Search results for "Machine learning"

showing 10 items of 1464 documents

Computing methods for resilience: evaluating new building components in the frame of SECAPs

2019

Resilience represents a new important feature that the anthropic systems, and cities among them, are called to cope with. In fact, the increasing negative stresses to which urban contexts are exposed, and mainly the climatic pressures, call for the capability of adapting to these modifications and, possibly, to restore the ex-ante situations. The role of the buildings and their envelope components is of crucial importance to this aim. This paper analyses the features of resilience of the roofs of buildings by means of proper quantitative indexes. On purpose, the performances of green and cool roofs are compared. The possibility of adopting nonstructural solutions, like the windows shading d…

Architectural engineeringgreen roofComputer science020209 energycool roof0211 other engineering and technologies02 engineering and technologygreen roofsenergy consumption021105 building & constructionbuilding0202 electrical engineering electronic engineering information engineeringFeature (machine learning)shading devicesResilience (network)resilienceshading devices.Settore ING-IND/11 - Fisica Tecnica AmbientaleFrame (networking)Energy consumptionbuildingsbuildings energy consumption resilience green roofs cool roofs shading devicescool roofsbuildings; cool roofs; energy consumption; green roofs; resilience; shading devicesReflective surfacesEnvelope (motion)
researchProduct

Methodological advances in brain connectivity

2012

Determining how distinct neurons or brain regions are connected and communicate with each other is a crucial point in neuroscience, as it allows to investigate how the functional integration of specialized neural populations enables the emergence of coherent cognitive and behavioral states. The general concept of brain connectivity encompasses different aspects: structural connectivity is related to the description of anatomical pathways and synaptic connections; functional connectivity investigates statistical dependencies between spatially separated brain regions; effective connectivity refers to models aimed at elucidating driver-response relationships. The study of these different modes…

Article SubjectImmunology and Microbiology (all)Computer scienceModels NeurologicalNeurophysiologyElectroencephalographylcsh:Computer applications to medicine. Medical informaticsMachine learningcomputer.software_genreModels BiologicalBrain mappingGeneral Biochemistry Genetics and Molecular BiologySynchronization (computer science)medicineHumansNeuronsConnectivityBrain MappingComputational modelBiochemistry Genetics and Molecular Biology (all)Quantitative Biology::Neurons and CognitionGeneral Immunology and MicrobiologyArtificial neural networkFunctional integration (neurobiology)medicine.diagnostic_testbusiness.industryModeling and Simulation; Biochemistry Genetics and Molecular Biology (all); Immunology and Microbiology (all); Applied MathematicsApplied MathematicsBrainComputational BiologyMagnetoencephalographyElectroencephalographyGeneral MedicineMagnetoencephalographyEditorialModeling and SimulationMultivariate AnalysisSettore ING-INF/06 - Bioingegneria Elettronica E Informaticalcsh:R858-859.7Transfer entropyArtificial intelligenceNetworksbusinesscomputerSoftware
researchProduct

Collecting and Using Students’ Digital Well-Being Data in Multidisciplinary Teaching

2018

This article examines how students (N=198; aged 13 to 17) experienced the new methods for sensor-based learning in multidisciplinary teaching in lower and upper secondary education that combine the use of new sensor technology and learning from self-produced well-being data. The aim was to explore how students perceived new methods from the point of view of their learning and did the teaching methods provide new information that could promote their own well-being. We also aimed to find out how to collect digital well-being data from a large number of students and how the collected big data set can be utilized to predict school success from the students’ well-being data by using machine lear…

Article SubjectoppiminenComputer scienceTeaching methodhyvinvointiBig dataMachine learningcomputer.software_genrelcsh:Education (General)EducationCorrelation03 medical and health sciences0302 clinical medicineMultidisciplinary approachta516Set (psychology)ta113studentsopiskelijatPoint (typography)business.industry05 social sciences050301 educationdigital well-being datadataMultilayer perceptronWell-beingArtificial intelligencelcsh:L7-991business0503 educationcomputermultidisciplinary teaching030217 neurology & neurosurgeryEducation Research International
researchProduct

Complexity reduction in efficient prototype-based classification

2006

Artificial Intelligencebusiness.industryComputer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessMachine learningcomputer.software_genrecomputerSoftwarePattern Recognition
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Real-time micro-expression analysis by artificial vision

