Search results for "kernel"

showing 10 items of 357 documents

Improved Statistically Based Retrievals via Spatial-Spectral Data Compression for IASI Data

2019

In this paper, we analyze the effect of spatial and spectral compression on the performance of statistically based retrieval. Although the quality of the information is not com- pletely preserved during the coding process, experiments reveal that a certain amount of compression may yield a positive impact on the accuracy of retrievals. We unveil two strategies, both with interesting benefits: either to apply a very high compression, which still maintains the same retrieval performance as that obtained for uncompressed data; or to apply a moderate to high compression, which improves the performance. As a second contribution of this paper, we focus on the origins of these benefits. On the one…

Computer scienceInfrared Atmospheric Sounding Interferometer (IASI)Spectral Transforms0211 other engineering and technologies02 engineering and technologyData_CODINGANDINFORMATIONTHEORYLossy compressionInfrared atmospheric sounding interferometer (IASI)Kernel MethodsElectrical and Electronic EngineeringTransform coding021101 geological & geomatics engineeringbusiness.industryDimensionality reductionLossy CompressionJPEG 2000Kernel methodsPattern recognitioncomputer.file_formatJoint Photographic Experts Group (JPEG) 2000RegressionUncompressed videoSpectral transformsKernel methodStatistically based retrievalJPEG 2000General Earth and Planetary SciencesLossy compressionArtificial intelligencebusinessStatistically Based RetrievalcomputerSmoothingIEEE Transactions on Geoscience and Remote Sensing
researchProduct

Study ofBB¯*andB*B¯*interactions inI=1and relationship to theZb(10610),Zb(10650)states

2015

We use the local hidden gauge approach in order to study the $B{\overline{B}}^{*}$ and ${B}^{*}{\overline{B}}^{*}$ interactions for isospin $I=1$. We show that both interactions via one light meson exchange are not allowed by the Okubo-Zweig-Iizuka rule and, for that reason, we calculate the contributions due to the exchange of two pions, interacting and noninteracting among themselves, and also due to the heavy vector mesons. Then, to compare all these contributions, we use the potential related to the heavy vector exchange as an effective potential corrected by a factor which takes into account the contribution of the other light meson exchanges. In order to look for poles, this effective…

PhysicsNuclear and High Energy PhysicsParticle physicsBethe–Salpeter equationMeson010308 nuclear & particles physicsNuclear TheoryHigh Energy Physics::PhenomenologyOrder (ring theory)01 natural sciencesNuclear physicsKernel (algebra)PionIsospin0103 physical sciencesBound stateNuclear Experiment010306 general physicsSpin-½Physical Review D
researchProduct

A General Frame for Building Optimal Multiple SVM Kernels

2012

The aim of this paper is to define a general frame for building optimal multiple SVM kernels. Our scheme follows 5 steps: formal representation of the multiple kernels, structural representation, choice of genetic algorithm, SVM algorithm, and model evaluation. The computation of the optimal parameter values of SVM kernels is performed using an evolutionary method based on the SVM algorithm for evaluation of the quality of chromosomes. After the multiple kernel is found by the genetic algorithm we apply cross validation method for estimating the performance of our predictive model. We implemented and compared many hybrid methods derived from this scheme. Improved co-mutation operators are u…

Scheme (programming language)Multiple kernel learningbusiness.industryComputationPattern recognitionCross-validationSupport vector machineGenetic algorithmArtificial intelligenceGeneral framebusinesscomputerKernel (category theory)Mathematicscomputer.programming_language
researchProduct

The shape of small sample biases in pricing kernel estimations

2016

AbstractNumerous empirical studies find pricing kernels that are not-monotonically decreasing; the findings are at odds with the pricing kernel being marginal utility of a risk-averse, so-called representative agent. We study in detail the common procedure which estimates the pricing kernel as the ratio of two separate density estimations. In the first step, we analyse theoretically the functional dependence for the ratio of a density to its estimated density; this cautions the reader regarding potential computational issues coupled with statistical techniques. In the second step, we study this quantitatively; we show that small sample biases shape the estimated pricing kernel, and that est…

Computer Science::Computer Science and Game Theory050208 finance05 social sciencesKernel density estimationMonotonic functionRepresentative agentImplied volatility01 natural sciencesOdds010104 statistics & probabilityEmpirical researchStochastic discount factor0502 economics and businessEconometrics0101 mathematicsMarginal utilityGeneral Economics Econometrics and FinanceFinanceMathematicsQuantitative Finance
researchProduct

Forest of Normalized Trees: Fast and Accurate Density Estimation of Streaming Data

2018

Density estimation of streaming data is a relevant task in numerous domains. In this paper, a novel non-parametric density estimator called FRONT (forest of normalized trees) is introduced. It uses a structure of multiple normalized trees, segments the feature space of the data stream through a periodically updated linear transformation and is able to adapt to ever evolving data streams. FRONT provides accurate density estimation and performs favorably compared to existing online density estimators in terms of the average log score on multiple standard data sets. Its low complexity, linear runtime as well as constant memory usage, makes FRONT by design suitable for large data streams. Final…

