Search results for "e learning"

showing 10 items of 2703 documents

Pain fingerprinting using multimodal sensing: pilot study

2021

Abstract Pain is a complex phenomenon, the experience of which varies widely across individuals. At worst, chronic pain can lead to anxiety and depression. Cost-effective strategies are urgently needed to improve the treatment of pain, and thus we propose a novel home-based pain measurement system for the longitudinal monitoring of pain experience and variation in different patients with chronic low back pain. The autonomous nervous system and audio-visual features are analyzed from heart rate signals, voice characteristics and facial expressions using a unique measurement protocol. Self-reporting is utilized for the follow-up of changes in pain intensity, induced by well-designed physical …

Computer Networks and Communicationskipusignaalianalyysimonitorointiaudio analysiskivunhoitomachine learningkoneoppiminenHardware and Architectureheart rateMedia Technologyselkäkrooninen kipuilmeetEEGsykemittaritlow back painfacial expressionelectroencephalographySoftwareMultimedia Tools and Applications
researchProduct

Predicting overweight and obesity in later life from childhood data: A review of predictive modeling approaches

2019

Background: Overweight and obesity are an increasing phenomenon worldwide. Predicting future overweight or obesity early in the childhood reliably could enable a successful intervention by experts. While a lot of research has been done using explanatory modeling methods, capability of machine learning, and predictive modeling, in particular, remain mainly unexplored. In predictive modeling models are validated with previously unseen examples, giving a more accurate estimate of their performance and generalization ability in real-life scenarios. Objective: To find and review existing overweight or obesity research from the perspective of employing childhood data and predictive modeling metho…

Computer Science - Machine LearningStatistics - Machine LearningStatistics - Applications
researchProduct

Solving dynamic bandit problems and decentralized games using the kalman bayesian learning automaton

2010

Masteroppgave i informasjons- og kommunikasjonsteknologi 2010 – Universitetet i Agder, Grimstad Multi-armed bandit problems have been subject to a lot of research in computer science because it captures the fundamental dilemma of exploration versus exploitation in reinforcement learning. The goal of a bandit problem is to determine the optimal balance between the gain of new information (exploration) and immediate reward maximization (exploitation). Dynamic bandit problems are especially challenging because they involve changing environments. Combined with game theory, where one analyze the behavior of agents in multi-agent settings, bandit problems serves as a framework for benchmarking th…

Computer Science::Machine Learning
researchProduct

Support vector machines in engineering: an overview

2014

This paper provides an overview of the support vector machine SVM methodology and its applicability to real-world engineering problems. Specifically, the aim of this study is to review the current state of the SVM technique, and to show some of its latest successful results in real-world problems present in different engineering fields. The paper starts by reviewing the main basic concepts of SVMs and kernel methods. Kernel theory, SVMs, support vector regression SVR, and SVM in signal processing and hybridization of SVMs with meta-heuristics are fully described in the first part of this paper. The adoption of SVMs in engineering is nowadays a fact. As we illustrate in this paper, SVMs can …

Computer Science::Machine LearningBeamformingData processingSignal processingGeneral Computer ScienceContextual image classificationComputer sciencebusiness.industryMachine learningcomputer.software_genreSupport vector machineComputingMethodologies_PATTERNRECOGNITIONKernel methodState (computer science)Artificial intelligenceData miningbusinesscomputerDecoding methodsWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
researchProduct

Memory limited inductive inference machines

1992

The traditional model of learning in the limit is restricted so as to allow the learning machines only a fixed, finite amount of memory to store input and other data. A class of recursive functions is presented that cannot be learned deterministically by any such machine, but can be learned by a memory limited probabilistic leaning machine with probability 1.

Computer Science::Machine LearningClass (set theory)Computer scienceInductive biasProbabilistic logicRecursive functionsLimit (mathematics)Inductive reasoningAlgorithm
researchProduct

Organized Learning Models (Pursuer Control Optimisation)

1982

Abstract The concept of Organized Learning is defined, and some random models are presented. For Not Transferable Learning, it is necessary to start from an instantaneous learning; by a discrete way, we must form a stochastic model considering the probability of each path; with a continue aproximation, we can study the evolution of the internal state through to consider the relative and absolute probabilities, by means of differential equations systems. For Transferable Learning, the instantaneous learning give us directly the System evolution. So, the Algoritmes for the different models are compared.