2022

Human-computer interaction technologies focus more and more on the human being, whether it is on his identity, or on his physical and mental state. Significant progress has been made in the last few decades. However, the study of thoughts and emotions is still an underdeveloped field, but one that has begun to gain considerable interest. In this field, the analysis of facial expressions is the preferred treatment.Unlike a macro-expression, which is visible to the eye, a micro-expression is a type of involuntary facial expression that is extremely rapid and of very low intensity. The computer vision scientific community has been studying ways to automatically recognize micro-expressions usin…

Artificial intelligence[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingVision par ordinateurMachine learningComputer visionEmotional artificial intelligenceApprentissage automatiqueIntelligence artificielleIntelligence artificielle émotionnelle
researchProduct

Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation

2019

Abstract Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a method that works in three stages. First, the ExtraTrees classifier is used to select relevant features for each type of attack individually for each (ELM). Then, an ensemble of ELMs is used to detect each type of attack separately. Finally, the results of all ELMs are combined using a softmax layer to refine the results and increase the accuracy further. The intuition behind our system is that multi-class classification is quite difficult compared to binary classification. So, we…

Artificial intelligencelcsh:Computer engineering. Computer hardwareExtreme learning machineEnsemble methodsComputer scienceBinary numberlcsh:TK7885-7895Feature selection02 engineering and technologyIntrusion detection systemlcsh:QA75.5-76.95Machine learning0202 electrical engineering electronic engineering information engineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Multi layerExtreme learning machinebusiness.industryIntrusion detection system020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsBinary classificationFeature selectionSignal ProcessingSoftmax function020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligencebusinessClassifier (UML)EURASIP Journal on Information Security
researchProduct

Using machine learning to disentangle LHC signatures of Dark Matter candidates

2019

We study the prospects of characterising Dark Matter at colliders using Machine Learning (ML) techniques. We focus on the monojet and missing transverse energy (MET) channel and propose a set of benchmark models for the study: a typical WIMP Dark Matter candidate in the form of a SUSY neutralino, a pseudo-Goldstone impostor in the shape of an Axion-Like Particle, and a light Dark Matter impostor whose interactions are mediated by a heavy particle. All these benchmarks are tensioned against each other, and against the main SM background ($Z$+jets). Our analysis uses both the leading-order kinematic features as well as the information of an additional hard jet. We explore different representa…

Artificial neural network010308 nuclear & particles physicsbusiness.industryComputer sciencePhysicsQC1-999Dark matterFOS: Physical sciencesGeneral Physics and AstronomySupersymmetryMachine learningcomputer.software_genre01 natural sciencesConvolutional neural networkHigh Energy Physics - PhenomenologyHigh Energy Physics - Phenomenology (hep-ph)Robustness (computer science)0103 physical sciencesPrincipal component analysisProbability distributionArtificial intelligence010306 general physicsbusinessLight dark mattercomputerSciPost Physics
researchProduct

Assigning discounts in a marketing campaign by using reinforcement learning and neural networks

2009

In this work, RL is used to find an optimal policy for a marketing campaign. Data show a complex characterization of state and action spaces. Two approaches are proposed to circumvent this problem. The first approach is based on the self-organizing map (SOM), which is used to aggregate states. The second approach uses a multilayer perceptron (MLP) to carry out a regression of the action-value function. The results indicate that both approaches can improve a targeted marketing campaign. Moreover, the SOM approach allows an intuitive interpretation of the results, and the MLP approach yields robust results with generalization capabilities.

Artificial neural networkComputer scienceGeneralizationbusiness.industrymedia_common.quotation_subjectAggregate (data warehouse)General EngineeringMachine learningcomputer.software_genreComputer Science ApplicationsFunction approximationArtificial IntelligenceMultilayer perceptronReinforcement learningState (computer science)Artificial intelligenceFunction (engineering)businesscomputermedia_commonExpert Systems with Applications
researchProduct

Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach

2020

The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…

Artificial neural networkComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyMachine learningcomputer.software_genrePreambleBase station0508 media and communicationsRecurrent neural networkTransmission (telecommunications)Traffic volume0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct