Search results for "Mach"

showing 10 items of 3360 documents

Accidents du travail dans l’UE-15 et méthodes d’apprentissage automatique

2020

Les méthodes d’apprentissage automatique ont été utilisées comme outil de prédiction dans denombreux domaines, mais leur utilisation en santé et sécurité au travail est relativement nouvelle.C’est la raison pour laquelle, il serait intéressant d’utiliser ces méthodes dans la prévision desaccidents du travail, sur les données d’enquêtes européennes sur les conditions de travail. L’objectifde ce travail est de tester les performances des techniques d’apprentissage automatique dans lamodélisation et la prédiction d’accidents du travail. A cette fin, nous utiliserons trois modèles :(les forêts aléatoires) (RF), Support Vector Machine (SVM), modèle logistique. Nous observonsque, la performance d…

travailautomatiquesécurité santéprédictionaccident[SHS] Humanities and Social SciencesIntelligence artificiellesantéÉconomieapprentissage[STAT.ML] Statistics [stat]/Machine Learning [stat.ML]
researchProduct

Land surface temperature and evapotranspiration estimation in the Amazon evergreen forests using remote sensing data

2019

Amazonian tropical forests play a significant role in global water, carbon and energy cycles. Considering the relevance of this biome and the climate change projections which predict a hotter and drier climate for the region, the monitoring of the vegetation status of these forests becomes of significant importance. In this context, vegetation temperature and evapotranspiration (ET) can be considered as key variables. Vegetation temperature is directly linked with plant physiology. In addition, some studies have shown the existing relationship between this variable and the CO2 absorption capacity and biomass loss of these forests. Evapotranspiration resulting from the combined processes of …

tropical forestsmodis:CIENCIAS DE LA TIERRA Y DEL ESPACIO::Otras especialidades de la tierra espacio o entorno [UNESCO]amazonevapotranspirationUNESCO::FÍSICA::Termodinámicaland surface temperatureviirsmachine learningUNESCO::CIENCIAS DE LA TIERRA Y DEL ESPACIO::Otras especialidades de la tierra espacio o entornocloud mask:FÍSICA::Termodinámica [UNESCO]slstr
researchProduct

Design, fabrication and evaluation of an online Intelligent machine for trout beheading and gutting

2021

La clasificación y procesado de pescado empleando máquinas automáticas reduce costes e incrementa el volumen de procesado. Después de su llegada a los mercados de distribución mayorista y minorista, el tamaño de los ejemplares suele ser muy variado para la mayoría de las especies (trucha, caballa, dorada, lubina, etc.). Debido a ello, la limpieza y corte de pescado se realiza habitualmente de forma manual. Este proceso involucra diferentes pasos y a menudo se corta en función de la demanda del usuario: sin cabeza, sin vísceras, sin cabeza ni vísceras, fileteado, etc. Combinando diferentes elementos tecnológicos, hoy en día es posible el desarrollo de sistemas automáticos capaces de mejorar …

troutUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología e ingeniería mecánicas::Maquinaria para la industria de la alimentaciónfish processingfish cleaning machineimage processingmachine automation:CIENCIAS TECNOLÓGICAS::Tecnología e ingeniería mecánicas::Maquinaria para la industria de la alimentación [UNESCO]
researchProduct

Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets

2015

Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast to detrimental the networks and hosts. Due to these reasons real-time monitoring, processing and intrusion detection are now among the key features of NIDS. Traditional types of intrusion detection systems such as signature base IDS are not able detect intrusions with new and complex strategies. Now days, automatic traffic analysis and anomaly intrusion detection became more efficient in field of network security however they suffer from high number of false alarms. Among all …

tunkeilijan havaitsemisjärjestelmätintrusion detectionmonitorointitietoliikenneverkottiedonsiirtoanomaly detectionreaaliaikaisuusmachine learningclustering (unsupervised)koneoppiminenalgoritmitnetwork securityklusterianalyysitietoturvaverkkohyökkäykset
researchProduct

Ordered fuzzy rules generation based on incremental dataset

2021

This paper proposes a novel approach for building transparent knowledge-based systems by generating interpretable fuzzy rules that allow for present dependences between quantitative variables by accounting for uncertainty and the dynamics of their values. In the approach, IF-THEN rules are used to show the conditional relationship between the ordered fuzzy numbers, which contain additional information about the tendencies of variables' value changes. This paper elaborates an approach of mining ordered fuzzy rules from numerical data included in an incremental database. This approach develops the ability to record uncertainty and its change in the context of rapidly changing data. In additio…

uncertainty modelingfuzzy setBasis (linear algebra)Computer scienceInferenceValue (computer science)Context (language use)computer.software_genreFuzzy logicordered fuzzy numberKnowledge-based systemsmachine learningordered fuzzy rulesFuzzy numberProduction (economics)Data miningrules generationcomputer2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
researchProduct

