The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article introduces a novel hardware friendly multi-layer Winner-Take-All (WTA) architecture using neurons with nonlinear dendrites and binary synapses. The network is trained by an unsupervised spike based learning rule that modifies the network connections. Inspired by the multi-layer models of human visual cortex, the proposed architecture contains multiple layers of neurons. We show that if...
Light detection and ranging (LIDAR) is a technology of remote imaging technologies. Currently, it is the most important technology for accruing elevation points with a high density in the form of digital elevation model (DEM) construction. However, the high-density data leads to time and memory consumption problems during data processing. In this paper, we depend on radial basis function (RBF) with...
This paper studies on the Day-of-the-week effect by means of several binary classification algorithms in order to achieve the most effective and efficient decision trading support system. This approach utilizes the intelligent data-driven model to predict the influence of calendar anomalies and develop profitable investment strategy. Advanced technology, such as time-series feature extraction, machine...
Serious games are becoming an increasingly used alternative in technical/professional/academic fields. However, scenario development poses a challenging problem since it is an expensive task, only devoted to computer specialists (game developers, programmers…). The ultimate goal of our work is to propose a new scenario-building approach capable of ensuring a high degree of deployment and reusability...
We consider learning problems over training sets in which both, the number of training examples and the dimension of the feature vectors, are large. To solve these problems we propose the random parallel stochastic algorithm (RAPSA). We call the algorithm random parallel because it utilizes multiple processors to operate in a randomly chosen subset of blocks of the feature vector. We call the algorithm...
A novel method of calculating line loss in transformer district is presented and realized by programming, which is Back Propagation (BP) network model based on Levenberg-Marquardt (LM) algorithm. Establish the characteristic index system according to electric characteristics parameters of samples. The classification of samples by K-Means clustering algorithm solves the numerical dispersion of line...
This work aims to investigate the effect of implementing co-testing in non-intrusive load monitoring. Wavelet design is used to extract features from the switching transients of loads. The features extracted are evaluated on a real test bed using one-against-the-rest and co-testing approaches. The results showing the effectiveness of both approaches in accurately classifying the loads are presented...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
In order to make up the drawback of traditional skill assessment that is too subjective, the eye tracking has already been applied to various fields. Based on research on eye movement of flying skills, it is found that the average fixation time and eye moving trace of professional pilot varies from that of novice. It is still unclear the changes in eye movement data during key actions after improvement...
In this two-hour workshop, we propose leading a discussion of an important, yet underinvestigated, facet of entrepreneurial communication: pitching. Specifically, we will discuss formal pitching, storytelling, and written elements of the pitch. We will do this by drawing on our own research, other published research, rhetorical theory, management theory, and our experience. Audience members will learn...
A method for simulation of classic substitution ciphers for the purpose of their study in the learning process is considered. The method is based on the decomposition of the alphabets of the plain and encrypted texts. Implementation of the method has a two-level structure: the basic components are implemented using software, variation is part of the settlement. This allows user to simulate a wide...
We consider the quality of education from two points of view in Azerbaijan. The first point of view is based on the international program for student assessment — PISA, and the second one on the scientific and statistical materials of the State Student Admission Commission of the Republic of Azerbaijan. The distribution law of the applicants to universities at the entrance exams was investigated....
Intrusion detection systems are one of the most relevant security features against network attacks. Machine learning methods are used to analyze network traffic parameters for the presence of an attack signs. In this paper, extreme learning machine method is considered for intrusion detection in network traffic. The experimental results lead to the conclusion of practical significance of the proposed...
Circular Extreme learning machine (C-ELM) is the one extended Extreme Learning Machine (ELM). It has the same structure as ELM and Circular Back Propagation (CBP) to make it can mapping both linear and circular decision boundaries. The activation function is the one main point to define the decided boundaries. Many activation functions have been proposed. This paper proposes q-Gaussian activation...
A new temporal sampling method for human action recognition using depth maps is proposed. The depth map frames are projected onto three orthogonal Cartesian planes respectively and the absolute difference between two successive projected ones is stacked to form the motion energy. Three sub-action frame sequences are selected accordingly, which constructs Adaptive Temporal Sampling (ATS) descriptor,...
This study uses remote sensing technology that can provide information about the condition of the earth's surface area, fast, and spatially. The study area was in Karawang District, lying in the Northern part of West Java-Indonesia. We address a paddy growth stages classification using LANDSAT 8 image data obtained from multi-sensor remote sensing image taken in October 2015 to August 2016. This study...
Breast cancer has become the highest incidence of malignant tumors to global women. The breast cancer risk classification model can help reduce the incidence rate of breast cancer. For the large population of Chinese women, it is important to build an apt classification model and only the respondents in the high risk group will accept further diagnosis to filter out the breast cancer patients to lower...
Citation networks are widely used in graph mining. Link prediction which is the task of mining the missing links in networks or predicting the next node pair to be connected by a link is a useful tool for mining information in citation networks. Most existing studies of link prediction commonly use degree rather than more advanced methods to measure the importance of a node. However, in reality, the...
In process of learning Chinese as a second language (CSL), Japanese natives have difficulties in tone perception. Among the four Chinese lexical tones, the tone pairs Tone 1-Tone 2 and Tone 1-Tone 4 are problematic for Japanese CSL beginners. In order to help them develop efficiently discriminating capability of the tone pairs, we designed a hybrid perceptual training scheme which combined adaptive...
In this paper, we propose a dictionary update method for Non-negative Matrix Factorization (NMF) with high dimensional data in a spectral conversion (SC) task. Voice conversion has been widely studied due to its potential applications such as personalized speech synthesis and speech enhancement. Exemplar-based NMF (ENMF) emerges as an effective and probably the simplest choice among all techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.