Data streamComputer scienceData stream miningFeature vectorEstimator02 engineering and technologyDensity estimation01 natural sciencesData modeling010104 statistics & probabilityKernel (statistics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0101 mathematicsRandom variableAlgorithm2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA)
researchProduct

A semiparametric approach to estimate reference curves for biophysical properties of the skin

2006

Reference curves which take one covariable into account such as the age, are often required in medicine, but simple systematic and efficient statistical methods for constructing them are lacking. Classical methods are based on parametric fitting (polynomial curves). In this chapter, we describe a new methodology for the estimation of reference curves for data sets, based on nonparametric estimation of conditional quantiles. The derived method should be applicable to all clinical or more generally biological variables that are measured on a continuous quantitative scale. To avoid the curse of dimensionality when the covariate is multidimensional, a new semiparametric approach is proposed. Th…

Statistics::TheoryKernel density estimationcomputer.software_genre01 natural sciences010104 statistics & probability0502 economics and businessCovariateSliced inverse regressionApplied mathematicsStatistics::MethodologySemiparametric regression0101 mathematics[SHS.ECO] Humanities and Social Sciences/Economics and Finance050205 econometrics MathematicsParametric statisticsDimensionality reduction05 social sciencesNonparametric statistics[ SDV.SPEE ] Life Sciences [q-bio]/Santé publique et épidémiologie[SHS.ECO]Humanities and Social Sciences/Economics and Finance3. Good health[SDV.SPEE] Life Sciences [q-bio]/Santé publique et épidémiologie[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologieC140;C630Data miningcomputerQuantile
researchProduct

Nonlinear Distribution Regression for Remote Sensing Applications

2020

In many remote sensing applications, one wants to estimate variables or parameters of interest from observations. When the target variable is available at a resolution that matches the remote sensing observations, standard algorithms, such as neural networks, random forests, or the Gaussian processes, are readily available to relate the two. However, we often encounter situations where the target variable is only available at the group level, i.e., collectively associated with a number of remotely sensed observations. This problem setting is known in statistics and machine learning as multiple instance learning (MIL) or distribution regression (DR). This article introduces a nonlinear (kern…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer Science - Machine LearningArtificial neural networkRemote sensing applicationComputer science0211 other engineering and technologies02 engineering and technologyLeast squaresRandom forestMachine Learning (cs.LG)Kernel (linear algebra)symbols.namesakeKernel (statistics)symbolsFOS: Electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesElectrical Engineering and Systems Science - Signal ProcessingElectrical and Electronic EngineeringGaussian processAlgorithm021101 geological & geomatics engineeringCurse of dimensionalityIEEE Transactions on Geoscience and Remote Sensing
researchProduct

Nonlinear Cook distance for Anomalous Change Detection

2020

In this work we propose a method to find anomalous changes in remote sensing images based on the chronochrome approach. A regressor between images is used to discover the most {\em influential points} in the observed data. Typically, the pixels with largest residuals are decided to be anomalous changes. In order to find the anomalous pixels we consider the Cook distance and propose its nonlinear extension using random Fourier features as an efficient nonlinear measure of impact. Good empirical performance is shown over different multispectral images both visually and quantitatively evaluated with ROC curves.

FOS: Computer and information sciencesComputer Science - Machine LearningComputer scienceComputer Vision and Pattern Recognition (cs.CV)Multispectral imageComputer Science - Computer Vision and Pattern Recognition0211 other engineering and technologies02 engineering and technologyMeasure (mathematics)Machine Learning (cs.LG)Kernel (linear algebra)symbols.namesake0502 economics and businessCook's distance021101 geological & geomatics engineering050208 financePixelbusiness.industry05 social sciencesPattern recognitionNonlinear systemFourier transformKernel (image processing)Computer Science::Computer Vision and Pattern RecognitionsymbolsArtificial intelligencebusinessChange detection
researchProduct

Physics-Aware Gaussian Processes for Earth Observation

2017

Earth observation from satellite sensory data pose challenging problems, where machine learning is currently a key player. In recent years, Gaussian Process (GP) regression and other kernel methods have excelled in biophysical parameter estimation tasks from space. GP regression is based on solid Bayesian statistics, and generally yield efficient and accurate parameter estimates. However, GPs are typically used for inverse modeling based on concurrent observations and in situ measurements only. Very often a forward model encoding the well-understood physical relations is available though. In this work, we review three GP models that respect and learn the physics of the underlying processes …

MatemáticasEstimation theory0211 other engineering and technologiesContext (language use)02 engineering and technologyMissing dataBayesian statisticssymbols.namesakeKernel method0202 electrical engineering electronic engineering information engineeringsymbolsGeología020201 artificial intelligence & image processingGaussian process emulatorGaussian processAlgorithm021101 geological & geomatics engineeringInterpolation
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct