The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the intrusion detection systems analyze all network traffic features to identify intrusions with different classification techniques. Any intrusion detection model developed has to provide maximum accuracy with minimal false alarms. Identifying the optimal feature subset for classification is an important task for improved classification. In this paper, consistency based feature selection...
Physically-based radiative transfer models (RTMs) help in understanding the processes occurring on the Earth's surface and their interactions with vegetation and atmosphere. However, advanced RTMs can take a long computational time, which makes them unfeasible in many real applications. To overcome this problem, it has been proposed to substitute RTMs through so-called emulators. Emulators are statistical...
In hyperspectral image analysis, the classification task has generally been discussed with dimensionality reduction due to high correlation and noise between the spectral features, which might cause significantly low classification performance. In supervised classification, limited training samples in proportion to the number of spectral features have also negative impacts on the classification accuracy,...
Recurrent drift, as a specific type of concept drift, is characterised by the appearance of previously seen concepts. Therefore, in those cases the learning process could be saved or at least minimized by applying an already trained classification model. In this paper we propose Fuzzy-Rec, a framework that is able to deal with recurrent concept drifts by means of a repository of classification models...
Machine-learning test strategy has been developed in the last decade as an alternative to costly specification-driven tests for Analog, Mixed-Signal and RF circuits (AMS-RF). The concept is simple: powerful algorithms are used to map simple measurements onto specifications. But the proper execution requires an information-rich input space. This paper presents an efficient hybrid algorithm to select...
Naïve Bayes is a commonly used algorithm in text categorization because of its easy implementation and low complexity. Naïve Bayes has mainly two event models used for text categorization which are multivariate Bernoulli and multinomial models. A very large number of studies choose multinomial model and Laplace smoothing just based on the assumption that it performs better than multivariate model...
Medical diagnosis is an exciting are of research and many researchers have been working on the application of Artificial Intelligence techniques to develop disease recognition systems. They are analysing currently available information and also biochemical data collecting from clinical laboratories and experts for identifying pathological status of the patient. During the process of diagnosis, the...
In this paper, a novel analytical method based on CADET (covariance analysis description equation technique) is proposed to solve the computing problem of the precision of the three-dimensional shooting engine when evaluating the effectiveness of the three-dimensional virtual shooting system. This method statistical linearizes the nonlinear factors that will affect shooting accuracy, and then get...
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but analysis is often centralized or partly centralized. These systems are not scalable and suffer from the single point of failure, i.e. attackers only need...
Randomized algorithms have good performances for regression and classification problems by using random hidden weights and pseudoinverse computing for the output weights. They have one single hidden layer structure. On the other hand, deep learning techniques have been successfully used for pattern recognition due to their deep structure and effective unsupervised learning. In this paper, the randomized...
This paper addresses the problem of parameter optimization for Markov random field (MRF) models for supervised classification of remote sensing images. MRF model parameters generally impact on classification accuracy, and their automatic optimization is still an open issue especially in the supervised case. The proposed approach combines a mean square error (MSE) formulation with Platt's sequential...
Machine learning classifiers are widely used for text categorization however a classifier misclassifies some of the instances into a category that is relevant to their actual category. The categorization ability of a classifier can be improved by filtering dataset with better classifier and removing such category for misclassified instances. In this paper we proposed a two level approach where level-1...
In the field of spam detection, concentration methods have been proposed for feature construction in recent years, which convert emails into fixed length feature vectors. This paper presents a novel method aiming to break through the limit of feature vector's length. Specifically, the method uses a fixed-length sliding window to divide each email into several sections. The number of sections depends...
Classification is one of the most common machine learning tasks. SVMs have been frequently applied to this task. In general, the values chosen for the hyper-parameters of SVMs affect the performance of their induced predictive models. Several studies use optimization techniques to find a set of hyper-parameter values that induces classifiers with good predictive performance. This paper investigates...
We attack the problem of building classifiers for public faces from web images collected through querying a name. The search results are very noisy even after face detection, with several irrelevant faces corresponding to other people. Moreover, the photographs are taken in the wild with large variety in poses and expressions. We propose a novel method, Face Association through Model Evolution (FAME),...
Sparse Gaussian process (GP) models provide an efficient way to perform regression on large data sets. The key idea is to select a representative subset of the available training data, which induces the sparse GP model approximation. In the past, a variety of selection criteria for GP approximation have been proposed, but they either lack accuracy or suffer from high computational costs. In this paper,...
Feature Selection plays an important role in Intrusion Detection, where a large number of features extracted from whole data needs to be analyzed. Feature relevance is the basic measurement in feature selection techniques. In this paper, different feature selection techniques are analyzed. By using pre-processed data set, various feature selection techniques are compared. The NSL - KDD dataset is...
We use a Field of Experts (FoE) model to segment abdominal regions from MRI affected with Crohns Disease (CD). FoE learns a prior model of diseased and normal bowel, and background non-bowel tissues from manually annotated training images. Unlike current approaches, FoE does not rely on hand designed features but learns the most discriminative features (in the form of filters) for different classes...
In this paper, we are mostly interested in investigating how the study and discovery of the human visual cortex could be utilised to improve the computational models for visual recognition by computer vision. Many of the brain perceptual abilities in vision have corresponding algorithms exist in computer vision, and in this paper we discuss three such models. First we present a model that has the...
This paper studies automated classification of Human Epithelial Type-2 (HEp-2) cell images which is essential in diagnosing the Autoimmune Diseases (AD). The prevalent approach for this problem makes use of the Bag of Words (BoW) model and sparse coding scheme on over complete dictionaries, where the dictionary dimension is usually much larger than feature dimension. In addition, this approach usually...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.