The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The word-to-vector (W2V) technique represents words as low-dimensional continuous vectors in such a way that semantic related words are close to each other. This produces a semantic space where a word or a word collection (e.g., a document) can be well represented, and thus lends itself to a multitude of applications including document classification. Our previous study demonstrated that representations...
The realization of robotic systems that understands human intentions and produces accordingly complex behaviors is needed particularly for disabled persons, and would consequently benefit the aged. For this purpose, a control technique that recognizes human intentions from neural responses called brain machine interface (BMI) have been suggested. The unique ability to communicate with machines by...
Multi-label classification is a generalization of single-label classification, and its samples belong to multiple labels. The K-nearest neighbor algorithm can solve this problem as an optimization problem. It finds the optimum solution by caculating the distance between each sample in general. But in fact, the distance of K-nearest neighbor algorithm may be miscalculated due to the caused by the redundant...
We used the experience of spam filtering on account of Chinese short messages service spam filtering and compared the performances of typical discriminative learning model and generative model, namely naive bayesian model and logistic regression model. Overall, in Chinese short messages service spam filtering, the performance of naive bayesian model is better than logistic regression model using 1-ROCA...
There are many circular-shaped objects in our daily life. Most of these objects usually are deformed and move in both translational and rotational. Under prospective projection, a circle sometimes deformed into an ellipse. Some ellipse-based tracking algorithms can be used tracking the translation when the contour can be extracted automatically, but the rotation can not be extracted. In this paper,...
In open-source software development the bug report is usually assigned to a developer for bug fixing. A large number of bug reports are tossed (reassigned) to other developers, for example because the bugs have been assigned by mistake. The tossing events increase bug-fix time. In order to quickly identify the fixer to bug reports we present an approach based on the bug tossing history and textual...
This Internet traffic classification using Machine Learning is an emerging research field since 1990's, and now it is widely used in numerous network activities. The classification technique focuses on modeling attributes and features of data flows to accomplish the identification of applications. In the paper we design and implement the classification model based on header-derived flow statistical...
Support vector machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the problem of learning from imbalanced data sets in which negative instances greatly outnumber the positive instances. This paper analyzes the intrinsic factors behind this failure and proposes a suitable re-sampling method. We...
Because of today's explosive information from Internet, people will contact much new information at any moment. So how to analyze this non-stationary information becomes more and more important. Clustering analysis is a good information analysis method, but many clustering algorithms only fit to stationary situation. Then in this paper, a novel incremental clustering algorithm based on self-organizing-mapping-IGSOM...
A new Chinese chunking algorithm is proposed based on conditional random fields and semantic features. Through the analysis of Chinese chunking task and its sequential characteristics, conditional random fields that combine various kinds of features were applied. Semantic features were utilized to further improve the chunking performance. Experimental results on the Chinese chunking corpus of Microsoft...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.