Search results for "Modell"

showing 10 items of 2134 documents

Upport vector machines for nonlinear kernel ARMA system identification.

2006

Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA 2k) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based syste…

Computer Science::Machine LearningStatistics::TheoryComputer Networks and CommunicationsBiomedical signal processingInformation Storage and RetrievalMachine learningcomputer.software_genrePattern Recognition AutomatedStatistics::Machine LearningArtificial IntelligenceApplied mathematicsStatistics::MethodologyAutoregressive–moving-average modelComputer SimulationMathematicsTelecomunicacionesHardware_MEMORYSTRUCTURESSupport vector machinesModels StatisticalNonlinear system identificationbusiness.industryAutocorrelationSystem identificationSignal Processing Computer-AssistedGeneral MedicineComputer Science ApplicationsSupport vector machineNonlinear systemKernelAutoregressive modelNonlinear DynamicsARMA modelling3325 Tecnología de las TelecomunicacionesArtificial intelligenceNeural Networks ComputerbusinesscomputerSoftwareAlgorithmsReproducing kernel Hilbert spaceIEEE transactions on neural networks
researchProduct

ORGANIZED LEARNING MODELS (PURSUER CONTROL OPTIMISATION)

1983

Abstract The concept of Organized Learning is defined, and some random models are presented. For Not Transferable Learning, it is necessary to start from an instantaneous learning; by a discrete way, we must form a stochastic model considering the probability of each path; with a continue aproximation, we can study the evolution of the internal state through to consider the relative and absolute probabilities, by means of differential equations systems. For Transferable Learning, the instantaneous learning give us directly the System evolution. So, the Algoritmes for the different models are compared.

Computer Science::Machine LearningStochastic modellingActive learning (machine learning)business.industryDifferential equationPath (graph theory)Control (management)Online machine learningPursuerArtificial intelligenceState (computer science)businessMathematics
researchProduct

A computer method for estimating volumes and surface areas of complex structures consisting of overlapping spheres

1992

A PASCAL program which calculates volumes and surface areas of structures consisting of overlapping spheres is designed. The calculation is done by modelling the structure in the memory of a computer and then scanning the memory bit- or bytewise. A brief discussion of the error is presented, and an example for testing the algorithm is provided.

Computer programComputer science010102 general mathematics010103 numerical & computational mathematicsPascal (programming language)Programming method01 natural sciencesComputer Science ApplicationsModelling and SimulationModeling and SimulationSPHERES0101 mathematicsAlgorithmcomputercomputer.programming_languageMathematical and Computer Modelling
researchProduct

Combining Supervised and Unsupervised Learning to Discover Emotional Classes

2017

Most previous work in emotion recognition has fixed the available classes in advance, and attempted to classify samples into one of these classes using a supervised learning approach. In this paper, we present preliminary work on combining supervised and unsupervised learning to discover potential latent classes which were not initially considered. To illustrate the potential of this hybrid approach, we have used a Self-Organizing Map (SOM) to organize a large number of Electroencephalogram (EEG) signals from subjects watching videos, according to their internal structure. Results suggest that a more useful labelling scheme could be produced by analysing the resulting topology in relation t…

Computer science050109 social psychologyuser modelling02 engineering and technologyMachine learningcomputer.software_genrePersonalization0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesEmotion recognitionEEGValence (psychology)Affective computingaffective computingclass discoverybusiness.industry05 social sciencesSupervised learningPattern recognitionHybrid approachComputingMethodologies_PATTERNRECOGNITIONUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputercluster analysis
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Editorial Article for Open Journal of Antennas and Propagation

2013

Antennas help communicate the World. Antennas make possible that millions of people can watch the Champions League. Antennas allow the positioning of billions of vehicles around our planet. And they also allow handling vehicles through our neighbor planets. By propagating waves through antennas you can send huge amounts of data in milliseconds. Besides, you can also tell somebody that you love him or her. Antennas have allowed communicate the people in these places where cables cannot. But antennas are not only used for communication. Antennas can be used for heating food, for detecting people, for guiding vessels, for founding treasures, for monitoring breath, for harvesting energy and so …

