Search results for "koneoppiminen"

showing 10 items of 218 documents

The Datafication of Hate: Expectations and Challenges in Automated Hate Speech Monitoring.

2020

Laaksonen, S-M.; Haapoja, J.; Kinnunen, T., Nelimarkka, M. & Pöyhtäri, R. (2020, accepted). . Frontiers in Big Data: Data Mining and Management / Critical Data and Algorithm Studies. doi:10.3389/fdata.2020.00003 Hate speech has been identified as a pressing problem in society and several automated approaches have been designed to detect and prevent it. This paper reports and reflects upon an action research setting consisting of multi-organizational collaboration conducted during Finnish municipal elections in 2017, wherein a technical infrastructure was designed to automatically monitor candidates' social media updates for hate speech. The setting allowed us to engage in a 2-fold investiga…

Big DataComputer sciencehate speechsocial media518 Media and communicationssosiaalinen mediamonitorointi050801 communication & media studiesSocial issues0508 media and communicationspolitiikkadatatiedeArtificial Intelligencealgoritmit050602 political science & public administrationComputer Science (miscellaneous)Social mediaalgorithmic systemvihapuheAction researchObjectivity (science)Original Researchlcsh:T58.5-58.64DataficationSocial phenomenonlcsh:Information technologytekstinlouhinta05 social sciencesCitizen journalism16. Peace & justice113 Computer and information sciencesData science0506 political sciencekoneoppiminenmachine learningNeutralitydata sciencepoliticsInformation Systems
researchProduct

Chlorophyll Concentration Retrieval by Training Convolutional Neural Network for Stochastic Model of Leaf Optical Properties (SLOP) Inversion

2020

Miniaturized hyperspectral imaging techniques have developed rapidly in recent years and have become widely available for different applications. Combining calibrated hyperspectral imagery with inverse physically based reflectance models is an interesting approach for estimating chlorophyll concentrations that are good indicators of vegetation health. The objective of this study was to develop a novel approach for retrieving chlorophyll a and b values from remotely sensed data by inverting the stochastic model of leaf optical properties using a one-dimensional convolutional neural network. The inversion results and retrieved values are validated in two ways: A classical machine learning val…

Chlorophyll boptical propertiesChlorophyll aklorofylli010504 meteorology & atmospheric sciencesCorrelation coefficientStochastic modelling0211 other engineering and technologiesconvolutional neural network02 engineering and technologyneuroverkotoptiset ominaisuudet01 natural sciencesConvolutional neural networkchemistry.chemical_compoundchlorophylllcsh:Scienceoptical properties; convolutional neural network; deep learning; chlorophyll; stochastic modeling; physical parameter retrieval; forestry021101 geological & geomatics engineering0105 earth and related environmental sciencesMathematicsRemote sensingstokastiset prosessitbusiness.industryDeep learningspektrikuvausforestryHyperspectral imagingdeep learningmetsänarviointikoneoppiminenchemistryChlorophyllGeneral Earth and Planetary Scienceslcsh:QArtificial intelligencekaukokartoitusmetsänhoitobusinessphysical parameter retrievalstochastic modelingRemote Sensing; Volume 12; Issue 2; Pages: 283
researchProduct

Cloning and training collective intelligence with generative adversarial networks

2021

Industry 4.0 and highly automated critical infrastructure can be seen as cyber‐physical‐social systems controlled by the Collective Intelligence. Such systems are essential for the functioning of the society and economy. On one hand, they have flexible infrastructure of heterogeneous systems and assets. On the other hand, they are social systems, which include collaborating humans and artificial decision makers. Such (human plus machine) resources must be pre‐trained to perform their mission with high efficiency. Both human and machine learning approaches must be bridged to enable such training. The importance of these systems requires the anticipation of the potential and previously unknow…

Cognitive scienceTechnological innovations. AutomationCloning (programming)Computer scienceHD45-45.2Collective intelligenceManufacturestekoälyTraining (civil)Industrial and Manufacturing EngineeringTS1-2301Computer Science ApplicationsAdversarial systemkoneoppiminenArtificial IntelligenceHardware and Architectureautomaatiojärjestelmätihminen-konejärjestelmätälytekniikkaGenerative grammarIET Collaborative Intelligent Manufacturing
researchProduct

Pain fingerprinting using multimodal sensing: pilot study

2021

Abstract Pain is a complex phenomenon, the experience of which varies widely across individuals. At worst, chronic pain can lead to anxiety and depression. Cost-effective strategies are urgently needed to improve the treatment of pain, and thus we propose a novel home-based pain measurement system for the longitudinal monitoring of pain experience and variation in different patients with chronic low back pain. The autonomous nervous system and audio-visual features are analyzed from heart rate signals, voice characteristics and facial expressions using a unique measurement protocol. Self-reporting is utilized for the follow-up of changes in pain intensity, induced by well-designed physical …

