Hybrid Soft Computing

Size: px
Start display at page:

Download "Hybrid Soft Computing"

Transcription

1 Hybrid Soft Computing Challenges, Perspectives and Applications Ajith Abraham Norwegian Center of Excellence, Norwegian University of Science and Technology, Trondheim Norway

2 Presentation Overview Soft Computing Ingredients : Neural networks, fuzzy inference systems, evolutionary algorithms, probabilistic reasoning etc. Need for Hybridization? Engineering Hybrid Architectures Applications - E-commerce (business intelligence) - Network Security - Data Mining Conclusions

3 What is Intelligence? Intelligence is what we use when we don t know what to do. Intelligence requires an ability to Perform complex tasks Recognize complex patterns Solve unseen problems Learn from experience Learn from instruction Use Natural Language Be aware of self (consciousness) Use tools

4 Parking a Car Generally, a car can be parked rather easily. It it were specified to within, say, a fraction of a millimeter, it would take hours of maneuvering and precise measurements of distance and angular position to solve the problem. High precision carries a high cost. The challenge is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. This, in essence, is the guiding principle of modern intelligent computing.

5 Intelligent Systems Ingredients FL : Algorithms for dealing with imprecision and uncertainty RS: Handling uncertainty arising from the granularity in the domain of discourse NC : Machinery for function approximation EA/SI : Algorithms for global search and optimization FL, RS, NC and EA/SI are Complementary rather than Competitive

6 Computational Theory of Perceptions Humans have remarkable capability to perform a wide variety of physical and mental tasks without any measurement and computations. Reflecting the finite ability of the sensory organs and (finally the brain) to resolve details, Perceptions are inherently imprecise. Provides capability to compute and reason with perception based information

7 How to Model Perceptions Perceptions are both fuzzy and granular Boundaries of perceived classes are unsharp Values of attributes are granulated Example: Granules in age: very young, young, not so old, Perceptions are described by propositions drawn from a natural language

8 Knowledge-based Systems Fuzzy logic Rough sets Machine Intelligence Hybrid Systems NN-FL NN-EA FL-EA NN-FL-EA Etc.. Non-linear Dynamics Chaos theory Signal processing Fractals Pattern recognition Machine learning Data mining Web intelligence

9 Problem Solving Techniques Conventional Hard Computing Soft Computing Precise Models Approximate Models Symbolic Logic Reasoning Traditional Numerical Modeling and Search Approximate Reasoning Functional Approximation and Randomized Search

10 Soft Computing Soft Computing Main Components Approximate Reasoning Functional Approximation/ Randomized Search Probabilistic Models Fuzzy Logic Neural Networks Evolutionary Algorithms

11 Artificial Neural Networks

12 Artificial Neural Networks - Features Typically, structure of a neural network is established and one of a variety of mathematical algorithms is used to determine what the weights of the interconnections should be to maximize the accuracy of the outputs produced. This process by which the synaptic weights of a neural network are adapted according to the problem environment is popularly known as learning. There are broadly three types of learning: Supervised learning, unsupervised learning and reinforcement learning

13 Different Neural Network Architectures Multi layered feedforward network Recurrent network Competitive network Jordan network

14 Backpropagation Algorithm Backpropagation algorithm Δw ij (n) = ε * δe δw ij + α * Δw ij (n E = error criteria to be minimized 1) w ij = weight from the i-th input unit to the j-th output ε and α are the learning rate and momentum

15 Choosing Hidden Neurons A large number of hidden neurons will ensure the correct learning and the network is able to correctly predict the data it has been trained on, but its performance on new data, its ability to generalise, is compromised. With too few a hidden neurons, the network may be unable to learn the relationships amongst the data and the error will fail to fall below an acceptable level. Selection of the number of hidden neurons is a crucial decision. Often a trial and error approach is taken.

16 Use of Momentum Helps to get out of local minima Smooth out the variations

17 Effects of Different Learning Rates

18 Effect on Number of Hidden Neurons Mackey Glass Lowest RMSE for LM = (24 hidden neurons)

19 Effect on Number of Hidden Neurons Mackey Glass Lowest RMSE for LM = (24 hidden neurons)

20 Effect on Number of Hidden Neurons - Gas Furnace Series Lowest RMSE for LM = (24 hidden neurons)

21 Effect on Number of Hidden Neurons - Gas Furnace Series Lowest RMSE for SCG = (16 hidden neurons)

22 No Free Lunch Theorem Even though artificial neural networks are capable of performing a wide variety of tasks, yet in practice sometimes they deliver only marginal performance. There is little reason to expect that one can find a uniformly best algorithm for selecting the weights in a feedforward artificial neural network. This is in accordance with the no free lunch theorem, which explains that for any algorithm, any elevated performance over one class of problems is exactly paid for in performance over another class.

