Search results for "machine learning."

showing 10 items of 1455 documents

CoCoDat: a database system for organizing and selecting quantitative data on single neurons and neuronal microcircuitry.

2004

We present a novel database system for organizing and selecting quantitative experimental data on single neurons and neuronal microcircuitry that has proven useful for reference-keeping, experimental planning and computational modelling. Building on our previous experience with large neuroscientific databases, the system takes into account the diversity and method-dependence of single cell and microcircuitry data and provides tools for entering and retrieving published data without a priori interpretation or summarizing. Data representation is based on the framework suggested by biophysical theory and enables flexible combinations of data on membrane conductances, ionic and synaptic current…

Computer sciencecomputer.internet_protocolRelational databaseModels NeurologicalAction PotentialsInformation Storage and Retrievalcomputer.software_genreMachine learningExternal Data RepresentationData retrievalAnimalsComputer SimulationLayer (object-oriented design)NeuronsDatabasebusiness.industryGeneral NeuroscienceExperimental dataRatsData sharingScalabilityDatabase Management SystemsArtificial intelligenceNeural Networks ComputerNerve NetbusinesscomputerXMLJournal of neuroscience methods
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Assessment of Deep Learning Methodology for Self-Organizing 5G Networks

2019

In this paper, we present an auto-encoder-based machine learning framework for self organizing networks (SON). Traditional machine learning approaches, for example, K Nearest Neighbor, lack the ability to be precisely predictive. Therefore, they can not be extended for sequential data in the true sense because they require a batch of data to be trained on. In this work, we explore artificial neural network-based approaches like the autoencoders (AE) and propose a framework. The proposed framework provides an advantage over traditional machine learning approaches in terms of accuracy and the capability to be extended with other methods. The paper provides an assessment of the application of …

Computer scienceintrusion detection5G-tekniikka02 engineering and technologyIntrusion detection systemself-organizing networks (SON)Machine learningcomputer.software_genrelcsh:Technologyk-nearest neighbors algorithmself-organizing networkslcsh:Chemistryautoencoder (AE)deep learning (DL)mobility load balancing0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer ProcessesautoencoderArtificial neural networkbusiness.industrylcsh:Tmobility load balancing (MLB)Process Chemistry and TechnologyDeep learningGeneral Engineeringdeep learning020206 networking & telecommunicationsSelf-organizing networkLoad balancing (computing)021001 nanoscience & nanotechnologyAutoencoderlcsh:QC1-999Computer Science Applicationscell outage detectionlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Cellular networkArtificial intelligence0210 nano-technologybusinesslcsh:Engineering (General). Civil engineering (General)computerlcsh:Physics5G
researchProduct

The Elephant in the Machine: Proposing a New Metric of Data Reliability and its Application to a Medical Case to Assess Classification Reliability

2020

In this paper, we present and discuss a novel reliability metric to quantify the extent a ground truth, generated in multi-rater settings, as a reliable basis for the training and validation of machine learning predictive models. To define this metric, three dimensions are taken into account: agreement (that is, how much a group of raters mutually agree on a single case)

Computer sciencekneeMachine learningcomputer.software_genrelcsh:TechnologyTask (project management)lcsh:Chemistry03 medical and health sciencesMagnetic resonance imaging0302 clinical medicine0504 sociologyGeneral Materials Science030212 general & internal medicinelcsh:QH301-705.5InstrumentationCompetence (human resources)MRNetReliability (statistics)Fluid Flow and Transfer ProcessesGround truthreliabilityBasis (linear algebra)Point (typography)lcsh:Tbusiness.industryComputer Science::Information RetrievalProcess Chemistry and Technology05 social sciencesGeneral Engineering050401 social sciences methodslcsh:QC1-999Computer Science ApplicationsInter-rater reliabilitymachine learninglcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040inter-rater agreementArtificial intelligenceMetric (unit)lcsh:Engineering (General). Civil engineering (General)businessground truthcomputerlcsh:PhysicsApplied Sciences
researchProduct

Automation Inner Speech as an Anthropomorphic Feature Affecting Human Trust: Current Issues and Future Directions

2021

This paper aims to discuss the possible role of inner speech in influencing trust in human–automation interaction. Inner speech is an everyday covert inner monolog or dialog with oneself, which is essential for human psychological life and functioning as it is linked to self-regulation and self-awareness. Recently, in the field of machine consciousness, computational models using different forms of robot speech have been developed that make it possible to implement inner speech in robots. As is discussed, robot inner speech could be a new feature affecting human trust by increasing robot transparency and anthropomorphism.

