We propose a new outlier generation approach for one-class random forests (OCRF), a recently developed one-class classifier. The proposed method makes use of a positive and unlabeled learning (PUL) algorithm to genera...
详细信息
We propose a new outlier generation approach for one-class random forests (OCRF), a recently developed one-class classifier. The proposed method makes use of a positive and unlabeled learning (PUL) algorithm to generate outliers from the unlabeled samples. The outlier samples generated and the target samples are then used to train an OCRF classifier for one-class classification. The proposed method is evaluated using hyperspectral data, and the results showed that the OCRF with the proposed outlier generation method provides high classification accuracy, outperforming the original OCRF, PUL and OCSVM.
While humans intuitively excel at classifying words according to their connotation, transcribing this innate skill into algorithms remains challenging. We present a human-guided methodology to learn binary word sentim...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
While humans intuitively excel at classifying words according to their connotation, transcribing this innate skill into algorithms remains challenging. We present a human-guided methodology to learn binary word sentiment classifiers from fewer interactions with humans. We introduce a human perception model that relates the perceived sentiment of a word to the distance between the word and the unknown classifier. Our model informs the design of queries that capture more nuanced information than traditional queries solely requesting labels. Together with active learning strategies, our approach reduces human effort without sacrificing learning fidelity. We validate our method through experiments with human data, demonstrating improved accuracy in binary sentiment word classification.
We have previously proposed the use of "muscle sounds" or mechanomyography (MMG) as a reliable alternative measure of muscle activity with the main objective of facilitating the use of more comfortable and f...
详细信息
We have previously proposed the use of "muscle sounds" or mechanomyography (MMG) as a reliable alternative measure of muscle activity with the main objective of facilitating the use of more comfortable and functional soft silicone sockets with below-elbow externally powered prosthesis. This work describes an integrated strategy where data and sensor fusion algorithms are combined to provide MMG-based detection, estimation and classification of muscle activity. The proposed strategy represents the first ever attempt to generate multiple output signals for practical prosthesis control using a MMG multisensor array embedded distally within a silicon soft socket. This multisensor fusion strategy consists of two stages. The first is the detection stage which determines the presence or absence of muscle contractions in the acquired signals. Upon detection of a contraction, the second stage, that of classification, specifies the nature of the contraction and determines the corresponding control output. Tests with real amputees indicate that with the simple detection and classification algorithms proposed, MMG is indeed comparable to and may exceed EMG functionally.
The current paper focuses on the evaluation of the contribution of stereo information to feature-based pattern classification for audio semantic analysis. In radio productions, where multiple speakers' voices and ...
详细信息
The current paper focuses on the evaluation of the contribution of stereo information to feature-based pattern classification for audio semantic analysis. In radio productions, where multiple speakers' voices and music coexist, it is quite important to detect voice and music patterns, in order to achieve efficient classification of the audio content. Recent research confirmed that the process of audio feature extraction and selection is critical for the overall system performance. In the current work, the feature extraction procedure is applied in each audio channel of stereo radio programmes separately in order to exploit the differences of audio information between channels. Feature ranking algorithms are employed, aiming to investigate the saliency of the feature differences. The classification performance of the implemented artificial neural systems revealed that the stereo differences have to be taken into consideration during audio semantic analysis.
Feature selection is a strategy that aims at making text classifiers more efficient and accurate. In this paper, we proposed a novel feature selection method based on Tibetan grammar for Tibetan classification. Tibeta...
详细信息
ISBN:
(纸本)9781479983544
Feature selection is a strategy that aims at making text classifiers more efficient and accurate. In this paper, we proposed a novel feature selection method based on Tibetan grammar for Tibetan classification. Tibetan language express grammatical meaning through the function words and word order, and the function word has large proportions. By analyzing the Tibetan grammar and distribution of part of speech, we proposed feature selection method based on Tibetan notional words. The method analyzed the part of speech of Tibetan text, and then used notional words as text features combined with IG method to realize feature selection. The experimental result shows that this method has improved significantly on classification efficiency and accuracy which compared with the traditional feature selection methods.
