Results 1 - 10
of
345,309
Spatial Interpolation Using Neural Fuzzy Technique
"... Abstract: Spatial interpolation is an important feature of a Geographic Information System, which is the procedure used to estimate values at unknown locations within the area covered by existing observations. This paper constructs fuzzy rule bases with the aid of a Selforganising Map (SOM) and Back ..."
Abstract
- Add to MetaCart
) and Backpropagation Neural Networks (BPNNs). These fuzzy rule bases are then used to perform spatial interpolation. A case based on the 467 rainfall data in Switzerland is used to test the neural fuzzy technique. The SOM is first used to classify the data. After classification, BPNNs are then use to learn
Neural Fuzzy Techniques in Vehicle Acoustic Signal Classification
, 1997
"... Vehicle acoustic signals have long been considered as unwanted traffic noise. In this research acoustic signals generated by each vehicle will be used to detect its presence and classify its type. Circular arrays of microphones were designed and built to detect desired signals and suppress unwanted ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
Vehicle acoustic signals have long been considered as unwanted traffic noise. In this research acoustic signals generated by each vehicle will be used to detect its presence and classify its type. Circular arrays of microphones were designed and built to detect desired signals and suppress unwanted ones. Circular arrays with multiple rings have an interesting and important property that is constant sidelobe levels. A modified genetic algorithm that can work directly with real numbers is used in the circular array design. It offers more effective ways to solve numerical problems than a standard genetic algorithm. In classifier
Direct Model Reference Adaptive Controller Based-On Neural-Fuzzy Techniques for Nonlinear Dynamical Systems 1
"... Abstract: This paper presents a direct neural-fuzzy-based Model Reference Adaptive Controller (MRAC) for nonlinear dynamical systems with unknown parameters. The two-phase learning is implemented to perform structure identification and parameter estimation for the controller. In the first phase, sim ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
, similarity index-based fuzzy c-means clustering technique extracts the fuzzy rules in the premise part for the neural-fuzzy controller. This technique enables the recruitment of rule parameters in accordance to the number of clusters and kernel centers it automatically generated. In the second phase
SMOTE: Synthetic Minority Over-sampling Technique
- Journal of Artificial Intelligence Research
, 2002
"... An approach to the construction of classifiers from imbalanced datasets is described. A dataset is imbalanced if the classification categories are not approximately equally represented. Often real-world data sets are predominately composed of ``normal'' examples with only a small percentag ..."
Abstract
-
Cited by 614 (28 self)
- Add to MetaCart
An approach to the construction of classifiers from imbalanced datasets is described. A dataset is imbalanced if the classification categories are not approximately equally represented. Often real-world data sets are predominately composed of ``normal'' examples with only a small percentage of ``abnormal'' or ``interesting'' examples. It is also the case that the cost of misclassifying an abnormal (interesting) example as a normal example is often much higher than the cost of the reverse error. Under-sampling of the majority (normal) class has been proposed as a good means of increasing the sensitivity of a classifier to the minority class. This paper shows that a combination of our method of over-sampling the minority (abnormal) class and under-sampling the majority (normal) class can achieve better classifier performance (in ROC space) than only under-sampling the majority class. This paper also shows that a combination of our method of over-sampling the minority class and under-sampling the majority class can achieve better classifier performance (in ROC space) than varying the loss ratios in Ripper or class priors in Naive Bayes. Our method of over-sampling the minority class involves creating synthetic minority class examples. Experiments are performed using C4.5, Ripper and a Naive Bayes classifier. The method is evaluated using the area under the Receiver Operating Characteristic curve (AUC) and the ROC convex hull strategy.
Data Mining: Concepts and Techniques
, 2000
"... Our capabilities of both generating and collecting data have been increasing rapidly in the last several decades. Contributing factors include the widespread use of bar codes for most commercial products, the computerization of many business, scientific and government transactions and managements, a ..."
Abstract
-
Cited by 3006 (22 self)
- Add to MetaCart
of data and information. This explosive growth in stored data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. This book explores the concepts and techniques of data mining
Evolving Neural Networks through Augmenting Topologies
- Evolutionary Computation
"... An important question in neuroevolution is how to gain an advantage from evolving neural network topologies along with weights. We present a method, NeuroEvolution of Augmenting Topologies (NEAT), which outperforms the best fixed-topology method on a challenging benchmark reinforcement learning task ..."
Abstract
-
Cited by 524 (113 self)
- Add to MetaCart
An important question in neuroevolution is how to gain an advantage from evolving neural network topologies along with weights. We present a method, NeuroEvolution of Augmenting Topologies (NEAT), which outperforms the best fixed-topology method on a challenging benchmark reinforcement learning
Image retrieval: Current techniques, promising directions and open issues
- Journal of Visual Communication and Image Representation
, 1999
"... This paper provides a comprehensive survey of the technical achievements in the research area of image retrieval, especially content-based image retrieval, an area that has been so active and prosperous in the past few years. The survey includes 100+ papers covering the research aspects of image fea ..."
Abstract
-
Cited by 492 (14 self)
- Add to MetaCart
This paper provides a comprehensive survey of the technical achievements in the research area of image retrieval, especially content-based image retrieval, an area that has been so active and prosperous in the past few years. The survey includes 100+ papers covering the research aspects of image feature representation and extraction, multidimensional indexing, and system design, three of the fundamental bases of content-based image retrieval. Furthermore, based on the state-of-the-art technology available now and the demand from real-world applications, open research issues are identified and future promising research directions are suggested. C ○ 1999 Academic Press 1.
A Learning Algorithm for Continually Running Fully Recurrent Neural Networks
, 1989
"... The exact form of a gradient-following learning algorithm for completely recurrent networks running in continually sampled time is derived and used as the basis for practical algorithms for temporal supervised learning tasks. These algorithms have: (1) the advantage that they do not require a precis ..."
Abstract
-
Cited by 529 (4 self)
- Add to MetaCart
the retention of information over time periods having either fixed or indefinite length. 1 Introduction A major problem in connectionist theory is to develop learning algorithms that can tap the full computational power of neural networks. Much progress has been made with feedforward networks, and attention
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Technical Report 2003/235, Cryptology ePrint archive, http://eprint.iacr.org, 2006. Previous version appeared at EUROCRYPT 2004
- 34 [DRS07] [DS05] [EHMS00] [FJ01] Yevgeniy Dodis, Leonid Reyzin, and Adam
, 2004
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract
-
Cited by 532 (38 self)
- Add to MetaCart
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying
Active Learning with Statistical Models
, 1995
"... For manytypes of learners one can compute the statistically "optimal" way to select data. We review how these techniques have been used with feedforward neural networks [MacKay, 1992# Cohn, 1994]. We then showhow the same principles may be used to select data for two alternative, statist ..."
Abstract
-
Cited by 677 (12 self)
- Add to MetaCart
For manytypes of learners one can compute the statistically "optimal" way to select data. We review how these techniques have been used with feedforward neural networks [MacKay, 1992# Cohn, 1994]. We then showhow the same principles may be used to select data for two alternative
Results 1 - 10
of
345,309