Search results for "machine"

showing 10 items of 2592 documents

Deep learning to detect built cultural heritage from satellite imagery. - Spatial distribution and size of vernacular houses in Sumba, Indonesia -

2021

Abstract In Sumba Island – Indonesia, the implantation of vernacular houses, inside and outside traditional villages, is considered to be an efficient proxy for the on-going complex cultural transformations resulting from globalization. This study presents an easily reproducible workflow allowing buildings to be automatically detected from satellite imagery, demonstrating how modern computer vision methods based on deep learning can help in this task, which would be far too time-consuming when undertaken by hand. Eight deep learning architectures based on convolutional neural networks were compared in terms of ability to identify and locate precisely traditional houses from satellite images…

Archeology[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistoryComputer scienceMaterials Science (miscellaneous)02 engineering and technologyConservationMachine learningcomputer.software_genreConvolutional neural network11. SustainabilityClassifier (linguistics)0202 electrical engineering electronic engineering information engineering0601 history and archaeologyArchitectureSpectroscopyComputingMilieux_MISCELLANEOUS060102 archaeologyPoint (typography)business.industryDeep learning06 humanities and the arts[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]Support vector machineCultural heritageWorkflowChemistry (miscellaneous)[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingArtificial intelligencebusinessGeneral Economics Econometrics and Financecomputer
researchProduct

Computing methods for resilience: evaluating new building components in the frame of SECAPs

2019

Resilience represents a new important feature that the anthropic systems, and cities among them, are called to cope with. In fact, the increasing negative stresses to which urban contexts are exposed, and mainly the climatic pressures, call for the capability of adapting to these modifications and, possibly, to restore the ex-ante situations. The role of the buildings and their envelope components is of crucial importance to this aim. This paper analyses the features of resilience of the roofs of buildings by means of proper quantitative indexes. On purpose, the performances of green and cool roofs are compared. The possibility of adopting nonstructural solutions, like the windows shading d…

Architectural engineeringgreen roofComputer science020209 energycool roof0211 other engineering and technologies02 engineering and technologygreen roofsenergy consumption021105 building & constructionbuilding0202 electrical engineering electronic engineering information engineeringFeature (machine learning)shading devicesResilience (network)resilienceshading devices.Settore ING-IND/11 - Fisica Tecnica AmbientaleFrame (networking)Energy consumptionbuildingsbuildings energy consumption resilience green roofs cool roofs shading devicescool roofsbuildings; cool roofs; energy consumption; green roofs; resilience; shading devicesReflective surfacesEnvelope (motion)
researchProduct

Methodological advances in brain connectivity

2012

Determining how distinct neurons or brain regions are connected and communicate with each other is a crucial point in neuroscience, as it allows to investigate how the functional integration of specialized neural populations enables the emergence of coherent cognitive and behavioral states. The general concept of brain connectivity encompasses different aspects: structural connectivity is related to the description of anatomical pathways and synaptic connections; functional connectivity investigates statistical dependencies between spatially separated brain regions; effective connectivity refers to models aimed at elucidating driver-response relationships. The study of these different modes…

Article SubjectImmunology and Microbiology (all)Computer scienceModels NeurologicalNeurophysiologyElectroencephalographylcsh:Computer applications to medicine. Medical informaticsMachine learningcomputer.software_genreModels BiologicalBrain mappingGeneral Biochemistry Genetics and Molecular BiologySynchronization (computer science)medicineHumansNeuronsConnectivityBrain MappingComputational modelBiochemistry Genetics and Molecular Biology (all)Quantitative Biology::Neurons and CognitionGeneral Immunology and MicrobiologyArtificial neural networkFunctional integration (neurobiology)medicine.diagnostic_testbusiness.industryModeling and Simulation; Biochemistry Genetics and Molecular Biology (all); Immunology and Microbiology (all); Applied MathematicsApplied MathematicsBrainComputational BiologyMagnetoencephalographyElectroencephalographyGeneral MedicineMagnetoencephalographyEditorialModeling and SimulationMultivariate AnalysisSettore ING-INF/06 - Bioingegneria Elettronica E Informaticalcsh:R858-859.7Transfer entropyArtificial intelligenceNetworksbusinesscomputerSoftware
researchProduct

Collecting and Using Students’ Digital Well-Being Data in Multidisciplinary Teaching

2018

This article examines how students (N=198; aged 13 to 17) experienced the new methods for sensor-based learning in multidisciplinary teaching in lower and upper secondary education that combine the use of new sensor technology and learning from self-produced well-being data. The aim was to explore how students perceived new methods from the point of view of their learning and did the teaching methods provide new information that could promote their own well-being. We also aimed to find out how to collect digital well-being data from a large number of students and how the collected big data set can be utilized to predict school success from the students’ well-being data by using machine lear…

