870 resultados para Associative Classifiers
Resumo:
In this paper a multiple classifier machine learning methodology for Predictive Maintenance (PdM) is presented. PdM is a prominent strategy for dealing with maintenance issues given the increasing need to minimize downtime and associated costs. One of the challenges with PdM is generating so called ’health factors’ or quantitative indicators of the status of a system associated with a given maintenance issue, and determining their relationship to operating costs and failure risk. The proposed PdM methodology allows dynamical decision rules to be adopted for maintenance management and can be used with high-dimensional and censored data problems. This is achieved by training multiple classification modules with different prediction horizons to provide different performance trade-offs in terms of frequency of unexpected breaks and unexploited lifetime and then employing this information in an operating cost based maintenance decision system to minimise expected costs. The effectiveness of the methodology is demonstrated using a simulated example and a benchmark semiconductor manufacturing maintenance problem.
Resumo:
Many types of non-invasive brain stimulation alter corticospinal excitability (CSE). Paired associative stimulation (PAS) has attracted particular attention as its effects ostensibly adhere to Hebbian principles of neural plasticity. In prototypical form, a single electrical stimulus is directed to a peripheral nerve in close temporal contiguity with transcranial magnetic stimulation delivered to the contralateral primary motor cortex (M1). Repeated pairing of the two discrete stimulus events (i.e. association) over an extended period either increases or decreases the excitability of corticospinal projections from M1, contingent on the interstimulus interval. We studied a novel form of associative stimulation, consisting of brief trains of peripheral afferent stimulation paired with short bursts of high frequency (≥80 Hz) transcranial alternating current stimulation (tACS) over contralateral M1. Elevations in the excitability of corticospinal projections to the forearm were observed for a range of tACS frequency (80, 140 and 250 Hz), current (1, 2 and 3 mA) and duration (500 and 1000 ms) parameters. The effects were at least as reliable as those brought about by PAS or transcranial direct current stimulation. When paired with tACS, muscle tendon vibration also induced elevations of CSE. No such changes were brought about by the tACS or peripheral afferent stimulation alone. In demonstrating that associative effects are expressed when the timing of the peripheral and cortical events is not precisely circumscribed, these findings suggest that multiple cellular pathways may contribute to a long term potentiation-type response. Their relative contributions will differ depending on the nature of the induction protocol that is used.
Resumo:
Paired Associative Stimulation (PAS) has come to prominence as a potential therapeutic intervention for the treatment of brain injury/disease, and as an experimental method with which to investigate Hebbian principles of neural plasticity in humans. Prototypically, a single electrical stimulus is directed to a peripheral nerve in advance of transcranial magnetic stimulation (TMS) delivered to the contralateral primary motor cortex (M1). Repeated pairing of the stimuli (i.e., association) over an extended period may increase or decrease the excitability of corticospinal projections from M1, in manner that depends on the interstimulus interval (ISI). It has been suggested that these effects represent a form of associative long-term potentiation (LTP) and depression (LTD) that bears resemblance to spike-timing dependent plasticity (STDP) as it has been elaborated in animal models. With a large body of empirical evidence having emerged since the cardinal features of PAS were first described, and in light of the variations from the original protocols that have been implemented, it is opportune to consider whether the phenomenology of PAS remains consistent with the characteristic features that were initially disclosed. This assessment necessarily has bearing upon interpretation of the effects of PAS in relation to the specific cellular pathways that are putatively engaged, including those that adhere to the rules of STDP. The balance of evidence suggests that the mechanisms that contribute to the LTP- and LTD-type responses to PAS differ depending on the precise nature of the induction protocol that is used. In addition to emphasizing the requirement for additional explanatory models, in the present analysis we highlight the key features of the PAS phenomenology that require interpretation.
Resumo:
The introduction of predictive molecular markers has radically enhanced the identification of which patients may benefit from a given treatment. Despite recent controversies, KRAS mutation is currently the most recognized molecular predictive marker in colorectal cancer (CRC), predicting efficacy of anti-epidermal growth factor receptor (anti-EGFR) antibodies. However, other relevant markers have been reported and claimed to identify patients that will benefit from anti-EGFR therapies. This group of markers includes BRAF mutations, PI3KCA mutations, and loss of PTEN expression. Similarly, molecular markers for cytotoxic agents' efficacy also may predict outcome in patients with CRC. This review aims to summarize the most important predictive molecular classifiers in patients with CRC and further discuss any inconsistent or conflicting findings for these molecular classifiers.
