienceSystem identificationArray processingMachine learningcomputer.software_genreSupport vector machineFunction approximationKernel (statistics)Pattern recognition (psychology)Artificial intelligenceTime seriesbusinesscomputerDigital signal processing
researchProduct

Learning Bayesian Metanetworks from Data with Multilevel Uncertainty

2006

Managing knowledge by maintaining it according to dynamic context is among the basic abilities of a knowledge-based system. The two main challenges in managing context in Bayesian networks are the introduction of contextual (in)dependence and Bayesian multinets. We are presenting one possible implementation of a context sensitive Bayesian multinet-the Bayesian Metanetwork, which implies that interoperability between component Bayesian networks (valid in different contexts) can be also modelled by another Bayesian network. The general concepts and two kinds of such Metanetwork models are considered. The main focus of this paper is learning procedure for Bayesian Metanetworks.

business.industryComputer scienceTheoryofComputation_GENERALBayesian networkBayesian inferenceMachine learningcomputer.software_genreVariable-order Bayesian networkBayesian statisticsComputingMethodologies_PATTERNRECOGNITIONBayesian hierarchical modelingBayesian programmingGraphical modelArtificial intelligencebusinesscomputerDynamic Bayesian network
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct

On the Characterization of Distributed Virtual Environment Systems

2003

Distributed Virtual Environment systems have experienced a spectacular growth last years. One of the key issues in the design of scalable and cost-effective DVE systems is the partitioning problem. This problem consists of efficiently assigning clients (3-D avatars) to the servers in the system, and some techniques have been already proposed for solving it.

business.industryComputer scienceVirtual machineServerEmbedded systemDistributed computingScalabilityVirtual realityLoad balancing (computing)businessKey issuescomputer.software_genrecomputer
researchProduct

A novel method for network intrusion detection based on nonlinear SNE and SVM

2017

In the case of network intrusion detection data, pre-processing techniques have been extensively used to enhance the accuracy of the model. An ideal intrusion detection system (IDS) is one that has appreciable detection capability overall the group of attacks. An open research problem of this area is the lower detection rate for less frequent attacks, which result from the curse of dimensionality and imbalanced class distribution of the benchmark datasets. This work attempts to minimise the effects of imbalanced class distribution by applying random under-sampling of the majority classes and SMOTE-based oversampling of minority classes. In order to alleviate the issue arising from the curse…

business.industryComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingDimensionality reductionFeature vectorPattern recognitionGeneral MedicineIntrusion detection systemSupport vector machineBenchmark (computing)EmbeddingRadial basis functionArtificial intelligencebusinessCurse of dimensionality
researchProduct

Hybrid descriptive-inferential method for key feature selection in prostate cancer radiomics

2021

In healthcare industry 4.0, a big role is played by radiomics. Radiomics concerns the extraction and analysis of quantitative information not visible to the naked eye, even by expert operators, from biomedical images. Radiomics involves the management of digital images as data matrices, with the aim of extracting a number of morphological and predictive variables, named features, using automatic or semi-automatic methods. Multidisciplinary methods as machine learning and deep learning are fully involved in this field. However, the large number of features requires efficient and effective core methods for their selection, in order to avoid bias or misinterpretations problems. In this work, t…

business.industryComputer sciencefeature selection image analysis prostate cancer radiomicsFeature selectionManagement Science and Operations Researchmedicine.diseaseMachine learningcomputer.software_genreprostate cancerGeneral Business Management and AccountingProstate cancerRadiomicsimage analysisradiomicsModeling and SimulationFeature selectionmedicineKey (cryptography)Artificial intelligencebusinesscomputer
researchProduct