Search results for "machine"

showing 10 items of 2592 documents

Optimal rates of convergence for persistence diagrams in Topological Data Analysis

2013

Computational topology has recently known an important development toward data analysis, giving birth to the field of topological data analysis. Topological persistence, or persistent homology, appears as a fundamental tool in this field. In this paper, we study topological persistence in general metric spaces, with a statistical approach. We show that the use of persistent homology can be naturally considered in general statistical frameworks and persistence diagrams can be used as statistics with interesting convergence properties. Some numerical experiments are performed in various contexts to illustrate our results.

Computational Geometry (cs.CG)FOS: Computer and information sciences[ MATH.MATH-GT ] Mathematics [math]/Geometric Topology [math.GT][STAT.TH] Statistics [stat]/Statistics Theory [stat.TH]Topological Data analysis Persistent homology minimax convergence rates geometric complexes metric spacesGeometric Topology (math.GT)Mathematics - Statistics TheoryStatistics Theory (math.ST)[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG][STAT.TH]Statistics [stat]/Statistics Theory [stat.TH][INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][ STAT.TH ] Statistics [stat]/Statistics Theory [stat.TH][ INFO.INFO-LG ] Computer Science [cs]/Machine Learning [cs.LG]Machine Learning (cs.LG)Computer Science - LearningMathematics - Geometric Topology[INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG][MATH.MATH-GT]Mathematics [math]/Geometric Topology [math.GT]FOS: Mathematics[ INFO.INFO-CG ] Computer Science [cs]/Computational Geometry [cs.CG]Computer Science - Computational Geometry[MATH.MATH-GT] Mathematics [math]/Geometric Topology [math.GT]
researchProduct

Enhancing Attention’s Explanation Using Interpretable Tsetlin Machine

2022

Explainability is one of the key factors in Natural Language Processing (NLP) specially for legal documents, medical diagnosis, and clinical text. Attention mechanism has been a popular choice for such explainability recently by estimating the relative importance of input units. Recent research has revealed, however, that such processes tend to misidentify irrelevant input units when explaining them. This is due to the fact that language representation layers are initialized by pre-trained word embedding that is not context-dependent. Such a lack of context-dependent knowledge in the initial layer makes it difficult for the model to concentrate on the important aspects of input. Usually, th…

Computational MathematicsNumerical AnalysisComputational Theory and MathematicsNLP; interpretability; explainability; Tsetlin Machine; Bi-GRUs; attentionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Theoretical Computer Science
researchProduct

On the Computational Complexity of Binary and Analog Symmetric Hopfield Nets

2000

We investigate the computational properties of finite binary- and analog-state discrete-time symmetric Hopfield nets. For binary networks, we obtain a simulation of convergent asymmetric networks by symmetric networks with only a linear increase in network size and computation time. Then we analyze the convergence time of Hopfield nets in terms of the length of their bit representations. Here we construct an analog symmetric network whose convergence time exceeds the convergence time of any binary Hopfield net with the same representation length. Further, we prove that the MIN ENERGY problem for analog Hopfield nets is NP-hard and provide a polynomial time approximation algorithm for this p…

Computational complexity theoryCognitive NeuroscienceComputationBinary numberHopfield networkTuring machinesymbols.namesakeRecurrent neural networkArts and Humanities (miscellaneous)Convergence (routing)symbolsTime complexityAlgorithmMathematicsNeural Computation
researchProduct

Descriptive Complexity, Lower Bounds and Linear Time

1999

This paper surveys two related lines of research: Logical characterizations of (non-deterministic) linear time complexity classes, and non-expressibility results concerning sublogics of existential second-order logic. Starting from Fagin’s fundamental work there has been steady progress in both fields with the effect that the weakest logics that are used in characterizations of linear time complexity classes are closely related to the strongest logics for which inexpressibility proofs for concrete problems have been obtained. The paper sketches these developments and highlights their connections as well as the obstacles that prevent us from closing the remaining gap between both kinds of lo…

Computational complexity theoryComputer scienceDescriptive complexity theoryMathematical proofCombinatoricsTuring machinesymbols.namesakeTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRegular languageCalculusComplexity classsymbolsUnary functionTime complexity
researchProduct

Irrelevant Features, Class Separability, and Complexity of Classification Problems

2011

In this paper, analysis of class separability measures is performed in attempt to relate their descriptive abilities to geometrical properties of classification problems in presence of irrelevant features. The study is performed on synthetic and benchmark data with known irrelevant features and other characteristics of interest, such as class boundaries, shapes, margins between classes, and density. The results have shown that some measures are individually informative, while others are less reliable and only can provide complimentary information. Classification problem complexity measurements on selected data sets are made to gain additional insights on the obtained results.

