Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It is a simple task for humans to visually identify objects. However, computer-based image recognition remains challenging. In this paper we describe an approach for image recognition with specific focus on automated recognition of plants and flowers. The approach taken utilizes deep learning capabilities and unlike other approaches that focus on static images for feature classification, we utilize...
The method of approximating a discriminant functions of the training set is proposed. The sign of the discriminant functions allows us to classify the point in one or another class. The approximation is constructed with greater precision in the neighborhood of zero values of the discriminant function. To estimate a posterior probability of a class of a point two methods are proposed: based on a series...
Target discrimination in wireless sensor networks remains challenging when sensors have structured electronic noise and deployment settings have variable in-situ clutter. Datadriven learning of discrimination functions is especially hard when deployment sites are remote or hazardous, necessitating reliance on surrogate environments for data collection. The challenge is exacerbated if sensors are resource...
Sign language is important since it permits insight into the deaf culture and allows more opportunities to communicate with those who are deaf or hard of hearing. In this paper, we show that Wi-Fi signals can be used to recognize sign language with sparsely labeled training dataset. The key intuition is that sign language introduces different multi-path distortions in Wi-Fi signals and generates different...
Gram staining is a traditional bacteriological laboratory technique, which has widely usage on many medical research and application. However, gram staining reading is a time consumption work. In this paper, we employ Convolutional Neural Network method to design a classifier, by which gram staining images can be identified as normal group and disease model group effectively and correctly. And image...
We propose a gray coding method for deep neural network (DNN) based decoder. With multiple resources considered together, DNN can be used to decode corrupted signals. In deep learning training, stochastic gradient descent (SGD) algorithm is used, which means that the cost function must be differentiable. Then, allocating the discrete bits for each symbol is difficult. To solve this problem, the basic...
In this paper we consider centralized cooperative spectrum sensing (SS) techniques for cognitive radio networks using energy detector scheme. In light of the requirements imposed by centralized SS methods such as Maximum Ratio Combining (MRC), namely the estimation and transmission of the signal-to-noise ratio (SNR) on each secondary user, as well as the transmission of the exact energy level to the...
A large portion of data mining and analytic services use modern machine learning techniques, such as deep learning. The state-of-the-art results by deep learning come at the price of an intensive use of computing resources. The leading frameworks (e.g., TensorFlow) are executed on GPUs or on high-end servers in datacenters. On the other end, there is a proliferation of personal devices with possibly...
This paper presents a novel approach to launch and defend against the causative and evasion attacks on machine learning classifiers. As the preliminary step, the adversary starts with an exploratory attack based on deep learning (DL) and builds a functionally equivalent classifier by polling the online target classifier with input data and observing the returned labels. Using this inferred classifier,...
Previous work on machine learning for intrusion detection in mobile tactical networks using the extremely lightweight intrusion detection (ELIDe) system has shown that ELIDe can approximate signature-based intrusion detection using significantly less resources and power than the traditional intrusion detection system without significantly degrading accuracy. ELIDe also performs binary classification...
SVM (Support Vector Machine), a state of the art classifier model is implemented on a computational mobile platform and its performances are evaluated against a low complexity classifier such as SFSVC (Super Fast Vector Support Classifier) on the same platform. For a better comparison, similar implementation for the two architectures are considered, such as using the same basic linear algebra library...
With the ability to reconstruct signals from a highly incomplete number of samples, Compressive Sensing (CS) has been proposed in bandwidth-constrained scenarios like remote sensing, where signals exist some degree of redundancy. In CS, reconstruction approaches are of great importance. However, current reconstruction approaches are of highly computational complexity because they use greedy or convex...
New and unseen network attacks pose a great threat to the signature-based detection systems. Consequently, machine learning-based approaches are designed to detect attacks, which rely on features extracted from network data. The problem is caused by different distribution of features in the training and testing datasets, which affects the performance of the learned models. Moreover, generating labeled...
Anomaly detection is the process of identifying unusual signals in a set of observations. This is a vital task in a variety of fields including cybersecurity and the battlefield. In many scenarios, observations are gathered from a set of distributed mobile or small form factor devices. Traditionally, the observations are sent to centralized servers where large-scale systems perform analytics on the...
In order to solve the problem of lacking shear wave velocity information in oil and gas field, based on conventional logging data, a support vector machine(SVM) model is used to map the relationship between shear wave velocity and natural gamma, acoustic time difference and resistivity of shale, and then a machine learning method for shear wave velocity prediction is proposed. The model was trained...
Word-sense disambiguation is one of the key concepts in natural language processing. The main goal of a language is to present a specific concept to the audience. This concept is extracted from the meaning of words in that language. System should be able to identify role and meaning of words in order to identify the concepts in texts properly. This issue becomes more problematic if there are words...
With millions of people suffering from dementia worldwide, the global prevalence of dementia has a significant impact on the patients' lives, their caregivers' physical and emotional states, and the global economy. Early diagnosis of dementia helps in finding suitable therapies that reduce or even prevent further deterioration of patients' cognitive abilities. MRI scans are shown to be the most effective...
Collaborative filtering is a well-known technique used for designing recommender systems when advertising services and products offered to the Internet users. In this paper, we employ the Restricted Boltzmann Machine (RBM) for collaborative filtering and propose the neighborhood-conditional RBM (N-CRBM) model based on joint distributions of similarity and popularity scores. The model is trained and...
Partial observation can be avoided by extracting both modality specific features and common features from multimodal data. This paper proposes a framework of parameter shared multimodal deep autoencoders which uses complemental multimodal data in order to learn both modality specific and common features. The proposed model shares parameters of networks for each modality, while conventional multimodal...
Action recognition is still a challenging problem. In order to catch effective compact representation of the action sequences, the discriminative dictionaries could be learned by sparse coding. But sparse coding is needed in both the training and testing phases of the classifier framework. And it is also time consuming for the adoption of 1-norm sparsity constraint on the representation coefficients...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.