The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Defining a boundary between inliers and outliers is a major challenge in unsupervised outlier detection. In the absence of labeled data, the true outliers set cannot be evaluated. This lays the burden on both the choice of an efficient outlier detection criterion, and parameter selection. While numerous unsupervised outlier detection criteria, with different parameters, have been proposed, an unsupervised...
We present a new framework and method for solving Multiple Instance Learning (MIL) problems. As a variation on supervised learning, MIL addresses the problem of classifying a bag of instances. If at least one of the instances in a bag is positive the bag is labeled positive, otherwise it is negative. We use a divide and conquer strategy to identify true positive group of instances in the positive...
There are numerous problems of increasing significance where a pattern can have several classes simultaneously associated. This kind of problems, usually called multi-label problems, should be tackled with specific techniques in order to generate models more accurate than those obtained with classical classification algorithms. This work presents the adaptation of the J48 algorithm to multi-label...
The selection of a particular neural network model belonging to the Pareto front is a problem that exists in all multi-objective algorithms. This paper proposes a novel solution to this problem based on a linear combination of the outputs of the two extremes in the Pareto front, which form an ensemble. The decision support TOPSIS method is used to determine which linear combination creates the best...
This article presents a clustering-based approach to fuzzy system identification. In order to construct an effective initial fuzzy model, this article tries to present a modular method to identify fuzzy systems based on a hybrid clustering-based technique. Moreover, the determination of the proper number of clusters and the appropriate location of clusters are one of primary considerations on constructing...
Image thresholding is a very important phase in the image analysis process. However, different images have different characteristics making the traditional process of thresholding by one algorithm a very challenging task. That is because any thresholding method may be perform well for some images but for sure it will not be suitable for all images. In this paper, intelligent thresholding by training...
Place recognition is a vital methodology for modeling environments and localizing autonomous mobile robots topologically. It can also be integrated in a hierarchical framework where it guides a fast and more precise metric position estimation. Especially for those hierarchical frameworks, it is crucial that the place recognition modules be highly accurate. In this paper, an information-theoretic approach...
This paper studies the suitability of Extreme Learning Machines (ELM) for resolving bioinformatic and biomedical classification problems. In order to test their overall performance, an experimental study is presented based on five gene microarray datasets found in bioinformatic and biomedical domains. The Fast Correlation-Based Filter (FCBF) was applied in order to identify salient expression genes...
Gender recognition is a hot research topic in recent years. Human-machine interfaces or video surveillance can be greatly improved if human gender can be recognized automatically. In this study, an embedded hidden Markov model is used for gender recognition. Video, which is recorded in different angles of view, is utilized to sample properties of each gender. Ten consecutive gait frames are segmented...
This paper discusses the application of two unsupervised methods in classifying type of soils. Soils that are suitable for agricultural activities can be classified into four classes which are hill soil, organic soil, alteration soil and alluvium soil. In addition, no specific support system is able to classify the type of soil and retrieve the information for location and suitable plants for local...
This paper presents an optimizing methodology for implementing a multi-layer perceptron (MLP) neural network in a Field Programmable Gate Array (FPGA) device. In order to obtain an efficient implementation, a compromise of time and area is needed. Starting from simulation in the learning phase with fixed point operators, we have developed a methodology which allows the automatic generation of a VHDL...
It is well known that the problem arising from high dimensionality of data should be considered in pattern recognition field. Face recognition databases are usually high dimensionality, especially when limited training samples are available for each subject. Traditional techniques perform dimensionality reduction are unable to solve this problem smoothly, which makes feature extraction task much difficult...
Multicriteria Collaborative Filtering is a promising approach to recommender systems that explores user ratings on item components in order to generate high quality recommendations. This paper focuses on multicriteria collaborative recommender systems and proposes a new algorithm that estimates aggregation functions, which represent the relative importance of individual components, based on the concept...
In this paper we propose a rough classification modeling algorithm based on Ant Colony Optimization (ACO) reduction. We used ACO to compute the rough set reduct and later a modified rules generation method is employed to generate the classification rules. The rules generation algorithm used is the simplification of the Default Rules Generation Framework (DRGF) in order to fit with the ACO reduct....
This paper proposes a new feature-selection strategy by integrating the Rough Set Theory (RST) and Particle Swarm Optimisation (PSO) algorithms to generate a set of discriminatory features for the classification problem. The proposed method is seen as a marriage between filter and wrapper approaches in which the RST is used to pre-reduce the feature set before optimisation by PSO, a meta-heuristic...
With the increasing volumes of home video footage and the need for effectively managing such archives, home movie summarisation has become an important and key research topic in the recent past. Despite growing interest from the research community, automatic summarisation remains a challenging research problem due to unrestricted capture and lack of storyline present in the home video content. In...
Recent library digitization projects attempt to provide large collections of printed material from varying sources in a searchable format. The scanned documents are typically processed using Optical Character Recognition (OCR), which typically introduces errors in the text. This paper proposes a technique for correction of OCR degraded text that is independent of character-level OCR errors, and hence...
In this paper a new application of fuzzy logic to predict the performance of Titanium Aluminum Nitride (TiAlN) sputtering coating process is presented. Titanium Aluminum Nitride (TiAlN) coated material is widely used as a cutting tool in machining due to its excellent properties such as hardness, roughness and wear. A fuzzy logic model was proposed to predict the coating roughness with respect to...
Intrusion Detection System (IDS) is an important and necessary component in ensuring network security and protecting network resources and infrastructures. In this paper, we effectively introduced intrusion detection system by using Principal Component Analysis (PCA) with Support Vector Machines (SVMs) as an approach to select the optimum feature subset. We verify the effectiveness and the feasibility...
Most existing research in the area of emotions recognition has focused on short segments or utterances of speech. In this paper we propose a machine learning system for classifying the overall sentiment of long conversations as being Positive or Negative. Our system has three main phases, first it divides a call into short segments, second it applies machine learning to recognize the emotion for each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.