23 Fuzzy Logic

24 How Fuzzy Sets are Constructed? Construction of fuzzy set depend on two things: Identification of a suitable universe of discourse and the specification of an appropriate membership function Example showing how a set of old people could be represented using fuzzy set and crisp set 1.0 Crisp set A 80 A = Set of Old People Age (years) Fuzzy set A Membership function Age (years)

25 Fuzzy if-then Rules Mamdani fuzzy inference system If pressure is high then volume is small high small Takagi Sugeno fuzzy inference system If pressure is medium then volume = 5 x pressure medium volume = 5 x pressure

26 Mamdani Inference System Input MF Output Z A 1 B 1 C 1 A 2 X B Y Z 1 2 C 2 Z = (centroid of area) X Y x y Z 2 Output MF Input (x,y)

27 Fuzzy Expert System A fuzzy expert system to forecast the reactive power (P) at time t+1 by knowing the load current (I) and voltage (V) at time t. The experiment system consists of two stages: Developing the fuzzy expert system and performance evaluation using the test data. The model has two input variables (V and I) and one output variable (P). Training and testing data sets were extracted randomly from the master dataset. 60% of data was used for training and remaining 40% for testing.

28 Fuzzy Expert System - Some Illustrations Mamdani FIS Takagi - Sugeno FIS No. of MF's Root Mean Squared Error Training Test Training Test Different quantity of Membership Functions

29 Fuzzy Expert System - Some Illustrations Mamdani FIS Takagi - Sugeno FIS Root Mean Squared Error Training Test Training Test Different shape of Membership Functions

30 Fuzzy Expert System - Some Illustrations Mamdani FIS Takagi - Sugeno FIS Root Mean Squared Error Training Test Training Test For different fuzzy operators

31 Fuzzy Expert System - Some Illustrations Mamdani FIS Takagi - Sugeno FIS Defuzzification RMSE RMSE Defuzzification Training Test Training Test Centroid MOM BOA SOM Weighted sum Weighted average For different defuzzification operators

32 Summary of Fuzzy Modeling Surface structure Relevant input and output variables Relevant fuzzy inference system Number of linguistic terms associated with each input / output variable If-then rules Deep structure Type of membership functions Building up the knowledge base Fine tune parameters of MFs using regression and optimization techniques

33 Evolutionary Computation

34 Evolutionary Algorithms Evolutionary Algorithms Evolution strategies Evolutionary Programming Genetic Algorithm Genetic Programming Evolutionary Algorithms can be described by x[t + 1] = s(v(x[t])) x[t] : the population at time t under representation x v : is the reproduction operator (s) s : is the selection operator

35 Evolutionary Algorithm Flow Chart Selection Elitism reproduction Current generation Next generation

36 Evolutionary Algorithm Parameter Settings Before the run Parameter settings During the run Parameter tuning Parameter control Deterministic Adaptive

37 Evolutionary Algorithm Behaviour Evolutionary algorithm behaviour is determined by the exploitation and exploration relationship kept throughout the run. Adaptive evolutionary algorithms have been built for inducing exploitation -- exploration relationships that avoid the premature convergence problem and improve the final results. If poor settings are used, the EA s performance shall be severely affected.

38 Where to hybridize?

39 Comparison of Different Intelligent Systems FIS ANN EC Symbolic AI Mathematical model SG B B SB Learning ability B G SG B Knowledge representation G B SB G Expert knowledge G B B G Nonlinearity G G G SB Optimization ability B SG G B Fault tolerance G G G B Uncertainty tolerance G G G B Real time operation G SG SB B Fuzzy terms used for grading are good (G), slightly good (SG), slightly bad (SB) and bad (B)

40 Hybrid Soft Computing

41 Hybrid Soft Computing Architecture - 1 x 1 (n) Soft Computing 1 y 1 (n) Solution Problem x 2 (n) Soft Computing 2 y 2 (n) Solution

42 Hybrid Soft Computing Architecture - 2 x 1 (n) Soft Computing 1 y 1 (n) Problem Solution x 2 (n) Soft Computing 2 y 2 (n)

43 Hybrid Soft Computing Architecture - 3 Problem x 1 (n) Soft Computing 1 y 1 (n) Solution Δ Feedback Soft Computing 2 y 2 (n)

44 Hybrid Soft Computing Architecture - 4 Problem Soft Computing 1 Soft Computing 2 x 1 (n) y 1 (n) z 1 (n) Solution

45 Hybrid Soft Computing Architecture - 5 Problem x 1 (n) Soft Computing 1 z 1 (n) Solution Soft Computing 2 y 1 (n)

46 Hybrid Soft Computing Architecture - 6 Problem x 1 (n) Soft Computing 1 z 1 (n) Solution Soft Computing 2 y 1 (n)

47 Hybrid Soft Computing Architecture - 7 x 1 (n) Soft Computing 1 z 1 (n) Solution y 1 (n) Soft Computing 2

48 Hybrid Soft Computing Architecture - 8 Problem x 1 (n) Soft Computing 1 z 1 (n) Solution Δ y 1 (n) Soft Computing 2

49 Hybrid Soft Computing Architecture - 9

50 Application examples 1. Business Intelligence 2. Data Mining

51 Business Intelligence

52 The key in business is to know something that nobody else knows. Aristotle Onassis To understand is to perceive patterns. Sir Isaiah Berlin

53 Coping with Information Computerization of daily life produces data Point-of-sale, Internet shopping (& browsing), credit cards, banks... Information on credit cards, purchase patterns, product preferences, payment history, sites visited... Travel: One trip by one person generates info on destination, airline preferences, seat selection, hotel, rental car, name, address, restaurant choices... Data cannot be processed or even inspected manually

54 Data Overload Only a small portion of data collected is analyzed (estimate: 5%) Vast quantities of data are collected and stored out of fear that important info will be missed Data volume grows so fast that old data is never analyzed Database systems do not support queries like Who is likely to buy product X List all reports of problems similar to this one Flag all fraudulent transactions But these may be the most important questions!

55 What is Business Intelligence? Business intelligence is a smaller component of business process management. Business intelligence is knowing exactly what is happening in an organization. It's taking the pulse. It assists businesses in making better business decisions. Strong piece to measure the company's performance Monitors the financial and operational health of the organization. Provides two- way integration with operational systems and information feedback analysis.

56 E-Commerce Technologies Used SEARCH ENGINE ON-LINE CATALOG RECOMMENDER AGENT CONFIGURATOR SHOPPING BOT AGGREGATOR AUTOMATED AGENTS TRANSACTION PROCESSOR DATA INTERCHANGE CRYPTOGRAPHY E-PAYMENT SYSTEMS TRACKING AGENT ON-LINE HELP BROWSER SHARING INTERNET TELEPHONY BUYER FINDS SELLER SELECTION OF GOODS NEGOTIATION SALE PAYMENT DELIVERY POST-SALE ACTIVITY Information gathered SEARCH BEHAVIOR BROWSING BEHAVIOR CUSTOMER PREFERENCES EFFECTIVENESS OF PROMOTIONS BARGAINING STRATEGIES PRICE SENSITIVITIES PERSONAL DATA MARKET BASKET CREDIT/PAYMENT INFORMATION DELIVERY REQUIREMENTS ON-LINE PROBLEM REPORTS CUSTOMER SATISFACTION FOLLOW-ON SALES OPPORTUNITIES

57 What is Web Mining? Web mining is the application of data mining or other information process techniques to WWW, to find useful patterns.

58 Due to intense competition on one hand and the customer s option to choose from several alternatives business community has realized the necessity of intelligent marketing strategies and relationship management. Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, creating adaptive Web sites, business and support services, personalization, network traffic flow analysis and so on.

59 Analyzing the Web access logs can help understand the user behaviour and the web structure. From the business and applications point of view, knowledge obtained from the Web usage patterns could be directly applied to efficiently manage activities related to e-business, e-services etc. Accurate Web usage information could help to attract new customers, retain current customers, improve cross marketing/sales, effectiveness of promotional campaigns, tracking leaving customers and find the most effective logical structure for their Web space.

