Search results for "Machine Learning"

showing 10 items of 1464 documents

A metabolomic study of yeast/bacteria interactions

2015

As a complex microbial ecosystem, wine is a particularly interesting model for studying interactions between microorganisms. Contact-independent interactions (indirect interactions) between the yeast Saccharomyces cerevisae and the lactic acid bacterium Oenococcus oeni have a direct effect on malolactic fermentation (MLF), induction and completion, which is an important factor in wine quality. Yeast strains could be classified as MLF+ phenotype if it usually stimulates the bacterial growth or MLF- in the opposite case. The known metabolites that stimulate or inhibit the MLF cannot always explain the phenotypic distinction. In this work, a multidisciplinary workflow combining non-targeted me…

UPLC-Q-TOF-MSWineBactérie lactiqueApprentissage automatique[SDV.IDA] Life Sciences [q-bio]/Food engineeringYeastMicrobial interactionInteraction microbienne[SDV.AEN] Life Sciences [q-bio]/Food and NutritionMachine learningVinLactic acid bacteriaMetabolomicsLevurePeptidesFT-ICR-MSMétabolomique
researchProduct

Learning Automaton Based On-Line Discovery and Tracking of Spatio-temporal Event Patterns

2010

Published version of an article from the book: Lecture Notes in Computer Science, 2010, Volume 6230/2010, 327-338. The original publication is available at Springerlink. http://dx.doi.org/10.1007/978-3-642-15246-7_31 Discovering and tracking of spatio-temporal patterns in noisy sequences of events is a difficult task that has become increasingly pertinent due to recent advances in ubiquitous computing, such as community-based social networking applications. The core activities for applications of this class include the sharing and notification of events, and the importance and usefulness of these functionalites increases as event-sharing expands into larger areas of one’s life. Ironically, …

Ubiquitous computingCorrectnessLearning automataEvent (computing)Computer sciencebusiness.industrycomputer.software_genreMachine learningAutomatonMemory footprintNoise (video)Data miningArtificial intelligenceAdaptation (computer science)businesscomputer
researchProduct

Intruder Pattern Identification

2008

This paper considers the problem of intrusion detection in information systems as a classification problem. In particular the case of masquerader is treated. This kind of intrusion is one of the more difficult to discover because it may attack already open user sessions. Moreover, this problem is complex because of the large variability of user models and the lack of available data for the learning purpose. Here, flexible and robust similarity measures, suitable also for non-numeric data, are defined, they will be incorporated on a one-class training K N N and compared with several classification methods proposed in the literature using the Masquerading User Data set (www.schonlau.net) repr…

UnixSimilarity (geometry)Settore INF/01 - Informaticabusiness.industryComputer scienceIntrusion detection systemSimilarity measurecomputer.software_genreMachine learningPattern identificationData setIntrusionOne class calssifier Masquerader detection Intrusion detection systemsInformation systemData miningArtificial intelligencebusinesscomputer
researchProduct

Bot recognition in a Web store: An approach based on unsupervised learning

2020

Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…

Unsupervised classificationWeb bot detectionComputer Networks and CommunicationsComputer scienceInternet robot02 engineering and technologyMachine learningcomputer.software_genreWeb trafficWeb serverMachine learning0202 electrical engineering electronic engineering information engineeringArtificial neural networkbusiness.industrySupervised learning020206 networking & telecommunicationsPerceptronWeb application securityWeb botComputer Science ApplicationsSupport vector machineGenerative modelComputingMethodologies_PATTERNRECOGNITIONHardware and ArchitectureSupervised classificationUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

2021

In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…

User profileBoosting (machine learning)Information retrievalGeneral Computer ScienceComputer sciencebusiness.industryDeep learningmedia_common.quotation_subjectNode (networking)Feature extractionGeneral EngineeringComplex networkBinary classificationGeneral Materials ScienceArtificial intelligenceElectrical and Electronic EngineeringbusinessReputationmedia_commonIEEE Access
researchProduct