Article SubjectoppiminenComputer scienceTeaching methodhyvinvointiBig dataMachine learningcomputer.software_genrelcsh:Education (General)EducationCorrelation03 medical and health sciences0302 clinical medicineMultidisciplinary approachta516Set (psychology)ta113studentsopiskelijatPoint (typography)business.industry05 social sciences050301 educationdigital well-being datadataMultilayer perceptronWell-beingArtificial intelligencelcsh:L7-991business0503 educationcomputermultidisciplinary teaching030217 neurology & neurosurgeryEducation Research International
researchProduct

Comparison of Micro X-ray Computer Tomography Image Segmentation Methods: Artificial Neural Networks Versus Least Square Support Vector Machine

2013

Micro X-ray computer tomography (XCT) is a powerful non-destructive method for obtaining information about rock structures and mineralogy. A new methodology to obtain porosity from 2D XCT digital images using artificial neural network and least square support vector machine is demonstrated following these steps: the XCT image was first preprocessed, thereafter clustering algorithms such as K-means, Fuzzy c-means and self-organized maps was used for image segmentation. Then artificial neural network was applied for image classification. For comparison, least square support vector machine approach was used for classification labeling of the scan images. The methodology shows how artificial ne…

Artifact (error)Artificial neural networkContextual image classificationbusiness.industryComputer sciencePattern recognitionImage segmentationSupport vector machineDigital imageComputer visionArtificial intelligencebusinessCluster analysisCurse of dimensionality
researchProduct

Complexity reduction in efficient prototype-based classification

2006

Artificial Intelligencebusiness.industryComputer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessMachine learningcomputer.software_genrecomputerSoftwarePattern Recognition
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

DeepEva: A deep neural network architecture for assessing sentence complexity in Italian and English languages

2021

Abstract Automatic Text Complexity Evaluation (ATE) is a research field that aims at creating new methodologies to make autonomous the process of the text complexity evaluation, that is the study of the text-linguistic features (e.g., lexical, syntactical, morphological) to measure the grade of comprehensibility of a text. ATE can affect positively several different contexts such as Finance, Health, and Education. Moreover, it can support the research on Automatic Text Simplification (ATS), a research area that deals with the study of new methods for transforming a text by changing its lexicon and structure to meet specific reader needs. In this paper, we illustrate an ATE approach named De…

Artificial intelligenceComputer engineering. Computer hardwareText simplificationComputer scienceText simplificationcomputer.software_genreLexiconAutomatic-text-complexity-evaluationDeep-learningField (computer science)TK7885-7895Automatic text copmplexity evaluationText-complexity-assessmentText complexity assessmentStructure (mathematical logic)Settore INF/01 - InformaticaText-simplificationbusiness.industryDeep learningNatural language processingNatural-language-processingDeep learningGeneral MedicineQA75.5-76.95Artificial-intelligenceSupport vector machineElectronic computers. Computer scienceGradient boostingArtificial intelligencebusinesscomputerSentenceNatural language processingArray
researchProduct

Real-time micro-expression analysis by artificial vision

2022

Human-computer interaction technologies focus more and more on the human being, whether it is on his identity, or on his physical and mental state. Significant progress has been made in the last few decades. However, the study of thoughts and emotions is still an underdeveloped field, but one that has begun to gain considerable interest. In this field, the analysis of facial expressions is the preferred treatment.Unlike a macro-expression, which is visible to the eye, a micro-expression is a type of involuntary facial expression that is extremely rapid and of very low intensity. The computer vision scientific community has been studying ways to automatically recognize micro-expressions usin…

Artificial intelligence[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingVision par ordinateurMachine learningComputer visionEmotional artificial intelligenceApprentissage automatiqueIntelligence artificielleIntelligence artificielle émotionnelle
researchProduct

Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation

2019

Abstract Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a method that works in three stages. First, the ExtraTrees classifier is used to select relevant features for each type of attack individually for each (ELM). Then, an ensemble of ELMs is used to detect each type of attack separately. Finally, the results of all ELMs are combined using a softmax layer to refine the results and increase the accuracy further. The intuition behind our system is that multi-class classification is quite difficult compared to binary classification. So, we…

Artificial intelligencelcsh:Computer engineering. Computer hardwareExtreme learning machineEnsemble methodsComputer scienceBinary numberlcsh:TK7885-7895Feature selection02 engineering and technologyIntrusion detection systemlcsh:QA75.5-76.95Machine learning0202 electrical engineering electronic engineering information engineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Multi layerExtreme learning machinebusiness.industryIntrusion detection system020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsBinary classificationFeature selectionSignal ProcessingSoftmax function020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligencebusinessClassifier (UML)EURASIP Journal on Information Security
researchProduct