作者:
Kim, Jon-LarkEor, EunjeeSogang University
Department of Mathematics Korea and Institute for Mathematical and Data Sciences Seoul Korea Republic of Sogang University
Department of Computer Science and Engineering Korea Republic of
In this paper, we introduce a Genetic Algorithm based Upper Confidence Bound (GA-UCB), an innovative hybrid genetic algorithm integrating Multi-Armed Bandit (MAB). It effectively addresses the challenges of solving la...
详细信息
Plants plays a major role in the life of humans. It offers food, medicines, fibers, wood, spices, perfume, oil, and paper. Besides, it minimizes soil erosion and prevents air pollution. Particularly, the piper plant i...
详细信息
For point cloud registration, the purpose of this article is to propose a novel centralized random sample consensus (RANSAC) (C-RANSAC) registration with fast convergence and high accuracy. In our algorithm, the novel...
详细信息
The compressed code of Absolute Moment Block Truncation Coding (AMBTC) consists of quantized values (QVs) and bitmaps. The QVs exhibit greater predictability, and the bitmaps themselves carry more randomness. While ex...
详细信息
A theoretical methodology is suggested for finding the malaria parasites’presence with the help of an intelligent hyper-parameter tuned Deep Learning(DL)based malaria parasite detection and classification(HPTDL-MPDC)...
详细信息
A theoretical methodology is suggested for finding the malaria parasites’presence with the help of an intelligent hyper-parameter tuned Deep Learning(DL)based malaria parasite detection and classification(HPTDL-MPDC)in the smear images of human peripheral *** existing approaches fail to predict the malaria parasitic features and reduce the prediction *** trained model initiated in the proposed system for classifying peripheral blood smear images into the non-parasite or parasite classes using the available online *** Adagrad optimizer is stacked with the suggested pre-trained Deep Neural Network(DNN)with the help of the contrastive divergence method to *** features are extracted from the images in the proposed system to train the DNN for initializing the visible *** smear images show the concatenated feature to be utilized as the feature vector in the proposed ***,hyper-parameters are used to fine-tune DNN to calculate the class labels’*** suggested system outperforms more modern methodologies with an accuracy of 91%,precision of 89%,recall of 93%and F1-score of 91%.The HPTDL-MPDC has the primary application in detecting the parasite of malaria in the smear images of human peripheral blood.
Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utiliza...
详细信息
Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utilization of extensive datasets. Nevertheless, DL models have huge data requirements. Widening the learning capability of such models from limited samples even today remains a challenge, given the intrinsic constraints of small datasets. The trifecta of challenges, encompassing limited labeled datasets, privacy, poor generalization performance, and the costliness of annotations, further compounds the difficulty in achieving robust model performance. Overcoming the challenge of expanding the learning capabilities of Deep Learning models with limited sample sizes remains a pressing concern even today. To address this critical issue, our study conducts a meticulous examination of established methodologies, such as data Augmentation and Transfer Learning, which offer promising solutions to data scarcity dilemmas. data Augmentation, a powerful technique, amplifies the size of small datasets through a diverse array of strategies. These encompass geometric transformations, kernel filter manipulations, neural style transfer amalgamation, random erasing, Generative Adversarial Networks, augmentations in feature space, and adversarial and meta-learning training paradigms. Furthermore, Transfer Learning emerges as a crucial tool, leveraging pre-trained models to facilitate knowledge transfer between models or enabling the retraining of models on analogous datasets. Through our comprehensive investigation, we provide profound insights into how the synergistic application of these two techniques can significantly enhance the performance of classification tasks, effectively magnifying scarce datasets. This augmentation in data availability not only addresses the immediate challenges posed by limited datasets but also unlocks the full potential of working with Big data in
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specime...
详细信息
Higher-order patterns reveal sequential multistep state transitions,which are usually superior to origin-destination analyses that depict only first-order geospatial movement *** methods for higher-order movement mode...
详细信息
Higher-order patterns reveal sequential multistep state transitions,which are usually superior to origin-destination analyses that depict only first-order geospatial movement *** methods for higher-order movement modeling first construct a directed acyclic graph(DAG)of movements and then extract higher-order patterns from the ***,DAG-based methods rely heavily on identifying movement keypoints,which are challenging for sparse movements and fail to consider the temporal variants critical for movements in urban *** overcome these limitations,we propose HoLens,a novel approach for modeling and visualizing higher-order movement patterns in the context of an urban *** mainly makes twofold contributions:First,we designed an auto-adaptive movement aggregation algorithm that self-organizes movements hierarchically by considering spatial proximity,contextual information,and tem-poral ***,we developed an interactive visual analytics interface comprising well-established visualization techniques,including the H-Flow for visualizing the higher-order patterns on the map and the higher-order state sequence chart for representing the higher-order state *** real-world case studies demonstrate that the method can adaptively aggregate data and exhibit the process of exploring higher-order patterns using *** also demonstrate the feasibility,usability,and effectiveness of our approach through expert interviews with three domain experts.
This article introduces a novel approach to bolster the robustness of Deep Neural Network (DNN) models against adversarial attacks named "Targeted Adversarial Resilience Learning (TARL)". The initial ev...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
暂无评论