Application of the Information Bottleneck method to discover user profiles in a Web store

2018

The paper deals with the problem of discovering groups of Web users with similar behavioral patterns on an e-commerce site. We introduce a novel approach to the unsupervised classification of user sessions, based on session attributes related to the user click-stream behavior, to gain insight into characteristics of various user profiles. The approach uses the agglomerative Information Bottleneck (IB) algorithm. Based on log data for a real online store, efficiency of the approach in terms of its ability to differentiate between buying and non-buying sessions was validated, indicating some possible practical applications of the our method. Experiments performed for a number of session sampl…

unsupervised classificationComputer science02 engineering and technologyE-commerceCustomer profile020204 information systems0202 electrical engineering electronic engineering information engineeringe-commerceWeb storeCluster analysisUser profileInformation retrievalbusiness.industrycustomer profileBehavioral patternInformation bottleneck methoddata miningComputer Science Applicationsmachine learningComputational Theory and MathematicsAgglomerative Information Bottleneck020201 artificial intelligence & image processinguser profilebusinessclusteringInformation SystemsJournal of Organizational Computing and Electronic Commerce
researchProduct

Automatic evaluation of information provider reliability and expertise

2013

Published version of an article in the journal: World Wide Web. Also available from the publisher at: http://dx.doi.org/10.1007/s11280-013-0249-x Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradicting answers, causing an ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. These two attributes (reliability and expertise) significantly affect the quality o…

user expertiseDistributed databaseComputer Networks and Communicationsbusiness.industryComputer scienceAggregate (data warehouse)Behavior changeCognitionMachine learningcomputer.software_genrePeer reviewuser reliabilityVDP::Mathematics and natural science: 400::Information and communication science: 420Hardware and ArchitectureOrder (business)Q&A social networksPairwise comparisonArtificial intelligencebusinessSubjective logicSet (psychology)computerSoftwareReliability (statistics)subjective logic
researchProduct

Violencia en relaciones de pareja jóvenes

2012

La violencia contra la mujer en las relaciones de pareja es un fenómeno que ocurre desde tiempos inmemoriales. Entonces se consideraba como algo privado dentro de la relación de pareja y únicamente concernía a los miembros de la misma, incluso en los medios de comunicación aparecían estadísticas sobre accidentes de tráfico al tiempo que se ignoraba la incidencia de feminicidios y agresiones sexuales contra mujeres. Afortunadamente desde hace 50 años se empieza a hablar de ello desde una perspectiva científica, empieza a tener relevancia en todos los ámbitos culturales y se entiende que su erradicación es necesaria, requiriéndose para ello abordajes multidisciplinares e interinstitucionales.…

violencia de géneromujeresviolenciaviolencia machistaUNESCO::PSICOLOGÍA::Estudio psicológico de temas sociales:PSICOLOGÍA::Estudio psicológico de temas sociales [UNESCO]jóvenes agresores
researchProduct

Violencia machista: tolerancia cero

2015

Con motivo del Día Internacional de la Eliminación de la Violencia contra la Mujer, breve reflexión acerca de la violencia hacia mujeres y niñas por razón de género que sigue siendo una auténtica lacra social a erradicar y constituye una verdadera preocupación mundial, en cuya prevención y erradicación debemos implicarnos tanto la sociedad como las distintas instituciones y gobiernos.

violencia género:CIENCIAS JURÍDICAS Y DERECHO [UNESCO]UNESCO::CIENCIAS JURÍDICAS Y DERECHOviolencia machistaderecho penal
researchProduct

Damping Provision by Different Virtual Synchronous Machine Schemes

2020

The adoption of virtual synchronous machine (VSM) schemes for the control of power converters is gaining more and more attention both in academia and industry. The VSM control strategies fall into the category of grid-forming converter controls, and they are intended for a range of different applications, providing specific services and different kinds of support to the grid. The paper investigates the possibility of damping provision to the system by VSM power converters. Different schemes are considered and compared, showing the opportunity of the investigated solutions through combined modal and time domain analyses. A specific modification of the power synchronization loop is recognized…

virtual synchronous machineComputer science020209 energy020208 electrical & electronic engineeringControl engineering02 engineering and technologysystem oscillationsConvertersdynamic analysisGridDampingSynchronizationgrid formingPower (physics)Phase-locked loopSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaModal0202 electrical engineering electronic engineering information engineeringTime domainSynchronous motor
researchProduct