Computer sciencemedia_common.quotation_subject050105 experimental psychologyHuman–robot interactionhuman-robot interactioninner speechArtificial IntelligenceHuman–computer interactionHypothesis and TheoryTJ1-1570Feature (machine learning)0501 psychology and cognitive sciencesMechanical engineering and machinery050107 human factorsmedia_commonautomationRobotics and AIComputational modelhuman-automation interaction05 social sciencesInternal monologueanthropomorphismtrustrobotQA75.5-76.95Transparency (behavior)Computer Science ApplicationsCovertanthropomorphism automation human-automation interaction human-robot interaction inner speech robot trustElectronic computers. Computer scienceRobotConsciousnessFrontiers in Robotics and AI
researchProduct

Individualizing deep dynamic models for psychological resilience data

2020

ABSTRACTDeep learning approaches can uncover complex patterns in data. In particular, variational autoencoders (VAEs) achieve this by a non-linear mapping of data into a low-dimensional latent space. Motivated by an application to psychological resilience in the Mainz Resilience Project (MARP), which features intermittent longitudinal measurements of stressors and mental health, we propose an approach for individualized, dynamic modeling in this latent space. Specifically, we utilize ordinary differential equations (ODEs) and develop a novel technique for obtaining person-specific ODE parameters even in settings with a rather small number of individuals and observations, incomplete data, an…

Computer sciencemedia_common.quotation_subjectMathematics and computing ; PsychologySpace (commercial competition)Machine learningcomputer.software_genre050105 experimental psychology0504 sociologyHumans0501 psychology and cognitive sciencesBaseline (configuration management)media_commonMultidisciplinarybusiness.industryDeep learning05 social sciencesOde050401 social sciences methodsResilience PsychologicalMental healthRegressionSystem dynamicsMental HealthPsychological resilienceArtificial intelligencebusinesscomputer
researchProduct

Vectors of Pairwise Item Preferences

2019

Neural embedding has been widely applied as an effective category of vectorization methods in real-world recommender systems. However, its exploration of users’ explicit feedback on items, to create good quality user and item vectors is still limited. Existing neural embedding methods only consider the items that are accessed by the users, but neglect the scenario when a user gives high or low rating to a particular item. In this paper, we propose Pref2Vec, a method to generate vector representations of pairwise item preferences, users and items, which can be directly utilized for machine learning tasks. Specifically, Pref2Vec considers users’ pairwise item preferences as elementary units. …

Computer scienceneuraalilaskentaInitialization02 engineering and technology010501 environmental sciencesRecommender systemMachine learningcomputer.software_genre01 natural sciences0202 electrical engineering electronic engineering information engineeringvectorizationPreference (economics)Independence (probability theory)0105 earth and related environmental sciencesbusiness.industryComputer Science::Information RetrievalsuosittelujärjestelmätConditional probabilityneural embeddingVectorization (mathematics)Benchmark (computing)020201 artificial intelligence & image processingPairwise comparisonArtificial intelligencebusinesscomputer
researchProduct

Artificial Decision Maker Driven by PSO : An Approach for Testing Reference Point Based Interactive Methods

2018

Over the years, many interactive multiobjective optimization methods based on a reference point have been proposed. With a reference point, the decision maker indicates desirable objective function values to iteratively direct the solution process. However, when analyzing the performance of these methods, a critical issue is how to systematically involve decision makers. A recent approach to this problem is to replace a decision maker with an artificial one to be able to systematically evaluate and compare reference point based interactive methods in controlled experiments. In this study, a new artificial decision maker is proposed, which reuses the dynamics of particle swarm optimization f…

Computer sciencepäätöksentekomultiple criteria decision makingContext (language use)02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesMulti-objective optimizationoptimointi0202 electrical engineering electronic engineering information engineeringmultiobjective optimization0101 mathematicsToma de decisionespreference articulationparticle swarm optimizationbusiness.industryParticle swarm optimizationDecision makermonitavoiteoptimointiPreferenceMulti-objective optimization010101 applied mathematicsBenchmark (computing)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

Khmer character recognition using artificial neural network

2014

Character Recognition has become an interesting and a challenge topic research in the field of pattern recognition in recent decade. It has numerous applications including bank cheques, address sorting and conversion of handwritten or printed character into machine-readable form. Artificial neural network including self-organization map and multilayer perceptron network with the learning ability could offer the solution to character recognition problem. In this paper presents Khmer Character Recognition (KCR) system implemented in Matlab environment using artificial neural networks. The KCR system described the utilization of integrated self-organization map (SOM) network and multilayer per…

ComputingMethodologies_PATTERNRECOGNITIONArtificial neural networkComputer sciencebusiness.industryTime delay neural networkIntelligent character recognitionMultilayer perceptronPattern recognition (psychology)Feature (machine learning)NeocognitronArtificial intelligencebusinessBackpropagationSignal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific
researchProduct

SMEs' heterogeneity at the extensive margin and within the intensive margin of trade

2021

In this paper, we contribute to the literature on firm-heterogeneity and trade, by looking not only at the firm-level determinants of trade participation (i.e. extensive margin) but also at differences between firms with different levels of trade intensity (i.e. intensive margin). Further, we compare firms that are born ‘local’ and display different scales of international exposure to firms that are born ‘global’, i.e. access international markets soon after their birth. Using a large World Bank dataset of SMEs from 112 countries and qualitative dependent variable models, our analysis uncovers the heterogeneity of SMEs not only at the extensive margin but also within the intensive margin of…

ComputingMilieux_THECOMPUTINGPROFESSIONborn local05 social sciencesGeography Planning and DevelopmentAerospace EngineeringInternational economicsDevelopmentheterogeneity in tradeMargin (machine learning)born global0502 economics and businessEconomics050207 economicsSMEs internationalization
researchProduct