Resumo:
In this study, we introduce an original distance definition for graphs, called the Markov-inverse-F measure (MiF). This measure enables the integration of classical graph theory indices with new knowledge pertaining to structural feature extraction from semantic networks. MiF improves the conventional Jaccard and/or Simpson indices, and reconciles both the geodesic information (random walk) and co-occurrence adjustment (degree balance and distribution). We measure the effectiveness of graph-based coefficients through the application of linguistic graph information for a neural activity recorded during conceptual processing in the human brain. Specifically, the MiF distance is computed between each of the nouns used in a previous neural experiment and each of the in-between words in a subgraph derived from the Edinburgh Word Association Thesaurus of English. From the MiF-based information matrix, a machine learning model can accurately obtain a scalar parameter that specifies the degree to which each voxel in (the MRI image of) the brain is activated by each word or each principal component of the intermediate semantic features. Furthermore, correlating the voxel information with the MiF-based principal components, a new computational neurolinguistics model with a network connectivity paradigm is created. This allows two dimensions of context space to be incorporated with both semantic and neural distributional representations.
Resumo:
Campaigns raise public interest in politics and allow parties to convey their messages to voters. However, voters' exposure and attention during campaigns are biased towards parties and candidates they like. This hinders parties' ability to reach new voters. This paper theorises and empirically tests a simple way in which parties can break partisan selective attention: owning an issue. When parties own issues that are important for a voter, that voter is more likely to notice them. Using survey data collected prior to the 2009 Belgian regional elections it is shown that this effect exists independent of partisan preferences and while controlling for the absolute visibility of a party in the media. This indicates that issue ownership has an independent impact on voters' attention to campaigns. This finding shows that owning salient issues yields (potential) advantages for parties, since getting noticed is a prerequisite for conveying electoral messages and increasing electoral success.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Speech is the most natural means of communication among human beings and speech processing and recognition are intensive areas of research for the last five decades. Since speech recognition is a pattern recognition problem, classification is an important part of any speech recognition system. In this work, a speech recognition system is developed for recognizing speaker independent spoken digits in Malayalam. Voice signals are sampled directly from the microphone. The proposed method is implemented for 1000 speakers uttering 10 digits each. Since the speech signals are affected by background noise, the signals are tuned by removing the noise from it using wavelet denoising method based on Soft Thresholding. Here, the features from the signals are extracted using Discrete Wavelet Transforms (DWT) because they are well suitable for processing non-stationary signals like speech. This is due to their multi- resolutional, multi-scale analysis characteristics. Speech recognition is a multiclass classification problem. So, the feature vector set obtained are classified using three classifiers namely, Artificial Neural Networks (ANN), Support Vector Machines (SVM) and Naive Bayes classifiers which are capable of handling multiclasses. During classification stage, the input feature vector data is trained using information relating to known patterns and then they are tested using the test data set. The performances of all these classifiers are evaluated based on recognition accuracy. All the three methods produced good recognition accuracy. DWT and ANN produced a recognition accuracy of 89%, SVM and DWT combination produced an accuracy of 86.6% and Naive Bayes and DWT combination produced an accuracy of 83.5%. ANN is found to be better among the three methods.
Resumo:
Data mining means to summarize information from large amounts of raw data. It is one of the key technologies in many areas of economy, science, administration and the internet. In this report we introduce an approach for utilizing evolutionary algorithms to breed fuzzy classifier systems. This approach was exercised as part of a structured procedure by the students Achler, Göb and Voigtmann as contribution to the 2006 Data-Mining-Cup contest, yielding encouragingly positive results.
Resumo:
We present distribution independent bounds on the generalization misclassification performance of a family of kernel classifiers with margin. Support Vector Machine classifiers (SVM) stem out of this class of machines. The bounds are derived through computations of the $V_gamma$ dimension of a family of loss functions where the SVM one belongs to. Bounds that use functions of margin distributions (i.e. functions of the slack variables of SVM) are derived.
Resumo:
The Support Vector (SV) machine is a novel type of learning machine, based on statistical learning theory, which contains polynomial classifiers, neural networks, and radial basis function (RBF) networks as special cases. In the RBF case, the SV algorithm automatically determines centers, weights and threshold such as to minimize an upper bound on the expected test error. The present study is devoted to an experimental comparison of these machines with a classical approach, where the centers are determined by $k$--means clustering and the weights are found using error backpropagation. We consider three machines, namely a classical RBF machine, an SV machine with Gaussian kernel, and a hybrid system with the centers determined by the SV method and the weights trained by error backpropagation. Our results show that on the US postal service database of handwritten digits, the SV machine achieves the highest test accuracy, followed by the hybrid approach. The SV approach is thus not only theoretically well--founded, but also superior in a practical application.
Resumo:
In Argentina, the restructuring of the State initially raised as a public policy in the 1980s and in-depth in the ‘ 90s under the neoliberal model accentuated - between other processes, of the administrative decentralization, which also resulted in new roles awarded to municipalities. That’s how various actors in society charged leadership. The local and urban were the subject of renewed interpretations, scenarios where practices more fully participatory citizen could be settled. In the neighborhoods of cities, grass-roots organizations cultivated his role as space intermediation. This article discusses and reflects on these new roles that launched from the changes in articulation with the municipality since the mid-’ 80s and ‘ 90s, and problematizes particularly about the contents and scope of participatory practices inside and outside of organizations of civil society in the neo-liberal situation.
Resumo:
Resumen tomado de la revista
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n