Computer Science::Machine LearningComputational learning theoryWake-sleep algorithmActive learning (machine learning)business.industryComputer scienceCompetitive learningAlgorithmic learning theoryStability (learning theory)Online machine learningPursuerArtificial intelligencebusinessIFAC Proceedings Volumes
researchProduct

Empirical Evaluation of the Bayesian Learning Automaton Family

2009

Masteroppgave i informasjons- og kommunikasjonsteknologi 2009 – Universitetet i Agder, Grimstad The two-armed bandit problem is a classical optimization problem where a player sequentially selects and pulls one of two arms attached to a gambling machine, and each arm pull results in either a reward or penalty to the player. Each arm is associated with a certain reward probability which is unknown to the player, and the player needs to sequentially select and play an arm and receive a reward or a penalty in order to discover its true reward probability. The overall goal for the player is reward maximization, and the player needs to balance between exploiting existing knowledge or obtaining n…

Computer Science::Machine LearningComputer Science::Computer Science and Game Theory
researchProduct

SVM approximation for real-time image segmentation by using an improved hyperrectangles-based method

2003

A real-time implementation of an approximation of the support vector machine (SVM) decision rule is proposed. This method is based on an improvement of a supervised classification method using hyperrectangles, which is useful for real-time image segmentation. The final decision combines the accuracy of the SVM learning algorithm and the speed of a hyperrectangles-based method. We review the principles of the classification methods and we evaluate the hardware implementation cost of each method. We present the combination algorithm, which consists of rejecting ambiguities in the learning set using SVM decision, before using the learning step of the hyperrectangles-based method. We present re…

Computer Science::Machine LearningComputer sciencebusiness.industryGaussianCombination algorithmImage processingPattern recognitionImage segmentationDecision ruleMachine learningcomputer.software_genreSupport vector machinesymbols.namesakeSignal ProcessingsymbolsComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringField-programmable gate arraybusinesscomputerIndustrial inspectionReal-Time Imaging
researchProduct

Rational irreducible characters and rational conjugacy classes in finite groups

2007

We prove that a finite group G G has two rational-valued irreducible characters if and only if it has two rational conjugacy classes, and determine the structure of any such group. Along the way we also prove a conjecture of Gow stating that any finite group of even order has a non-trivial rational-valued irreducible character of odd degree.

Computer Science::Machine LearningFinite groupApplied MathematicsGeneral MathematicsIrreducible elementComputer Science::Digital LibrariesIrreducible fractionCombinatoricsStatistics::Machine LearningConjugacy classCharacter (mathematics)Character tableComputer Science::Mathematical SoftwareOrder (group theory)Character groupMathematicsTransactions of the American Mathematical Society
researchProduct

Homology of pseudodifferential operators on manifolds with fibered cusps

2003

The Hochschild homology of the algebra of pseudodifferential operators on a manifold with fibered cusps, introduced by Mazzeo and Melrose, is studied and computed using the approach of Brylinski and Getzler. One of the main technical tools is a new convergence criterion for tri-filtered half-plane spectral sequences. Using trace-like functionals that generate the 0 0 -dimensional Hochschild cohomology groups, the index of a fully elliptic fibered cusp operator is expressed as the sum of a local contribution of Atiyah-Singer type and a global term on the boundary. We announce a result relating this boundary term to the adiabatic limit of the eta invariant in a particular case.

Computer Science::Machine LearningHochschild homologyApplied MathematicsGeneral MathematicsFibered knotHomology (mathematics)Computer Science::Digital LibrariesCohomologyManifoldAlgebraStatistics::Machine LearningElliptic operatorEta invariantMathematics::K-Theory and HomologySpectral sequenceComputer Science::Mathematical SoftwareMathematicsTransactions of the American Mathematical Society
researchProduct