Computer sciencebusiness.industryProcess (engineering)media_common.quotation_subjectField (computer science)Order (exchange)Modelling methodsWirelessQuality (business)Antenna (radio)TelecommunicationsbusinessBeam controlmedia_commonOpen Journal of Antennas and Propagation
researchProduct

Predictive models for energy saving in Wireless Sensor Networks

2011

ICT devices nowadays cannot disregard optimizations toward energy sustainability. Wireless Sensor Networks, in particular, are a representative class of a technology where special care must be given to energy saving, due to the typical scarcity and non-renewability of their energy sources, in order to enhance network lifetime. In our work we propose a novel approach that aims to adaptively control the sampling rate of wireless sensor nodes using prediction models, so that environmental phenomena can be consistently modeled while reducing the required amount of transmissions; the approach is tested on data available from a public dataset.

Computer sciencebusiness.industryReliability (computer networking)Distributed computingData modelingKey distribution in wireless sensor networksPredictive ModelWirelessEnergy sourcebusinessWireless sensor networkWireless Sensor NetworkEnergy (signal processing)Predictive modellingEnergy Saving.Computer network2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
researchProduct

English writing instruction in Norwegian upper secondary schools

2015

AbstractThis article presents a study of current English writing instruction practices in a selection of Norwegian upper secondary schools and discusses how this draws upon ideas within genre-pedagogy. The data comprises individual and focus-group interviews, observation reports and some teaching material. The study shows that English teachers focus on teaching genre requirements and adjustment of language to task and context. However, despite agreeing on the importance of teaching how to write specific text-types and to adjust to the situation at hand, there seems to be different opinions about how detailed instruction should be. Some teachers fear that too explicit instruction may hinder …

Computer sciencemedia_common.quotation_subjectContext (language use)NorwegianCreativitygenre-pedagogyTeacher educationlanguage.human_languagelcsh:Education (General)EducationFocus (linguistics)Task (project management)Writing instructionPedagogySelection (linguistics)languageSpiteteaching-learning cyclecontext and modellinglcsh:L7-991Writing instruction genre-pedagogy teaching-learning cycle context and modellingmedia_commonActa Didactica Norge
researchProduct

Statistical Reconstruction of Microstructures Using Entropic Descriptors

2018

We report a multiscale approach of broad applicability to stochastic reconstruction of multiphase materials, including porous ones. The approach devised uses an optimization method, such as the simulated annealing (SA) and the so-called entropic descriptors (EDs). For a binary pattern, they quantify spatial inhomogeneity or statistical complexity at discrete length-scales. The EDs extract dissimilar structural information to that given by two-point correlation functions (CFs). Within the SA, we use an appropriate cost function consisting of EDs or comprised of EDs and CFs. It was found that the stochastic reconstruction is computationally efficient when we begin with a preliminary synthetic…

Condensed Matter - Materials ScienceMicrostructure reconstructionDeformation (mechanics)Computer scienceGeneral Chemical EngineeringMaterials Science (cond-mat.mtrl-sci)FOS: Physical sciencesFunction (mathematics)Binary pattern01 natural sciencesCatalysis010305 fluids & plasmasMultiscale modellingEntropic descriptors0103 physical sciencesVolume fractionSimulated annealingSPHERESPorous materialsStatistical physics010306 general physicsPorous mediumPorosityTransport in Porous Media
researchProduct

Bremsstrahlung from a repulsive potential: attosecond pulse generation

2008

The collision of an electron against a repulsive potential in the presence of a laser field is investigated. It is found that a sufficiently strong laser field forces the electron to remain in the neighbourhood of the repulsive potential causing bremsstrahlung. By appropriately filtering the emitted signal, an electron in the presence of a repulsive potential is capable of generating attosecond pulses.

Condensed Matter::Quantum GasesPhysicsSettore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciField (physics)Condensed matter physicsBremsstrahlungAttosecondBremsstrahlungPhysics::OpticsNonlinear opticsElectronCondensed Matter PhysicsLaserSettore FIS/03 - Fisica Della MateriaAtomic and Molecular Physics and Opticslaw.inventionParticle accelerationgenerazione di attosecondilawPhysics::Atomic PhysicsAtomic physicsUltrashort pulseJournal of Physics B: Atomic, Molecular and Optical Physics
researchProduct