Developing of OCR for Indian scripts is an increasing area of research. This research work is an attempt to make an OCR system for Odia characters and numbers which is official language of ODISHA. In this work we prop...
详细信息
Because the LeNet-5 convolutional neural network is not accurate in classifying images with complex texture features, in order to improve the accuracy, this paper proposes a multi-convolution neural network. First, on...
详细信息
We introduce a new deep reinforcement learning architecture - RPR-BP to optimize hyperparameter for any machinelearning model on a given data set. In this method, an agent constructed by a Long Short-Term Memory Netw...
详细信息
ISBN:
(纸本)9781728119854
We introduce a new deep reinforcement learning architecture - RPR-BP to optimize hyperparameter for any machinelearning model on a given data set. In this method, an agent constructed by a Long Short-Term Memory Network aims at maximizing the expected accuracy of a machinelearning model on a validation set. At each iteration, it selects a set of hyperparameters and uses the accuracy of the model on the validation set as the reward signal to update its internal parameters. After multiple iterations, the agent learns how to improve its decisions. However, the computation of the reward requires significant time and leads to low sample efficiency. To speed up training, we employ a neural network to predict the reward. The training process for the agent and the prediction network is divided into three phases: Real-Predictive-Real (RPR). First, the agent and the prediction network are trained by the real experience;then, the agent is trained by the reward generated from the prediction network;finally, the agent is trained again by the real experience. In this way, we can speed up training and make the agent achieve a high accuracy. Besides, to reduce the variance, we propose a Bootstrap Pool (BP) to guide the exploration in the search space. The experiment was carried out by optimizing hyperparameters of two widely used machinelearning models: Random Forest and XGBoost. Experimental results show that the proposed method outperforms random search, Bayesian optimization and Treestructured Parzen Estimator in terms of accuracy, time efficiency and stability.
Image feature extraction and machinelearning methods are used to detect and identify PCB solder joints. The normal/abnormal classification of solder joints are realized. What is more, the maximal class variance metho...
详细信息
MicroRNAs (miRNA) are similar to 22 base pair long RNAs that play important roles in regulating gene expression. Understanding the transcriptional regulation of miRNA is critical to gene regulation. However, it is oft...
详细信息
ISBN:
(纸本)9781728106410
MicroRNAs (miRNA) are similar to 22 base pair long RNAs that play important roles in regulating gene expression. Understanding the transcriptional regulation of miRNA is critical to gene regulation. However, it is often difficult to precisely identify miRNA transcription start sites (TSSs) due to miRNA-specific biogenesis. Existing computational methods cannot effectively predict miRNA TSSs. Here, we employed deep learning architectures incorporating Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN) techniques to detect miRNA TSSs in regions of accessible chromatin. By testing on benchmark experimental data, we demonstrated that deep learning models outperform support vector machine and can accurately distinguish miRNA TSSs from both flanking regions and intergenic regions.
Evaluation of protein-ligand interaction is a crucial step in the process of drug discovery. Recently, several methods based on deep learning have gained impressive binary classification performance on protein-ligand ...
详细信息
ISBN:
(纸本)9781728118673
Evaluation of protein-ligand interaction is a crucial step in the process of drug discovery. Recently, several methods based on deep learning have gained impressive binary classification performance on protein-ligand binding prediction. However, lack of three-dimensional complex data still limits the accuracy and robustness of evaluation of protein-ligand binding affinity, as well as the prediction of their binding sites. In this paper, we propose a novel convolutional neural network based method for estimating the binding affinity between protein and ligand using only 1D sequence data. Even with the same amount of sample size, this model outperforms other structure-dependent traditional and machinelearning based methods in terms of both binary classification and regression task. Furthermore, we use this model to identify the key amino acid residues of protein that are vital for binding interaction, which provides biological interpretation.
data mining together with learning analytics are emerging topics because of the huge amount of educational data coming from learning management systems. This paper presents a case study about students' grade predi...
详细信息
ISBN:
(数字)9783030331108
ISBN:
(纸本)9783030331108;9783030331092
data mining together with learning analytics are emerging topics because of the huge amount of educational data coming from learning management systems. This paper presents a case study about students' grade prediction by using data mining methods. data obtained from Moodle log files are explored to understand the trends and effects of students' activities on Moodle learning management system. Correlations of system activities with the student success are found. data is classified and modeled by using decision tree, Bayesian Network and Support Vector machine algorithms. After training the model with a one-year course activity data, next years' grades are predicted. We found that Decision tree classification gives the best accuracy on the test data for the prediction.
Car pricing using machinelearning has a strong relationship with the process of knowledge acquisition for expert systems. Recently, the primary technique for knowledge acquisition has been the time-consuming process ...
详细信息
ISBN:
(纸本)9781728130033
Car pricing using machinelearning has a strong relationship with the process of knowledge acquisition for expert systems. Recently, the primary technique for knowledge acquisition has been the time-consuming process of recommendation, posting for car buying or selling on internet market websites. After discovering the data, we can divide that into two types: structured and unstructured that require knowledge-based analysis. This paper will involve the techniques for extraction of meaning, data inference, and rules for qualitative data. The main purpose of the current research is to explore different data types of car data and the objective is to create an automated technique to predict car prices.
Prostate cancer is cancer that attacks the prostate gland, usually affecting men over 50 years. Prostate cancer is a disease that develops slowly. Based on this, rapid and precise detection is needed so that the disea...
详细信息
Prostate cancer is cancer that attacks the prostate gland, usually affecting men over 50 years. Prostate cancer is a disease that develops slowly. Based on this, rapid and precise detection is needed so that the disease can be treated immediately. This study focuses on the application Feature Selection using the Random Forest Classifier to detect prostate cancer. The Random Forest Classifier is a method of classifying data by determining the decision tree. The use of more trees will affect the accuracy to be obtained for the better. The Random Forest Classifier can classify data that has incomplete attributes and can be used to handle large sample data. Selection of features is an important process because it can affect the accuracy of classification. This method increases accuracy by about 87%. Thus, the selection of features can improve accuracy in the detection of prostate cancer.
Game theory has found widespread use in various fields like Economics, Biology, Political science, etc. and forms an aegis for logical decision making in these areas. In computer science, due to advancing technologies...
详细信息
Game theory has found widespread use in various fields like Economics, Biology, Political science, etc. and forms an aegis for logical decision making in these areas. In computer science, due to advancing technologies, there has been a pressing need to use game theory in various problems due to the lack of scalability of traditional solutions. There has been ongoing research in various fields of computer science like security, machinelearning, cloud computing, etc. where game theoretic approaches are extensively used. In this paper, we present a review on game theoretical approaches to various fields in computer science such as privacy preservation, network security and intrusion detection and resource optimization In the end, this paper provides a comparative study of various game models used in different applications in a tabular format. (C) 2019 The Authors. Published by Elsevier B.V.
暂无评论