Search results for "RECOGNITION"

showing 10 items of 3607 documents

Locality-sensitive hashing enables signal classification in high-throughput mass spectrometry raw data at scale

2021

Mass spectrometry is an important experimental technique in the field of proteomics. However, analysis of certain mass spectrometry data faces a combination of two challenges: First, even a single experiment produces a large amount of multi-dimensional raw data and, second, signals of interest are not single peaks but patterns of peaks that span along the different dimensions. The rapidly growing amount of mass spectrometry data increases the demand for scalable solutions. Existing approaches for signal detection are usually not well suited for processing large amounts of data in parallel or rely on strong assumptions concerning the signals properties. In this study, it is shown that locali…

business.industryComputer scienceScalabilityHash functionPattern recognitionDetection theoryArtificial intelligenceMass spectrometrybusinessRaw dataThresholdingSynthetic dataLocality-sensitive hashing
researchProduct

Evaluating Classifiers for Mobile-Masquerader Detection

2006

As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…

business.industryComputer scienceSmall numberLinear classifierPattern recognitionMachine learningcomputer.software_genreRandom subspace methodInformation sensitivityComputingMethodologies_PATTERNRECOGNITIONArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

A Support Vector Machine Signal Estimation Framework

2018

Support vector machine (SVM) were originally conceived as efficient methods for pattern recognition and classification, and the SVR was subsequently proposed as the SVM implementation for regression and function approximation. Nowadays, the SVR and other kernel‐based regression methods have become a mature and recognized tool in digital signal processing (DSP). This chapter starts to pave the way to treat all the problems within the field of kernel machines, and presents the fundamentals for a simple, framework for tackling estimation problems in DSP using support vector machine SVM. It outlines the particular models and approximations defined within the framework. The chapter concludes wit…

business.industryComputer scienceSystem identificationArray processingMachine learningcomputer.software_genreSupport vector machineFunction approximationKernel (statistics)Pattern recognition (psychology)Artificial intelligenceTime seriesbusinesscomputerDigital signal processing
researchProduct

Learning Bayesian Metanetworks from Data with Multilevel Uncertainty

2006

Managing knowledge by maintaining it according to dynamic context is among the basic abilities of a knowledge-based system. The two main challenges in managing context in Bayesian networks are the introduction of contextual (in)dependence and Bayesian multinets. We are presenting one possible implementation of a context sensitive Bayesian multinet-the Bayesian Metanetwork, which implies that interoperability between component Bayesian networks (valid in different contexts) can be also modelled by another Bayesian network. The general concepts and two kinds of such Metanetwork models are considered. The main focus of this paper is learning procedure for Bayesian Metanetworks.

business.industryComputer scienceTheoryofComputation_GENERALBayesian networkBayesian inferenceMachine learningcomputer.software_genreVariable-order Bayesian networkBayesian statisticsComputingMethodologies_PATTERNRECOGNITIONBayesian hierarchical modelingBayesian programmingGraphical modelArtificial intelligencebusinesscomputerDynamic Bayesian network
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

A novel method for network intrusion detection based on nonlinear SNE and SVM

2017

In the case of network intrusion detection data, pre-processing techniques have been extensively used to enhance the accuracy of the model. An ideal intrusion detection system (IDS) is one that has appreciable detection capability overall the group of attacks. An open research problem of this area is the lower detection rate for less frequent attacks, which result from the curse of dimensionality and imbalanced class distribution of the benchmark datasets. This work attempts to minimise the effects of imbalanced class distribution by applying random under-sampling of the majority classes and SMOTE-based oversampling of minority classes. In order to alleviate the issue arising from the curse…

business.industryComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingDimensionality reductionFeature vectorPattern recognitionGeneral MedicineIntrusion detection systemSupport vector machineBenchmark (computing)EmbeddingRadial basis functionArtificial intelligencebusinessCurse of dimensionality
researchProduct

Reduced Reference Mesh Visual Quality Assessment Based on Convolutional Neural Network

2018

3D meshes are usually affected by various visual distortions during their transmission and geometric processing. In this paper we propose a reduced reference method for mesh visual quality assessment. The method compares features extracted from the distorted mesh and the original one using a convolutional neural network in order to estimate the visual quality score. The perceptual distance between two meshes is computed as the Kullback-Leibler divergence between the two sets of feature vectors. Experimental results from two subjective databases (LIRIS masking database and LIRIS/EPFL general purpose database) and comparisons with seven objective metrics cited in the state-of-the-art demonstr…

business.industryComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingFeature vectorFeature extractionPattern recognition02 engineering and technology01 natural sciencesConvolutional neural networkVisualization010309 optics[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0103 physical sciencesQuality ScoreMetric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshArtificial intelligenceDivergence (statistics)businessComputingMilieux_MISCELLANEOUS
researchProduct

Damage identification by Lévy ant colony optimization

2010

This paper deals with the identification of incipient damage in structural elements by non-destructive test based on experimentally measured structural dynamical response. By applycation of the Hilbert transform to the recorded signal the so-called phase of the analytical signal is recovered and a proper functional is constructed in such a way that its global minimum gives a measure of the damage level, meant as stiffness reduction. Minimization is achieved by applying a modified Ant Colony Optimization (ACO) for continuous variables, inspired by the ants’ forageing behavior. The modification consists in the application of a new perturbation operator, based on alpha stable Lévy distribution…

business.industryComputer sciencedamage identification optimization levy acorAnt colony optimization algorithmsIdentification (biology)Pattern recognitionArtificial intelligenceSettore ICAR/08 - Scienza Delle Costruzionibusiness
researchProduct

Special issue on pattern recognition techniques in data mining

2017

Peer Reviewed

business.industryComputer scienceeducationPattern recognition02 engineering and technology010502 geochemistry & geophysicscomputer.software_genre01 natural sciencesArtificial IntelligencePattern recognitionSignal ProcessingPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligenceData miningbusinesscomputerData miningSoftware0105 earth and related environmental sciences
researchProduct

<title>Expanding context against weighted voting of classifiers</title>

2000

In the paper we propose a new method to integrate the predictions of multiple classifiers for Data Mining and Machine Learning tasks. The method assumes that each classifier stands in it's own context, and the contexts are partially ordered. The order is defined by monotonous quality function that maps each context to the value from the interval [0,1]. The classifier that has the context with better quality is supposed to predict better than the classifier from worse quality. The objective is to generate the opinion of `virtual' classifier that stands in the context with quality equal to 1. This virtual classifier must have the best accuracy of predictions due to the best context. To do thi…

business.industryComputer sciencemedia_common.quotation_subjectWeighted votingFeature selectionQuadratic classifiercomputer.software_genreMachine learningInformation extractionComputingMethodologies_PATTERNRECOGNITIONKnowledge extractionVotingMargin classifierArtificial intelligencebusinesscomputerClassifier (UML)media_commonSPIE Proceedings
researchProduct