Extracting Features from Social Media Networks Using Semantics

2016

This paper focuses on the analysis of social media content generated by social networks (e.g. Twitter) in order to extract semantic features. By using text categorization to sort text feeds into categories of similar feeds, it has been proved to reduce the overhead that is required to retrieve these feeds and at the same time, it provides smaller pools in which further investigations can be made easier. The aim of this survey is to draw a user profile, by analysing his or her tweets. In this early stage of research, being a pre-processing phase, a dictionary based approach is considered. Moreover, the paper describes an algorithm used in analysing the text and its preliminary results. This …

User profileInformation retrievalComputer sciencebusiness.industrySemantic analysis (machine learning)Feature extractioncomputer.software_genreSemanticsSupport vector machinesortOverhead (computing)Social mediaArtificial intelligencebusinesscomputerNatural language processing
researchProduct

On the analysis of a new Markov chain which has applications in AI and machine learning

2011

Accepted version of an article from the conference: 2011 24th Canadian Conference on Electrical and Computer Engineering. Published version available from IEEE: http://dx.doi.org/10.1109/CCECE.2011.6030727 In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart random jump. RWs of this sort have applications in testing of entities, where the entity is never allowed to make more than a pre-specified number of consecutive failures. This paper contains the analysis of the chain, some fascinating limiting properties, and some i…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413InterleavingMarkov chainComputer sciencebusiness.industryStochastic processMarkov processVDP::Technology: 500::Information and communication technology: 550Machine learningcomputer.software_genreRandom walksymbols.namesakeChain (algebraic topology)symbolssortArtificial intelligencebusinesscomputer
researchProduct

Tracking the Preferences of Users Using Weak Estimators

2011

Published version of am article from the book:AI 2011: Advances in Artificial Intelligence. Also available from the publisher on SpringerLink:http://dx.doi.org/10.1007/978-3-642-25832-9_81 Since a social network, by definition, is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary, estimating a user’s interests, typically, involves non-stationary distributions. The consequent time varying nature of the distribution to be trac…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Service (systems architecture)Social networkbusiness.industryComputer scienceEstimatorRecommender systemTracking (particle physics)Machine learningcomputer.software_genreTarget distributionVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425Targeted advertisingRange (statistics)Artificial intelligencebusinesscomputer
researchProduct

Signal Spectrum-Based Machine Learning Approach for Fault Prediction and Maintenance of Electrical Machines

2022

Industrial revolution 4.0 has enabled the advent of new technological advancements, including the introduction of information technology with physical devices. The implementation of information technology in industrial applications has helped streamline industrial processes and make them more cost-efficient. This combination of information technology and physical devices gave birth to smart devices, which opened up a new research area known as the Internet of Things (IoT). This has enabled researchers to help reduce downtime and maintenance costs by applying condition monitoring on electrical machines utilizing machine learning algorithms. Although the industry is trying to move from schedu…

VDP::Teknologi: 500Control and OptimizationRenewable Energy Sustainability and the EnvironmentEnergy Engineering and Power TechnologyBuilding and ConstructionElectrical and Electronic Engineeringartificial intelligence; fault prediction; predictive maintenance; machine learning; neural networkEngineering (miscellaneous)Energy (miscellaneous)
researchProduct

Quantifying Fundamental Vegetation Traits over Europe Using the Sentinel-3 OLCI Catalogue in Google Earth Engine

2022

Thanks to the emergence of cloud-computing platforms and the ability of machine learning methods to solve prediction problems efficiently, this work presents a workflow to automate spatiotemporal mapping of essential vegetation traits from Sentinel-3 (S3) imagery. The traits included leaf chlorophyll content (LCC), leaf area index (LAI), fraction of absorbed photosynthetically active radiation (FAPAR), and fractional vegetation cover (FVC), being fundamental for assessing photosynthetic activity on Earth. The workflow involved Gaussian process regression (GPR) algorithms trained on top-of-atmosphere (TOA) radiance simulations generated by the coupled canopy radiative transfer model (RTM) SC…

Vegetation traitsTime seriesvegetation traits; Sentinel-3; TOA radiance; OLCI; Gaussian process regression; machine learning; hybrid method; time series; Google Earth EngineTOA radianceMachine learningHybrid methodGeneral Earth and Planetary SciencesMatemática AplicadaSentinel-3OLCIGoogle Earth EngineGaussian process regressionRemote Sensing
researchProduct