Search results for "Machine Learning"
showing 10 items of 1464 documents
A metabolomic study of yeast/bacteria interactions
2015
As a complex microbial ecosystem, wine is a particularly interesting model for studying interactions between microorganisms. Contact-independent interactions (indirect interactions) between the yeast Saccharomyces cerevisae and the lactic acid bacterium Oenococcus oeni have a direct effect on malolactic fermentation (MLF), induction and completion, which is an important factor in wine quality. Yeast strains could be classified as MLF+ phenotype if it usually stimulates the bacterial growth or MLF- in the opposite case. The known metabolites that stimulate or inhibit the MLF cannot always explain the phenotypic distinction. In this work, a multidisciplinary workflow combining non-targeted me…
Learning Automaton Based On-Line Discovery and Tracking of Spatio-temporal Event Patterns
2010
Published version of an article from the book: Lecture Notes in Computer Science, 2010, Volume 6230/2010, 327-338. The original publication is available at Springerlink. http://dx.doi.org/10.1007/978-3-642-15246-7_31 Discovering and tracking of spatio-temporal patterns in noisy sequences of events is a difficult task that has become increasingly pertinent due to recent advances in ubiquitous computing, such as community-based social networking applications. The core activities for applications of this class include the sharing and notification of events, and the importance and usefulness of these functionalites increases as event-sharing expands into larger areas of one’s life. Ironically, …
Intruder Pattern Identification
2008
This paper considers the problem of intrusion detection in information systems as a classification problem. In particular the case of masquerader is treated. This kind of intrusion is one of the more difficult to discover because it may attack already open user sessions. Moreover, this problem is complex because of the large variability of user models and the lack of available data for the learning purpose. Here, flexible and robust similarity measures, suitable also for non-numeric data, are defined, they will be incorporated on a one-class training K N N and compared with several classification methods proposed in the literature using the Masquerading User Data set (www.schonlau.net) repr…
Bot recognition in a Web store: An approach based on unsupervised learning
2020
Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…
2021
In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…
Extracting Features from Social Media Networks Using Semantics
2016
This paper focuses on the analysis of social media content generated by social networks (e.g. Twitter) in order to extract semantic features. By using text categorization to sort text feeds into categories of similar feeds, it has been proved to reduce the overhead that is required to retrieve these feeds and at the same time, it provides smaller pools in which further investigations can be made easier. The aim of this survey is to draw a user profile, by analysing his or her tweets. In this early stage of research, being a pre-processing phase, a dictionary based approach is considered. Moreover, the paper describes an algorithm used in analysing the text and its preliminary results. This …
On the analysis of a new Markov chain which has applications in AI and machine learning
2011
Accepted version of an article from the conference: 2011 24th Canadian Conference on Electrical and Computer Engineering. Published version available from IEEE: http://dx.doi.org/10.1109/CCECE.2011.6030727 In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart random jump. RWs of this sort have applications in testing of entities, where the entity is never allowed to make more than a pre-specified number of consecutive failures. This paper contains the analysis of the chain, some fascinating limiting properties, and some i…
Tracking the Preferences of Users Using Weak Estimators
2011
Published version of am article from the book:AI 2011: Advances in Artificial Intelligence. Also available from the publisher on SpringerLink:http://dx.doi.org/10.1007/978-3-642-25832-9_81 Since a social network, by definition, is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary, estimating a user’s interests, typically, involves non-stationary distributions. The consequent time varying nature of the distribution to be trac…
Signal Spectrum-Based Machine Learning Approach for Fault Prediction and Maintenance of Electrical Machines
2022
Industrial revolution 4.0 has enabled the advent of new technological advancements, including the introduction of information technology with physical devices. The implementation of information technology in industrial applications has helped streamline industrial processes and make them more cost-efficient. This combination of information technology and physical devices gave birth to smart devices, which opened up a new research area known as the Internet of Things (IoT). This has enabled researchers to help reduce downtime and maintenance costs by applying condition monitoring on electrical machines utilizing machine learning algorithms. Although the industry is trying to move from schedu…
Quantifying Fundamental Vegetation Traits over Europe Using the Sentinel-3 OLCI Catalogue in Google Earth Engine
2022
Thanks to the emergence of cloud-computing platforms and the ability of machine learning methods to solve prediction problems efficiently, this work presents a workflow to automate spatiotemporal mapping of essential vegetation traits from Sentinel-3 (S3) imagery. The traits included leaf chlorophyll content (LCC), leaf area index (LAI), fraction of absorbed photosynthetically active radiation (FAPAR), and fractional vegetation cover (FVC), being fundamental for assessing photosynthetic activity on Earth. The workflow involved Gaussian process regression (GPR) algorithms trained on top-of-atmosphere (TOA) radiance simulations generated by the coupled canopy radiative transfer model (RTM) SC…