Computer Networks and Communicationskipusignaalianalyysimonitorointiaudio analysiskivunhoitomachine learningkoneoppiminenHardware and Architectureheart rateMedia Technologyselkäkrooninen kipuilmeetEEGsykemittaritlow back painfacial expressionelectroencephalographySoftwareMultimedia Tools and Applications
researchProduct

Detection of developmental dyslexia with machine learning using eye movement data

2021

Dyslexia is a common neurocognitive learning disorder that can seriously hinder individuals’ aspirations if not detected and treated early. Instead of costly diagnostic assessment made by experts, in the near future dyslexia might be identified with ease by automated analysis of eye movements during reading provided by embedded eye tracking technology. However, the diagnostic machine learning methods need to be optimized first. Previous studies with machine learning have been quite successful in identifying dyslexic readers, however, using contrasting groups with large performance differences between diagnosed and good readers. A practical challenge is to identify also individuals with bord…

Computer engineering. Computer hardwareSupport Vector MachineComputer sciencemedia_common.quotation_subject02 engineering and technologyMachine learningcomputer.software_genre050105 experimental psychologyDyslexiaTK7885-7895FluencysilmänliikkeetoppimisvaikeudetReading (process)dyslexia0202 electrical engineering electronic engineering information engineeringmedicinedysleksia0501 psychology and cognitive sciencessupport vector machinemedia_commonRandom ForestRecallbusiness.industry05 social sciencesDyslexiaEye movementGeneral MedicineQA75.5-76.95diagnostiikkamedicine.diseaseRandom forestkoneoppiminenElectronic computers. Computer scienceLearning disabilityEye tracking020201 artificial intelligence & image processingArtificial intelligencemedicine.symptombusinesscomputerrandom forestArray
researchProduct

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

2013

Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…

Computer scienceAnomaly-based intrusion detection systemNetwork securityintrusion detectiontunkeutumisen havaitseminenFeature extractionDiffusion mapdiffusion mapIntrusion detection systemMachine learningcomputer.software_genrepoikkeavuuden havaitseminenBlack boxtiedon louhintan-grammiCluster analysista113Training setrule extractionbusiness.industryn-gramanomaly detectiondiffuusiokarttakoneoppiminensääntöjen erottaminenAnomaly detectionArtificial intelligenceData miningtiedonlouhintabusinesscomputer2013 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Building a Maturity Model for Developing Ethically Aligned AI Systems

2021

Ethical concerns related to Artificial Intelligence (AI) equipped systems are prompting demands for ethical AI from all directions. As a response, in recent years public bodies, governments, and companies have rushed to provide guidelines and principles for how AI-based systems are designed and used ethically. We have learned, however, that high-level principles and ethical guidelines cannot be easily converted into actionable advice for industrial organizations that develop AI-based information systems. Maturity models are commonly used in software and systems development companies as a roadmap for improving the performance. We argue that they could also be applied in the context of develo…

ComputingMethodologies_PATTERNRECOGNITIONkoneoppiminenkehittäminenmallit (mallintaminen)toimintamallittekoälyetiikkaeettisyysGeneralLiterature_MISCELLANEOUStietojärjestelmät
researchProduct

A Robust Minimal Learning Machine based on the M-Estimator

2017

In this paper we propose a robust Minimal Learning Machine (R-RLM) for regression problems. The proposed method uses a robust M-estimator to generate a linear mapping between input and output distances matrices of MLM. The R-MLM was tested on one synthetic and three real world datasets that were contaminated with an increasing number of outliers. The method achieved a performance comparable to the robust Extreme Learning Machine (R-RLM) and thus can be seen as a valid alternative for regression tasks on datasets with outliers. peerReviewed

ComputingMethodologies_PATTERNRECOGNITIONkoneoppiminenlearning methods
researchProduct

DGA detection using machine learning methods

2016

Yksi yleisimmistä kyberhyökkäysistä on käyttää ryhmä yksityisiä tietokoneita (private computers), joita käytetään esimerkiksi salaisien tietojen levittämiseen. Näitä koneryhmiä kutsutaan botnet. Botnetit pysyvät havaitsemattomana käyttämällä Domain Name Generation (DGA) menetelmää, joka luo ajoittain ja ratkaisee suurina lukumäärinä erillaisia pseudosatunnaisia verkkotunnuksia, kunnes jokin näistä pseudosatunnaisista verkkotunnuksista DNS palvelin hyväksyy. Tämän tutkielman tarkoitus on kehitellä ei- ohjattuja koneoppimismenetelmiä ja vertailla näiden tarkkuutta ohjattuihin koneoppimismenetelmiin DGA hyökkäyksien havaitsemiseen. Lisäksi, tutkielmassa esitellään Random One Class Support Vect…

DGA-algoritmikoneoppiminenrakenteeton databotnettietoturva
researchProduct