The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Supply chain management aims at delivering goods in the shortest time at the lowest possible price while ensuring the best possible quality and is now vital to the success of the online retail business. Executing effective warehouse site selection has been one of the key challenges in the development of a successful supply chain system. While some effective strategies for warehouse site selection...
We propose EC3, a novel algorithm that merges classification and clustering together in order to support both binary and multi-class classification. EC3 is based on a principled combination of multiple classification and multiple clustering methods using a convex optimization function. We additionally propose iEC3, a variant of EC3 that handles imbalanced training data. We perform an extensive experimental...
Sleep quality impacts virtually all aspects of life, including health, mood, emotions, cognition, memory, behavior, and performance. Actigraphy offers a lower-cost alternative to conventional polysomnography (PSG), the gold standard for measuring sleep quality. Effective use of actigraphy for assessing sleep quality requires reliable methods for detecting sleep/wake states from actigraphy measurements...
In this paper, we propose a new clustering model, called DEeP Embedded Regularized ClusTering (DEPICT), which efficiently maps data into a discriminative embedding subspace and precisely predicts cluster assignments. DEPICT generally consists of a multinomial logistic regression function stacked on top of a multi-layer convolutional autoencoder. We define a clustering objective function using relative...
In the training of the radial basis function network (RBFN), feature selection and classifier design are two tasks commonly addressed in separated processes. The former is related to the number of input nodes, whereas the latter is associated with the design of the hidden layer. Hence, this paper presents an algorithm to train a RBFN based on differential evolution (DE), which simultaneously adjusts...
A new training scheme for neural-network-based controller for power electronics systems is proposed. It utilizes the circuit model of the power conversion stage (PCS) in the training process. The training algorithm is a distributed form of evolutionary computation, being able to run on a computer cluster equipped with multiple graphics processing units (GPUs). As a design example, a boost converter...
In view of the shortcomings of the traditional clustering algorithm in intrusion detection system, this paper proposes a method of selecting the initial clustering center based on density, which can overcome the problem of K value in ordinary K-Means. The improved intrusion detection model can achieve good clustering effect. Compared with the traditional K-Means, it is found that the improved algorithm...
Fingerprint-based indoor localization has been intensively researched in the last decade, yet the labor-intensive and time-consuming site survey for radio map construction has impeded its practical implementations. Recently, crowdsourcing has been promoted as a promising approach to exploit casually collected samples for radio map construction, however, such samples may be labelled with erroneous...
This paper proposes an improved KNN algorithm to overcome the class overlapping problem when the class distribution is skewed. Different from the conventional KNN algorithm, it not only finds out the k nearest neighbors of each sample (even the test object itself) in the training dataset, but also the neighbors of the unknown test object. Then the validity value of a data point is computed based on...
Discriminative clustering has been successfully applied to a number of weakly supervised learning tasks. Such applications include person and action recognition, text-to-video alignment, object co-segmentation and co-localization in videos and images. One drawback of discriminative clustering, however, is its limited scalability. We address this issue and propose an online optimization algorithm based...
Support vector machine (SVM) algorithm received much attention in the research of voiceprint recognition, especially for small sample datasets. However, with the increase of recognition number and speech features number, the rate of model training and recognition is significantly reduced. In order to solve the problem, a new weighted clustering algorithm is proposed, which use “one to one” SVM model...
This paper is the first to address the problem of unsupervised action localization in videos. Given unlabeled data without bounding box annotations, we propose a novel approach that: 1) Discovers action class labels and 2) Spatio-temporally localizes actions in videos. It begins by computing local video features to apply spectral clustering on a set of unlabeled training videos. For each cluster of...
Image clustering is a crucial but challenging task in machine learning and computer vision. Existing methods often ignore the combination between feature learning and clustering. To tackle this problem, we propose Deep Adaptive Clustering (DAC) that recasts the clustering problem into a binary pairwise-classification framework to judge whether pairs of images belong to the same clusters. In DAC, the...
With the rapid development of society and technology, home service robot is becoming cheaper and smarter. Facing with the difficulties of aging and shortage of labor, we can use home service robot (HSR) as a good companion and servant. However, the security and reliability problems have become bottlenecks in this field. It is meaningful to do researches on fault diagnosis of HSR. Due to its excellent...
With the development of cloud computing technology, there are many scientists who want to perform their experiments in cloud environments. Because of the pay-per-use method, it is cost-optimal for scientists to only pay for the cloud services needed for their experiments. However, selection of suitable resources is difficult because they are composed of various characteristics. Therefore, a method...
The article is devoted to designing of the control systems for weakly formalized objects using neural networks and fuzzy logic. An economical example is examined. The model of the predictive control system based on two neural fuzzy networks with the Sugeno interference is proposed. The first network is used for prediction of object's output, the second one for getting control signal. It's also proposed...
There are many challenges in single-channel multi-person mixed speech separation, such as modeling the temporal continuity of the speech signals and improving the frame separation performance simultaneously. In this paper, a separation method based on Deep Clustering with local optimization by the improved Non-Negative Matrix Factorization (NMF) combined with Factorial Conditional Random Fields (FCRF)...
A technique and algorithms for early detection of the started attack and subsequent blocking of malicious traffic are proposed. The primary separation of mixed traffic into trustworthy and malicious traffic was carried out using cluster analysis. Classification of newly arrived requests was done using different classifiers with the help of received training samples and developed success criteria.
A spatial analysis of magnitude distribution is presented in this paper to identify the optimal number of clusters based on seismic data of all region in Indonesia. The data were obtained from Indonesian Agency for Meteorological, Climatological and Geophysics (BMKG) and United States Geological Survey's (USGS). Clustering process consist of two steps: finding the global optimum number of clusters...
Recently, multi-label classification has gained prime importance among the classification problems. The applications of classification problems has increased so rapidly that the need for efficient and accurate classifiers has become a vital requirement in the area of data mining. Multi-label classification problem is distinguished from the single label classification because of the capability to handle...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.