The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper considers the problem of feature selection in learning using privileged information (LUPI), where some of the features (referred to as privileged ones) are only available for training, while being absent for test data. In the latest implementation of LUPI, these privileged features are approximated using regressions constructed on standard data features, but this approach could lead to polluting...
In the person re-identification across multiple camera research field, attributes of the pedestrian are important cues to differentiate the appearance of each identity. In this work, ten types of attributes are considered as defined in the DukeMTMC-attribute dataset. A custom deep network architecture is proposed to perform the identification process. Furthermore, experiments were carried out to assess...
The class imbalance problem occurs when instances in one class are more than that in another. It has been reported to severely hinder classification performance of many traditional classification algorithms and many researchers have paid a great deal of attention to this field. Different kinds of methods have been pro-posed to solve the problem these years, such as resampling methods, integrated learning...
P300-based brain-computer interface (BCI) is one of the most common BCIs. Due to the characteristics of P300 responses vary from person to person, it leads to the necessity of collecting much labeled data from each user and the problem of time-consuming in many applications. In this work, a transfer learning method which dynamically adjusts the weights of instances is applied to improve the P300-based...
In order to improve the performance of the base classifier in the process of AdaBoost algorithm and simplify the complexity of the whole ensemble learning system, this paper presents a SVM ensemble method based on an improved iteration process of Adaboost algorithm. The improved Adaboost algorithm is added with methods of adding sample selection and feature selection in its iterative process in order...
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System (IDS), it proposes a new hybrid method based on the relationship of feature and spatial correlation for IDS. The proposed IDS reduces the dimension of network data flow by spatial correlation-based dimension reduction method (SCDR). It improves the effectiveness of intrusion...
In analyzing streaming data in which the underlying data distribution may change or the concept of interest may drift over time, the ability of a classifier to adapt to drifted concepts is very important to maintaining the prediction performance. However, the true class labels of data samples are often available only after some period of time or they are obtained by experts' efforts. In this paper,...
Many distinguished methods for vascular network detection in fundus images were proposed to help the diagnosis of clinical diseases. The vascular bifurcation sample in OCT projection images is quite limited while it is sufficient in the corresponding fundus images. In this paper, we proposed a transfer learning-based method to detect the vascular bifurcations in OCT projection images using supervised...
We compare the performance of multilayer perceptrons (MLPs) obtained using back propagation (BP), decision boundary making (DBM) algorithm and extreme learning machine (ELM), and investigate better method for developing aware agents (A-agent) that are suitable for implementation in portable/wearable computing devices (P/WCD). The DBM has been proposed by us for inducing compact and high performance...
Mining advisor-advisee relationships can benefit many interesting applications such as advisor recommendation and protege performance analysis. Based on the hypothesis that, advisor-advisee relationships among researchers are hidden in scholarly big data, we propose in this work a deep learning based advisor-advisee relationship identification method which considers the personal properties and network...
With the rapid growth of the number of micro-blog, a lot of useless information flooded in the users vision, the users find it difficult to choose micro-blog recommendation service according to personal interest, so micro-blog filtering technology is applied to the micro-blog service. The interests of users change with the time, so the traditional batch learning can not be able to satisfy the need...
Anomaly detection (AD) involves detecting abnormality from normality and has a wide spectrum of applications in reality. Kernel-based methods for AD have been proven robust with diverse data distributions and offering good generalization ability. Stochastic gradient descent (SGD) method has recently emerged as a promising framework to devise ultra-fast learning methods. In this paper, we conjoin the...
The potential of active learning (AL) methods for improving the marine oil spills identification system is exploited using 10-year(2004–2013) RADARSAT data. Six basic AL methods are proposed according to the uncertainty criteria and coupled with the support vector machine(SVM) classifier. As many as 56 commonly used features are used for the classification. The AUC measures are estimated using the...
For recent or planned deep astronomical surveys, it is important to tell stars and galaxies apart, a task known as Star/Galaxy Separation Problem (SGSP). At faint magnitudes, the separation between pointy and extended sources is fuzzy, which makes SGSP a hard task. This problem is even harder for large surveys like Dark Energy Survey (DES) and, in a near future, the Large Synoptic Survey Telescope...
In this paper, we present a hierarchical feature learning method called Stacked Tensor Subspace Learning (STSL). It can jointly learn spectral and spatial features of hyperspectral images (HSIs) by iteratively abstracting neighboring regions. STSL is able to learn discriminative spectral-spatial features of the input HSI at different scales. In STSL, the joint spectral and spatial features are extracted...
Software fault prediction (SFP) is useful for helping the software engineer to locate potential faulty modules in software testing more easily, so that it can save a lot of time and budgets to improve the software quality. In this paper, aiming at solving the problem that the faulty samples are too rare to train a classifier, an one-class SFP model is proposed by using only non-faulty samples based...
In order to solve the bottleneck of tedious and time-consuming manual labeling in singing voice detection, in this paper we integrate the active learning mechanism into the conventional SVM-based supervised learning algorithm. By selecting most informative unlabeled samples and asking for human annotation, active learning substantially reduces the number of training samples to be labeled and meanwhile...
In this paper, we propose an Active Learning approach to query by example retrieval, using a retraining procedure that improves the understanding of the machine with respect to the human perception. The proposed method is based on Support Vector Machine (SVM) classifiers and requires a small number of training samples. The classifier is retrained several times in order to determine the optimal separating...
Based on the methods of the traditional topic-based text classification, machine learning method was performed to the coarse-grained sentiment classification of reviews. Sentiment classification involved a lot of problems. In this paper, the sentiment Vector Space Model (s-VSM) was used for text representation to solve data sparseness. In addition, the critical issues of the sentiment classification,...
Automatic security classification is a new researcharea about to emerge. It utilizes machine learning to assisthumans in their manual classification. In this paper, weinvestigate the importance of the training time of the machinelearner. To the best of our knowledge, this has not beenanalyzed in previous works. We compare various machinelearning methods, including SVM, LASSO and the ensemblemethods...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.