The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Bipolar disorder (BD) and major depressive disorder (MDD) both share depressive symptoms, so how to discriminate them in early depressive episodes is a major clinical challenge. Independent components (ICs) extracted from fMRI data have been proved to carry distinguishing information and can be used for classification. Here we extend a previous method that makes use of multiple fMRI ICs to build linear...
The importance of face anti-spoofing algorithms in biometric authentication systems is becoming indispensable. Recently, the success of Convolution Neural Networks (CNN) in key application areas of computer vision has encouraged its use in face biometrics for face anti-spoofing and verification applications. However, small training data has restricted the use of deep CNN architectures for face anti-spoofing...
Identity recognition encounters with several problems especially in feature extraction and pattern classification. Electrocardiogram (ECG) is a quasi-periodic signal which has highly discriminative characteristics in a population for subject recognition. The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered...
Keystroke dynamics, which is a biometric characteristic that depends on typing style of users. In the past thirty years, dozens of classifiers have been proposed for distinguishing people using keystroke dynamics; many have obtained excellent results in evaluation. However, a more common case is that only normal instances are available and none of the rare classes are observed. It leads us to use...
Huge amount of data in today's world are stored in the form of electronic documents. Text mining is the process of extracting the information out of those textual documents. Text classification is the process of classifying text documents into fixed number of predefined classes. The application of text classification includes spam filtering, email routing, sentiment analysis, language identification...
In recent years, it was a difficult task to classify a huge set of data due to the increasing population in urban places. As of now, satellite hyperspectral image provides information but this is not sufficient to classify data in urban areas. To develop the urban areas, accurate and timely information is necessary for the government. Hence, airborne hyperspectral data provides sufficient information...
The notion of style is pivotal to literature. The choice of a certain writing style moulds and enhances the overall character of a book. Stylometry uses statistical methods to analyze literary style. This work aims to build a recommendation system based on the similarity in stylometric cues of various authors. The problem at hand is in close proximity to the author attribution problem. It follows...
Classification of different tumor type are of great significance in problems cancer prediction. Choosing the most relevant qualities from huge microarray expression is very important. It is a most explored subject in bioinformatics because of its hugeness to move forward humans understanding of inherent causing cancer mechanism. In this paper, we aim to classify leukaemia cells. Our approach relies...
For better resolving the safety risk early warning of the apron effectively, the attribute reduction algorithm based on Rough Set is used to simplify the set as the warning index set of the apron is too large. The improved Particle Swarm Optimization (PSO) algorithm is used to optimize the parameters of Support Vector Machine. Combined with the Rough Set and SVM which is optimized by the improved...
Support Vector Machine (SVM) is a linear binary classifier that requires a kernel function to handle non-linear problems. Most previous SVM implementations for embedded systems in literature were built targeting a certain application; where analyses were done through comparison with software implementations only. The impact of different application datasets towards SVM hardware performance were not...
In this paper, we use machine learning for profiling authors of online textual media. We are interested in determining the gender and age of an author. We use two different approaches, one where the features are learned from raw data and one where features are manually extracted.We are interested in understanding how well author profiling works in the wild and therefore we have tested our models on...
Traditional machine learning approaches are based on the premise that the training and testing samples come from a common probability distribution. Transfer learning refers to situations where this assumption does not necessarily hold. Integrating biological data measured on diverse platforms is a major challenge. Transfer learning is a natural candidate for achieving such integration. In this paper,...
The application of various statistical machine learning methods for the identification of bi-heterocyclic drugs that are based on the THz spectra is presented. A comparison of classification efficiency with six algorithms (LDA, QDA, SVM, Naive Bayes, KNN with Euclidean metrics and the cosine similarity) is shown and a complete THz system allowing for the identification of drugs with an efficiency...
Attention deficit hyperactivity disorder creates conditions for the child as s/he cannot sit calm and still, control his/her behavior and focus his/her attention on a particular issue. Five out of every hundred children are affected by the disease. Boys are three times more than girls at risk for this complication. The disorder often begins before age seven, and parents may not realize their children...
This paper describes a new approach to building the query based relevance sets (qrels) or relevance judgments for a test collection automatically without using any human intervention. The methods we describe use supervised machine learning algorithms, namely the Naïve Bayes classifier and the Support Vector Machine (SVM). We achieve better Kendall's tau and Spearman correlation results between the...
A range of algorithms was used to classify online retail customers of a UK company using historical transaction data. The predictive capabilities of the classifiers were assessed using linear regression, Lasso and regression trees. Unlike most related studies, classifications were based upon specific and marketing focused customer behaviours. Prediction accuracy on untrained customers was generally...
Sirens and alarms play an important role in everyday life since they warn people of hazardous situations, even when these are out of sight. Automatic detection of this class of sounds can help hearing impaired or distracted people, e.g., on the road, and contribute to their independence and safety. In this paper, we present a technique for the detection of alarm sounds in noisy environments. The technique...
In this paper, a method for reducing coding artifacts introduced by lossy image compression is proposed. The method is similar to sample adaptive offset (SAO) which is adopted in the H.265/HEVC video coding standard as one of in-loop filtering tools. In the SAO, samples of the reconstructed image are classified into several categories based on some simple algorithms, and an optimum offset value is...
Context: Software Bug Severity Classification can help to improve the software bug triaging process. However, severity levels present a high-level of data imbalance that needs to be taken into account. Aim: We investigate cost-sensitive strategies in multi-class bug severity classification to counteract data imbalance. Method: We transform datasets from three severity classification papers to a common...
Recognizing secondary structures in proteins can be a highly computationally expensive task that may not always yield good results. Using Restricted Boltzmann Machines (RBM) we were able to train a simple neural network to recognize an alpha-helix with a good degree of accuracy. Modifying the RBM implementation to be much simpler and more efficient than the standard implementation we are able to see...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.