It is challenging to obtain good results for hand movements classification. Previous studies expended efforts on filters for sEMG data, feature extraction and classifier algorithms to achieve the best results. This pa...
详细信息
It is challenging to obtain good results for hand movements classification. Previous studies expended efforts on filters for sEMG data, feature extraction and classifier algorithms to achieve the best results. This paper proposes the insertion of a step in the classification process that selects which features to use in training aiming to increase accuracy and performance. Feature selection was previously used in other classification tasks but is new in wrist/fingers movements classification. Obtained results were positives as the performance gain is huge (39 to 53 features out of 144 are used for classification) and accuracy reach promising values (above 90% for some subjects).
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data c...
详细信息
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree algorithms by highlighting a advantage and disadvantages of each of the techniques.
Shape analysis has been a long standing problem in the literature. In this paper, we address the shape classification problem and make the following contributions: (1) We combine both contour and skeleton (also local ...
详细信息
Shape analysis has been a long standing problem in the literature. In this paper, we address the shape classification problem and make the following contributions: (1) We combine both contour and skeleton (also local and global) information for shape analysis, and we derive an effective classifier. (2) We collect a challenging shape database in which there are 20 categories of animals, with each having 100 shapes. All these shapes are obtained from real images with a large variation in pose, viewing angle, articulation, and self-occlusion. (3) We emphasize the importance of having good representation for shape classification to address the unique characteristics of shape. A thorough experimental study is conducted showing significant improvement by the proposed algorithm over many of the state-of-the-art shape matching and classification algorithms, on both our dataset and the well-known MPEG-7 dataset. In addition, we applied our algorithm for recognizing and classifying objects from natural images and obtained very encouraging results.
In recent years, multiple Graph Neural Network models have been proposed and applied to processing graph data and classification of graphs. However, when the graph data is limited, the model classification results are...
详细信息
ISBN:
(纸本)9781665402736
In recent years, multiple Graph Neural Network models have been proposed and applied to processing graph data and classification of graphs. However, when the graph data is limited, the model classification results are not satisfactory. In this paper, we propose a Graph Neural Network based model, which calculates the graph distance and Wasserstein's center of gravity on the base class tag, uses the K-Means method and Lloyd's algorithm, and gets the superclass by aggregation, which is called graph neural graph attention model (GNN-GAT). GIN is used as the feature extractor, and GNN network is used for classification. Secondly, we used MusicNtWrk to make two sets of graph datasets representing music mono-chord, downloaded the Triangles and Letter_high datasets, and imported these four kinds of datasets into the model for classification test and analysis.
From the fifth-generation mobile communication systems (5G), the architecture of the Internet of Things (IoT) has grown enormously with more promising technologies and connections. However, edge realm components such ...
详细信息
ISBN:
(数字)9798331529949
ISBN:
(纸本)9798331529956
From the fifth-generation mobile communication systems (5G), the architecture of the Internet of Things (IoT) has grown enormously with more promising technologies and connections. However, edge realm components such as sensors and nodes still present a crucial security flaw related to radio frequency attacks. By restricting and stopping information from reaching the proper destination on the IoT's perception layer, jamming - a particular form of a Denial of Service (DoS) attack compromises the availability feature of IoT nodes. Finding and identifying these jammer attacks has been tricky because access to the network from nodes is also broken. To detect and categorize two kinds of jamming in the existing dataset, we propose to utilize three different Shallow Machine Learning (SML) architectures in this paper, including Decision Tree (DT), Support Vector Machine (SVM), and Gradient Boosting Machine (GBM), with the aims of fewer parameter usage, a low power-oriented architecture, and the capacity to handle real-time computer vision tasks. The experimental outcomes depict that SML is a promising approach since it can reach the best detection and classification accuracies (97% and 98.03%, respectively).
暂无评论