Search results for "Machine learning"
showing 10 items of 1464 documents
Computational methods and theory for ion channel research
2022
Ion channels are fundamental biological devices that act as gates in order to ensure selective ion transport across cellular membranes; their operation constitutes the molecular mechanism through which basic biological functions, such as nerve signal transmission and muscle contraction, are carried out. Here, we review recent results in the field of computational research on ion channels, covering theoretical advances, state-of-the-art simulation approaches, and frontline modeling techniques. We also report on few selected applications of continuum and atomistic methods to characterize the mechanisms of permeation, selectivity, and gating in biological and model channels.
Universal Patterns in Color-Emotion Associations Are Further Shaped by Linguistic and Geographic Proximity
2020
Many of us “see red,” “feel blue,” or “turn green with envy.” Are such color-emotion associations fundamental to our shared cognitive architecture, or are they cultural creations learned through our languages and traditions? To answer these questions, we tested emotional associations of colors in 4,598 participants from 30 nations speaking 22 native languages. Participants associated 20 emotion concepts with 12 color terms. Pattern-similarity analyses revealed universal color-emotion associations (average similarity coefficient r = .88). However, local differences were also apparent. A machine-learning algorithm revealed that nation predicted color-emotion associations above and beyond tho…
How can algorithms help in segmenting users and customers? : A systematic review and research agenda for algorithmic customer segmentation
2023
What algorithm to choose for customer segmentation? Should you use one algorithm or many? How many customer segments should you create? How to evaluate the results? In this research, we carry out a systematic literature review to address such central questions in customer segmentation research and practice. The results from extracting information from 172 relevant articles show that algorithmic customer segmentation is the predominant approach for customer segmentation. We found researchers employing 46 different algorithms and 14 different evaluation metrics. For the algorithms, K-means clustering is the most employed. For the metrics, separation-focused metrics are slightly more prevalent…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
On Attacking Future 5G Networks with Adversarial Examples : Survey
2022
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Architettura e second digital turn, l’evoluzione degli strumenti informatici e il progetto
2021
La condizione digitale che ha gradualmente ibridato le nostre esistenze, trasformando atomi in bit, si è oggi cementificata sulla nostra società, arricchendone la postmodernità e determinando una nuova liquidità acuitasi con l’avvento di internet. Un momento storico segnato da una nuova maturità del digitale, evidente nel nostro diverso rapporto con i dati, e nella diffusione di metodi di machine learning avanzato, che promettono una nuova capacità di comprensione della complessità contemporanea e nel frattempo contribuiscono alla propagazione dell’apparato tecnico sul mondo. Questi cambiamenti, tanto profondi da toccare la nostra cultura, stanno modificando il nostro modo di interpretare e…
CoproID predicts the source of coprolites and paleofeces using microbiome composition and host DNA content
2020
Shotgun metagenomics applied to archaeological feces (paleofeces) can bring new insights into the composition and functions of human and animal gut microbiota from the past. However, paleofeces often undergo physical distortions in archaeological sediments, making their source species difficult to identify on the basis of fecal morphology or microscopic features alone. Here we present a reproducible and scalable pipeline using both host and microbial DNA to infer the host source of fecal material. We apply this pipeline to newly sequenced archaeological specimens and show that we are able to distinguish morphologically similar human and canine paleofeces, as well as non-fecal sediments, fro…
The role of expert evaluation for microsleep detection
2015
Abstract Recently, it has been shown by overnight driving simulation studies that microsleep density is the only known sleepiness indicator which rapidly increases within a few seconds immediately before sleepiness related crashes. This indicator is based solely on EEG and EOG and subsequent adaptive pattern recognition. Accurate microsleep recognition is very important for the performance of this sleepiness indicator. The question is whether expensive evaluations of microsleep events by a) experts are necessary or b) non-experts provide sufficient evaluations. Based on 11,114 microsleep events in case a) and 12,787 in case b) recognition accuracies were investigated utilizing (i) artificia…
Natural induction: An objective bayesian approach
2009
The statistical analysis of a sample taken from a finite population is a classic problem for which no generally accepted objective Bayesian results seem to exist. Bayesian solutions to this problem may be very sensitive to the choice of the prior, and there is no consensus as to the appropriate prior to use.