Computational complexity theoryCovariance matrixComputer sciencebusiness.industryFeature extractionPattern recognitionArtificial intelligencebusinessMachine learningcomputer.software_genreClass (biology)computerClass separability2011 IEEE 23rd International Conference on Tools with Artificial Intelligence
researchProduct

RNN- and LSTM-Based Soft Sensors Transferability for an Industrial Process

2021

The design and application of Soft Sensors (SSs) in the process industry is a growing research field, which needs to mediate problems of model accuracy with data availability and computational complexity. Black-box machine learning (ML) methods are often used as an efficient tool to implement SSs. Many efforts are, however, required to properly select input variables, model class, model order and the needed hyperparameters. The aim of this work was to investigate the possibility to transfer the knowledge acquired in the design of a SS for a given process to a similar one. This has been approached as a transfer learning problem from a source to a target domain. The implementation of a transf…

Computational complexity theoryProcess (engineering)Computer sciencesulfur recovery unit02 engineering and technologytransfer learningMachine learningcomputer.software_genrelcsh:Chemical technologyBiochemistryRNNField (computer science)ArticleAnalytical ChemistryDomain (software engineering)0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationsystem identificationHyperparameterbusiness.industry020208 electrical & electronic engineeringdynamical modelsSystem identificationAtomic and Molecular Physics and OpticsNonlinear systemRecurrent neural networksoft sensors020201 artificial intelligence & image processingArtificial intelligenceTransfer of learningbusinessLSTMcomputerDynamical models; LSTM; RNN; Soft sensors; Sulfur recovery unit; System identification; Transfer learningSensors
researchProduct

On the effect of analog noise in discrete-time analog computations

1998

We introduce a model for analog computation with discrete time in the presence of analog noise that is flexible enough to cover the most important concrete cases, such as noisy analog neural nets and networks of spiking neurons. This model subsumes the classical model for digital computation in the presence of noise. We show that the presence of arbitrarily small amounts of analog noise reduces the power of analog computational models to that of finite automata, and we also prove a new type of upper bound for the VC-dimension of computational models with analog noise.

Computational modelFinite-state machineArtificial neural networkComputer scienceCognitive NeuroscienceComputationanalog noiseAnalog signal processingUpper and lower boundsArts and Humanities (miscellaneous)Discrete time and continuous timeNoise (video)Algorithmanalog computations
researchProduct

Superior Performances of the Neural Network on the Masses Lesions Classification through Morphological Lesion Differences

2007

Purpose of this work is to develop an automatic classification system that could be useful for radiologists in the breast cancer investigation. The software has been designed in the framework of the MAGIC-5 collaboration. In an automatic classification system the suspicious regions with high probability to include a lesion are extracted from the image as regions of interest (ROIs). Each ROI is characterized by some features based generally on morphological lesion differences. A study in the space features representation is made and some classifiers are tested to distinguish the pathological regions from the healthy ones. The results provided in terms of sensitivity and specificity will be p…

Computer Aided DetectionSupport Vector MachineNeural NetworksK-Nearest Neighbours
researchProduct

What is it about humanity that we can't give away to intelligent machines? A European perspective

2021

Abstract One of the most significant recent technological developments concerns the development and implementation of ‘intelligent machines’ that draw on recent advances in artificial intelligence (AI) and robotics. However, there are growing tensions between human freedoms and machine controls. This article reports the findings of a workshop that investigated the application of the principles of human freedom throughout intelligent machine development and use. Forty IS researchers from ten different countries discussed four contemporary AI and humanity issues and the most relevant IS domain challenges. This article summarizes their experiences and opinions regarding four AI and humanity th…

Computer Networks and Communications05 social sciencesPerspective (graphical)02 engineering and technologyLibrary and Information SciencesROBÔSDomain (software engineering)020204 information systems0502 economics and businessHumanity0202 electrical engineering electronic engineering information engineering050211 marketingEngineering ethicsSociologyIntelligent machineInformation SystemsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct