In order to better analyze the damage characteristics of fiber materials under radiation environment, combined with datamining algorithm to calculate the degree of damage of material structure damage. Combine with ma...
详细信息
ISBN:
(纸本)9783030364021;9783030364014
In order to better analyze the damage characteristics of fiber materials under radiation environment, combined with datamining algorithm to calculate the degree of damage of material structure damage. Combine with machinelearning method to analyze the calculation results, obtain the damage range of fiber material structure, standardize material damage characteristics and Grade, accurately determine the damage of material structure, and finally improve the radiation damage characteristics of fiber materials. Experiments show that the research on radiation damage characteristics of fiber materials based on datamining and machinelearning is accurate and reasonable.
The brain is one of the most important parts of the human body, and the diagnosis of its diseases is of great significance to the treatment of diseases. With the rapid development of deep learning in recent years, its...
详细信息
ISBN:
(纸本)9781665417907
The brain is one of the most important parts of the human body, and the diagnosis of its diseases is of great significance to the treatment of diseases. With the rapid development of deep learning in recent years, its automatically extracted image features have significant advantages compared to traditional artificially extracted features. Therefore, more and more recognition methods based on deep learning are widely used in medical image recognition tasks (such as CT, MRI, PET-CT.). This paper will introduce the application of traditional methods and deep learning methods in various brain diseases. These methods are compared, analyzed, and summarized, then we explored their development status and future development trends.
In power user information collection and detection, power companies generally have a variety of different detection needs, or need to solve the problem while having additional requirements for certain aspects. Therefo...
详细信息
In power user information collection and detection, power companies generally have a variety of different detection needs, or need to solve the problem while having additional requirements for certain aspects. Therefore, the SVM classification technology is used in the paper to carry out more detailed patternrecognition of power consumption characteristics for small-scale users or users with major suspicions. Moreover, given the imbalance of the abnormal electricity detection data set, a comprehensive processing model of unbalanced samples is constructed. Meanwhile, the differential evolution algorithm is applied to complete the SVM parameter optimization, which not only solves the problem that the SVM classification performance is significantly affected by the parameters, but also ensures the operating efficiency of the integrated classification model.
Most of the traditional GNSS interference detection algorithms have disadvantages such as low detection accuracy and complicated algorithms when detecting interference signals. In this regard, a GNSS interference sign...
详细信息
With the advent of the era of big data, the application of artificial intelligence and big data technology has led to widespread interest in facial expression recognition. In addition to the common macro-expressions i...
详细信息
ISBN:
(纸本)9781665417907
With the advent of the era of big data, the application of artificial intelligence and big data technology has led to widespread interest in facial expression recognition. In addition to the common macro-expressions in daily life, facial expressions also have an imperceptible subtle expression called micro-expressions. Micro-expression is a very fast expression, lasting only 1/25 seconds to 1/5 seconds, expressing the real emotions that people try to suppress and hide. Micro-expressions have important applications in public safety, judicial criminal investigation, clinical medicine, etc. Therefore, the research on micro-expression recognition has been increasing in recent years. In the year of 2006, Hinton's proposal of deep learning in an article in "Science" made it appear in front of the world as a new field of machinelearning, which set off a wave of deep learning. Deep learning is currently one of the hottest research directions in artificial intelligence and machinelearning, and it is widely used in speech recognition, natural language processing, image recognition and other fields. Because of the characteristics of micro-expressions such as short time and subtle changes, traditional machinelearning algorithms have poor robustness. Therefore, this paper summarizes the research on microexpression recognition based on deep learning methods, mainly including some mainstream algorithms such as DBN, CNN, and discusses the development problems and trends of deep learning on micro-expression recognition, hoping to provide reference for the subsequent research in this field.
datamining algorithms tacitly quite access to the data either at centralized or distributed form. Distributed data becomes a big challenge and cannot handle by a classical analytic tool. Cloud Computing can solve the...
详细信息
ISBN:
(纸本)9781509036967
datamining algorithms tacitly quite access to the data either at centralized or distributed form. Distributed data becomes a big challenge and cannot handle by a classical analytic tool. Cloud Computing can solve the issues of processing, storing, and analyzing the data at distributing locations within the cloud. However, a significant problem that is preventing free sharing of data is privacy and security issues, therefore obstructing datamining schemes. Lately, there is increasingly hard to find a solution to these problems. Due to the existing knowledge in a more distributed data and better for datamining issues. An important task of datamining and machinelearning is classification, a widely used in classification is support vector machine (SVM) algorithms applicable in many various domains. In this paper, we proposes a privacy-preserving solution for SVM classification. Our workaround constructing a global SVM classification model from vertically partitioned distributed data at multi-parties based on Gram matrix, without revealing a party's data. We proposed an efficient and preserve privacy protocol for SVM classification on vertical partitioned data. Our experimental results, the accuracy of distributed SVM using Gram matrix up to 90% and the privacy not compromised.
Human safety has become one of the most targeted field for the researchers, owning it to its grave importance and the increased competition in the market for human safety gadgets. Hundreds and thousands of human safet...
详细信息
ISBN:
(纸本)9781538642733
Human safety has become one of the most targeted field for the researchers, owning it to its grave importance and the increased competition in the market for human safety gadgets. Hundreds and thousands of human safety devices (HSD) are being developed because of the rapid advancement in the field of Internet of things (IoT) that involve sensing technologies, embedded systems, wireless communication technologies, variety of sensors etc. An essential function of these devices is human activity recognition (HAR).Present human safety devices continuously track human activities with the help of sensors and track down any unusual activity by performing sensor data analysis (SDA)using machinelearning (ML) algorithms. This paper aims at reviewing the latest reported systems for human safety and listing down the various sensors that can be used in human safety devices to detect unusual activities along with the machinelearning algorithms that are used for the sensor data analysis.
The article considers the task of classifying fractal time series based on the construction of their recurrence plots. Short realizations of EEG signals were used as input data. Two classification machinelearning met...
详细信息
In this paper, we compare 4 learning projection models between sensor domain and text domain for Zero-shot learning (ZSL). In traditional activity recognition with sensor data, the task of collecting training dataset ...
详细信息
ISBN:
(纸本)9781728107882
In this paper, we compare 4 learning projection models between sensor domain and text domain for Zero-shot learning (ZSL). In traditional activity recognition with sensor data, the task of collecting training dataset is too tough and costly to apply for social. Our challenge is making the task efficient. The Zero-shot learning's purpose is to recognize the unknown activity which is activity class out of training dataset. In our previous research, we propose the Zero-shot learning method using the word vectors made from Wikipedia corpus for recognizing the human living activities like breakfast, watching TV, etc. We found that this method success to recognize unknown activities and need to improve the projection function for performance. In this paper, we construct 4 learning models for projection and evaluate them with accelerometer sensor data annotated simple activities. As a result, we realize that (1) the learning method with twice projection is useful for performance. (2) It is difficult to identify the two unknown activities whose distance from known activities is closer than that between other combination of two unknown activities and the known ones.
Bank is a type of business that deals with saving, circulation of money, deposits and others. The number of services provided by banks is very diverse, this depends on the capabilities of each bank. The more capable a...
详细信息
ISBN:
(纸本)9781665425803
Bank is a type of business that deals with saving, circulation of money, deposits and others. The number of services provided by banks is very diverse, this depends on the capabilities of each bank. The more capable and better the bank is, the more services it will offer. Introducing the product directly has been commonly used for various industries, one of them is the banking industry. In directly introducing products, banks can conduct market analysis by utilizing the information technology space that can assist in making decisions. By analyzing bank marketing data, it can be used to select the type of marketing to do. Marketing campaigns can be carried out via email, telephone, and direct email to prospective customers that allow potential customers to decide whether to take the product offered or not. With increasing time, the amount of incoming data continues to grow. With this increasing data, one of the bank institutions found it difficult to predict whether their clients would subscribe to a term deposit or not. Therefore, in this paper, the datamining process will be carried out using classification (Decision Tree, Wye Bayes, and Random Forest) and clustering (K-Means, K-Medoids, and DBSCAN) methods to predict if the client will subscribe a term deposit.
暂无评论