Search results for "machine learning."

showing 10 items of 1455 documents

A probabilistic approach to learning a visually grounded language model through human-robot interaction

2010

A Language is among the most fascinating and complex cognitive activities that develops rapidly since the early months of infants' life. The aim of the present work is to provide a humanoid robot with cognitive, perceptual and motor skills fundamental for the acquisition of a rudimentary form of language. We present a novel probabilistic model, inspired by the findings in cognitive sciences, able to associate spoken words with their perceptually grounded meanings. The main focus is set on acquiring the meaning of various perceptual categories (e. g. red, blue, circle, above, etc.), rather than specific world entities (e. g. an apple, a toy, etc.). Our probabilistic model is based on a varia…

Robotics Machine Learning Human-Robot InteractionComputer sciencebusiness.industryProbabilistic logicLanguage acquisitionSemanticscomputer.software_genreHuman–robot interactionHuman–computer interactionArtificial intelligenceLanguage modelSet (psychology)Hidden Markov modelbusinesscomputerMotor skillHumanoid robotNatural language processingNatural language2010 IEEE/RSJ International Conference on Intelligent Robots and Systems
researchProduct

IMAGE PROCESSING, SEGMENTATION AND MACHINE LEARNING MODELS TO CLASSIFY AND DELINEATE TUMOR VOLUMES TO SUPPORT MEDICAL DECISION

2020

Techniques for processing and analysing images and medical data have become the main’s translational applications and researches in clinical and pre-clinical environments. The advantages of these techniques are the improvement of diagnosis accuracy and the assessment of treatment response by means of quantitative biomarkers in an efficient way. In the era of the personalized medicine, an early and efficacy prediction of therapy response in patients is still a critical issue. In radiation therapy planning, Magnetic Resonance Imaging (MRI) provides high quality detailed images and excellent soft-tissue contrast, while Computerized Tomography (CT) images provides attenuation maps and very good…

SUPPORT MEDICAL DECISIONSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIMAGE PROCESSINGSettore INF/01 - InformaticaTUMOR VOLUMESSettore ING-INF/06 - Bioingegneria Elettronica E InformaticaSEGMENTATIONMACHINE LEARNINGACTIVE CONTOUR
researchProduct

Novel scaffold of natural compound eliciting sweet taste revealed by machine learning

2020

Abstract Sugar replacement is still an active issue in the food industry. The use of structure-taste relationships remains one of the most rational strategy to expand the chemical space associated to sweet taste. A new machine learning model has been setup based on an update of the SweetenersDB and on open-source molecular features. It has been implemented on a freely accessible webserver. Cellular functional assays show that the sweet taste receptor is activated in vitro by a new scaffold of natural compounds identified by the in silico protocol. The newly identified sweetener belongs to the lignan chemical family and opens a new chemical space to explore.

ScaffoldsweetenerComputer scienceIn silicoMachine learningcomputer.software_genre01 natural sciencesAnalytical ChemistryReceptors G-Protein-Coupled0404 agricultural biotechnologysweet tastenatural compoundsHumans[CHIM]Chemical Sciences[SDV.BBM]Life Sciences [q-bio]/Biochemistry Molecular Biologysweet taste receptor2. Zero hungerbusiness.industryNatural compound010401 analytical chemistrydigestive oral and skin physiologySweet taste04 agricultural and veterinary sciencesGeneral Medicine040401 food scienceChemical space0104 chemical sciences[CHIM.THEO]Chemical Sciences/Theoretical and/or physical chemistrymachine learningSweetening AgentsTasteArtificial intelligencebusinesscomputer[CHIM.CHEM]Chemical Sciences/CheminformaticsFood Science
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

On Obtaining Classification Confidence, Ranked Predictions and AUC with Tsetlin Machines

2020

Tsetlin machines (TMs) are a promising approach to machine learning that uses Tsetlin Automata to produce patterns in propositional logic, leading to binary (hard) classifications. In many applications, however, one needs to know the confidence of classifications, e.g. to facilitate risk management. In this paper, we propose a novel scheme for measuring TM confidence based on the logistic function, calculated from the propositional logic patterns that match the input. We then use this scheme to trade off precision against recall, producing area under receiver operating characteristic curves (AUC) for TMs. Empirically, using four real-world datasets, we show that AUC is a more sensitive meas…

Scheme (programming language)Decision support systemReceiver operating characteristicComputer sciencebusiness.industry0206 medical engineeringBinary number02 engineering and technologyPropositional calculusMachine learningcomputer.software_genreAutomatonSupport vector machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligenceLogistic functionbusinesscomputer020602 bioinformaticscomputer.programming_language2020 IEEE Symposium Series on Computational Intelligence (SSCI)
researchProduct

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection

2004

The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …

Scheme (programming language)Majority ruleComputer sciencebusiness.industrySubstitution (logic)Base (topology)Machine learningcomputer.software_genreInformation sensitivityTerminal (electronics)Artificial intelligenceData miningbusinesscomputercomputer.programming_language
researchProduct

A Learning Automata Local Contribution Sampling Applied to Hydropower Production Optimisation

2017

Learning Automata (LA) is a powerful approach for solving complex, non-linear and stochastic optimisation problems. However, existing solutions struggle with high-dimensional problems due to slow convergence, arguably caused by the global nature of feedback. In this paper we introduce a novel Learning Automata (LA) scheme to attack this challenge. The scheme is based on a parallel form of Local Contribution Sampling (LCS), which means that the LA receive individually directed feedback, designed to speed up convergence. Furthermore, our scheme is highly decentralized, allowing parallel execution on GPU architectures. To demonstrate the power of our scheme, the LA LCS is applied to hydropower…

Scheme (programming language)Mathematical optimizationEngineeringSpeedupLearning automatabusiness.industrySampling (statistics)Machine learningcomputer.software_genrePower (physics)Range (mathematics)Convergence (routing)Reinforcement learningArtificial intelligencebusinesscomputercomputer.programming_language
researchProduct

Toward Self-Supervised Feature Learning for Online Diagnosis of Multiple Faults in Electric Powertrains

2021

This article proposes a novel online fault diagnosis scheme for industrial powertrains without using historical faulty or labeled training data. The proposed method combines a one-class support vector machine (SVM) based anomaly detection and supervised convolutional neural network (CNN) algorithms to online detect multiple faults and fault severities under variable speeds and loads. The one-class SVM algorithm is to derive a score for defining faults or health classes in the first stage, and the resulting health classes are used as the training data for the CNN-based classifier in the second stage. Within this framework, the self-supervised learning of the proposed CNN algorithm allows the…

Scheme (programming language)business.industryComputer science020208 electrical & electronic engineering02 engineering and technologyMachine learningcomputer.software_genreFault (power engineering)Convolutional neural networkComputer Science ApplicationsSupport vector machineStatistical classificationControl and Systems EngineeringClassifier (linguistics)0202 electrical engineering electronic engineering information engineeringAnomaly detectionArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerFeature learningInformation Systemscomputer.programming_languageIEEE Transactions on Industrial Informatics
researchProduct

A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks

2011

Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…

Scheme (programming language)business.industryComputer sciencemedia_common.quotation_subjectCognitionAmbiguityMachine learningcomputer.software_genreAsynchronous communicationConvergence (routing)Pairwise comparisonSocial mediaArtificial intelligencebusinesscomputerReliability (statistics)computer.programming_languagemedia_common2011 IEEE International Conference on Information Reuse & Integration
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct