Search results for "UML"
showing 10 items of 407 documents
A neural multi-agent based system for smart html pages retrieval
2003
A neural based multi-agent system for smart HTML page retrieval is presented. The system is based on the EalphaNet architecture, a neural network capable of learning the activation function of its hidden units and having good generalization capabilities. System goal is to retrieve documents satisfying a query and dealing with a specific topic. The system has been developed using the basic features supplied by the Jade platform for agent creation, coordination and control. The system is composed of four agents: the trainer agent, the neural classifier mobile agent, the interface agent, and the librarian agent. The sub-symbolic knowledge of the neural classifier mobile agent is automatically …
Using active learning to adapt remote sensing image classifiers
2011
The validity of training samples collected in field campaigns is crucial for the success of land use classification models. However, such samples often suffer from a sample selection bias and do not represent the variability of spectra that can be encountered in the entire image. Therefore, to maximize classification performance, one must perform adaptation of the first model to the new data distribution. In this paper, we propose to perform adaptation by sampling new training examples in unknown areas of the image. Our goal is to select these pixels in an intelligent fashion that minimizes their number and maximizes their information content. Two strategies based on uncertainty and cluster…
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
Classification of Sequences with Deep Artificial Neural Networks: Representation and Architectural Issues
2021
DNA sequences are the basic data type that is processed to perform a generic study of biological data analysis. One key component of the biological analysis is represented by sequence classification, a methodology that is widely used to analyze sequential data of different nature. However, its application to DNA sequences requires a proper representation of such sequences, which is still an open research problem. Machine Learning (ML) methodologies have given a fundamental contribution to the solution of the problem. Among them, recently, also Deep Neural Network (DNN) models have shown strongly encouraging results. In this chapter, we deal with specific classification problems related to t…
Healthcare trajectory mining by combining multidimensional component and itemsets
2012
Sequential pattern mining is aimed at extracting correlations among temporal data. Many different methods were proposed to either enumerate sequences of set valued data (i.e., itemsets) or sequences containing multidimensional items. However, in real-world scenarios, data sequences are described as events of both multidimensional items and set valued information. These rich heterogeneous descriptions cannot be exploited by traditional approaches. For example, in healthcare domain, hospitalizations are defined as sequences of multi-dimensional attributes (e.g. Hospital or Diagnosis) associated with two sets, set of medical procedures (e.g. $ \lbrace $ Radiography, Appendectomy $\rbrace$) and…
MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios
2021
Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…
Validation of Predictive Approaches for Ductile Fracture in Cold Extrusion
1999
Cold extrusion is sometimes accompanied by some typical internal defects, known in the technical literature as “central bursts”, which dramatically could affect the component behaviour during its service life. Several researchers, following both analytical and numerical approaches have attempted central bursting prediction in extrusion. Among the latter several approaches have been proposed in the literature, namely the ones based on the use of ductile fracture criteria and the ones founded on the damage mechanics analysis. Each one of these approaches presents some advantages and drawbacks. In the paper the authors analyze a set of cold extrusion processes on AISI 1040 specimens at varying…
Integration of a structural features-based preclassifier and a man-machine interactive classifier for a fast multi-stroke character recognition
2003
A transputer-based parallel machine for handwritten character recognition is proposed. An algorithm based on structural features and on a tree classifier was used to accomplish the pre-classification of the unknown sample in order to speed up the recognition process. The algorithm for the final classification is based on the description of the strokes through Fourier descriptors. The learning phase is accomplished through a man-machine interactive process. The proposed system can expand its knowledge base. A special representation of this knowledge base is proposed in order to record a great amount of data in a suitable way. A fast multistroke handwritten isolated character recognition syst…
A Fuzzy One Class Classifier for Multi Layer Model
2009
The paper describes an application of a fuzzy one-class classifier (FOC ) for the identification of different signal patterns embedded in a noise structured background. The classification phase is applied after a preprocessing phase based on a Multi Layer Model (MLM ) that provides a preliminary signal segmentation in an interval feature space. The FOC has been tested on synthetic and real microarray data in the specific problem of DNA nucleosome and linker regions identification. Results have shown, in both cases, a good recognition rate.
Twitter Analysis for Real-Time Malware Discovery
2017
In recent years, the increasing number of cyber-attacks has gained the development of innovative tools to quickly detect new threats. A recent approach to this problem is to analyze the content of Social Networks to discover the rising of new malicious software. Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. The subscribers can insert messages, called tweet, that are usually related to international news. In this work, we present a system for real-time malware alerting using a set of tweets captured through the Twitter API’s, and analyzed by means of a Bayes naïve classifier. Then, groups of tweets discussing th…