Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Background: Many relevancy filters have been proposed to select training data for building cross-project defect prediction (CPDP) models. However, up to now, there is no consensus about which relevancy filter is better for CPDP. Goal: In this paper, we conduct a thorough experiment to compare nine relevancy filters proposed in the recent literature. Method: Based on 33 publicly available data sets,...
By analyzing the disadvantages of the traditional KNN using lazy learning that directly classify the data based on the K neighboring classes using the majority voting method, a new Sigmoid weighted classification algorithm WKS (Weighted KNN Based On Sigmoid) was proposed. WKS provides a new method for learning and training, since each training data di ∊ D contributes to the correct classification...
The enhancement of speech degraded with the non-stationary noise types that typify real-world conditions has remained a challenging problem for several decades. However, recent use of data driven methods for this task has brought great performance improvements. In this paper, we develop a speech enhancement framework based on the extreme learning machine. Experimental results show that the proposed...
This paper presents a novel approach for remaining useful life (RUL) prediction of rotating machinery using hierarchical deep neural networks (DNN). The different health stages are classified by a DNN-based health stage classifier trained by segmented degradation signal. This method builds several RUL predictors based on the health stages of the degradation process. Instead of modeling the entire...
Impressive image captioning results are achieved in domains with plenty of training image and sentence pairs (e.g., MSCOCO). However, transferring to a target domain with significant domain shifts but no paired training data (referred to as cross-domain image captioning) remains largely unexplored. We propose a novel adversarial training procedure to leverage unpaired data in the target domain. Two...
Data amount becomes rapidly increased in today's era. Data can be in form of text, picture, voice, and video. Social media is one factor of the data increase as everybody expresses, gives opinion, and even complains in social media. The first step is data collection used API twitter with each candidate names on Jakarta Governor Election. The collected data then became input for preprocessing step...
Keystroke dynamics, which is a biometric characteristic that depends on typing style of users. In the past thirty years, dozens of classifiers have been proposed for distinguishing people using keystroke dynamics; many have obtained excellent results in evaluation. However, a more common case is that only normal instances are available and none of the rare classes are observed. It leads us to use...
Traditional machine learning approaches are based on the premise that the training and testing samples come from a common probability distribution. Transfer learning refers to situations where this assumption does not necessarily hold. Integrating biological data measured on diverse platforms is a major challenge. Transfer learning is a natural candidate for achieving such integration. In this paper,...
Among dependency parsing algorithms available in MALTParser and MSTParser, the best accuracy for parsing Indonesian language is achieved by Chu-Liu-Edmonds algorithm. This is due to the long distance relation between head and dependent in Indonesian sentences. Most of inaccuracy parsing results is caused by the non-verb sentence root score where there are many cases in Indonesian sentence having a...
Color is one of the attributes that play a role in identifying specific objects, color processing including the extraction of information about the spectral properties of the object's surface and look for the best similarity of a set of descriptions which have been known to do an introduction. Therefore, the classification is needed right fuji apples to obtain good quality fruit. Fuzzy model is one...
With the evolution of large computer data, every corner of the society is filled with a variety of text information. Indeed, large data information that need manage by people has been unable to meet the rapid development of society. Therefore, the technology of efficient management and accurate positioning of vast quantities of text information has become a hot topic in the research community. In...
In machine learning applications, there are scenarios of having no labeled training data, due to the data being rare or too expensive to obtain. In these cases, it is desirable to use readily available labeled data, that is similar to, but not the same as, the domain application of interest. Transfer learning algorithms are used to build high-performance classifiers, when the training data has different...
Palm vein recognition is developing biometric identification technology. It can be used in physical security and information security for selective control of access to a place or resource. A palm vein recognition has been gaining research interest from last few years because it use physiological intrinsic that uniqueness, stability, not easily spoofed and damaged and have live body identification...
Automated recognition of spacecraft and space debris using imaging plays an important role in securing space safety and space exploration. Although deep learning is now the most successful solution for image-based object classification, it requires a myriad number of training data, which are not available for most real applications. In this paper, we investigate different single and hybrid data augmentation...
The competitive perspective implied in online texts reflect people's conflicts in their stances and viewpoints. Competitive perspective identification aims to determine people's inclinations to one of multiple competitive perspectives, which is an important research issue and can facilitate many security-related applications. As the word usage of different perspectives is distinct in various topics,...
Ground Penetrating Radar (GPR) is a remote sensing modality that has been researched extensively for buried threat detection. For this purpose, algorithms can be developed to automatically determine the presence of such threats. To train such algorithms, small 2-dimensional images can be extracted from the larger image, or volume, of GPR data. One thread of research in the buried threat detection...
How to accurately estimate facial age is a difficult problem due to insufficiency of training data. In this paper, an effective approach is proposed to estimate facial age by means of extreme learning machine (ELM). In the proposed method, a set of features is randomly selected from the original features to consist of a feature subspace. Given an initial weight matrix, the training samples within...
Now a day's recognition of satellite image authenticity has received too much attention due to the invention of various remote sensing image inpainting algorithms. Satellite image forgery can be referred as a technique in which fake satellite image is generated by the creation and alternation of new image contents. This paper proposes an algorithm for the identification of inpainted remote sensing...
WiFi-based indoor localization is a complex problem due to high variations of radio frequency (RF) signals in indoor environment. Many popular techniques based on RF fingerprinting require an extensive site survey, which involves time intensive logging of Received Signal Strength (RSS). This paper presents CAIL, a smartphone-based indoor localization system, that utilizes the site survey done by a...
Epithelium-stroma classification is always considered as an important preprocessing step for morphological quantitative analysis in image-based histological researches of oncologic diseases. However, large-scale accurate ground-truth labeling is expensive in histopathological image analysis, thus the classification performances will still be limited with the insufficient labeled training samples....
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.