60 Web Usage Mining Contrary to popular belief, everything necessary for data mining Web traffic is NOT always automatically collected. Content and Structure Data Preprocessing Pattern Discovery Pattern Analysis Raw Usage Data Preprocessed Clickstream Data Rules, Patterns, and Statistics "Interesting" Rules, Patterns, and Statistics

61 Web Usage Data Sources Sources - Client level, Server level. Abstractions - User, Page File, Page View, Server Session. Phone Line "Internet" Client Computer Modem ISP Server Web Server Content Server User Behaviors Server Logs Site Content

62 Taxonomy of Web Mining Methods Web Mining Methods Predictive Modeling Data Clustering Link Analysis Text Mining Deviation Detection Decision Trees Neural Networks Machine learning Clustering K-Means Fuzzy ACC Rule Association Semantic Maps Visualization

63 Predictive Modeling Objective: use data about the past to predict future behavior Sample problems: Will this (new) customer pay his bill on time? (classification) What will the Dow-Jones Industrial Average be on October 15? (prediction)

64 Predictive Modeling Honest Horia Maria Daniel Crooked James Jeff John Which characteristics distinguish the two groups?

65 Web Log File Sample <cs.okstate.edu>

66 Web Usage Mining Framework

67 Web Usage Mining Framework

68

69 Evolutionary Fuzzy Clustering Usually a number of cluster centers are randomly initialized and the FCM algorithm provides an iterative approach to approximate the minimum of the objective function starting from a given position and leads to any of its local minima. No guarantee ensures that FCM converges to an optimum solution (can be trapped by local extrema in the process of optimizing the clustering criterion). The performance is very sensitive to initialization of the cluster centers. An evolutionary algorithm is used to decide the optimal number of clusters and their cluster centers.

70 Learning Rules with Evolutionary Algorithms The chromosome encodes individual rules. Only the best individual is considered to form part of the solution. Initial rules were generated using grid partitioning system. A1 B1 A2 B2 x y EA s were then used to evaluate this rules to incorporate the rule into the final set of rules using a iterative learning approach by penalizing less contributing rules. y B2 B1 A1 A2 x

71 Genetic Representation of Fuzzy Rules Chromosome representing m fuzzy rules 1 stands for a selected and 0 for a non-selected rule Length of the string depending on the number of input and output variables. 3 input variables composed of 3,2,2 fuzzy sets 1 output variable composed of 3 fuzzy sets High level representation reduces computational complexity

72 Chromosome structure of the i-miner

73 Monash University s Central Web Melbourne, Australia over 7 million hits in a week!!!!

74 Hourly Web Traffic

75 Daily Web Traffic

76 Data Complexity Over 7 million hits in a week!! Due to the enormous traffic volume and chaotic access behaviour, the prediction for Web user access patterns becomes more difficult and complex Pattern Discovery and Trend Analysis Formulation of Clusters Discovering Hidden Information Daily and Hourly Trends (Volume of Hits)

77 Ant Colony Clustering Workers have been reported to sort their larvae or form piles of corpses literally cemeteries to clean up their nests. Eric Bonabeau, Marco Dorigo and Guy Théraulaz, Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute in the Sciences of the Complexity, Oxford Univ. Press, New York. The basic mechanism underlying this type of aggregation phenomenon is an attraction between dead items mediated by the ant workers: small clusters of items grow by attracting workers to deposit more items. The general idea is that isolated items should be picked up and dropped at some other location where more items of that type are present.

78 Parameters Settings The statistical / text data from 01 January 2002 to 07 July were used. Takagi Sugeno Fuzzy Inference System (TSFIS) 81 Fuzzy if-then Rules 50 Epochs Backpropagation Neural Networks (BPNNs) Neurons: 14 / 17 Momentum: 0.05 / Epochs Linear Genetic Programming (LGP) 500 Population, 200,000 tournaments 0.9 Crossover / Mutation rate 256 Maximum Program Size

79 Parameters Settings (i Miner) Population size 30 Maximum no of generations 35 Fuzzy inference system Rule antecedent membership functions Rule consequent parameters Gradient descent learning Ranked based selection Takagi Sugeno 3 membership functions per input variable parameterized Gaussian 10 epochs linear parameters 0.50 Elitism 5 % Starting mutation rate 0.50

80 Hidden Knowledge From SOM Clusters daily traffic hourly traffic

81 Hidden Knowledge From Clusters

82 Hidden Knowledge From Clusters

83 Hidden Knowledge From Clusters

84 E-FCM Clusters

85 E-FCM Clusters

86 E-FCM Clusters Fuzzy clustering of visitors based on the day of access

87 ACO Clustering t = 1 t = 100 t = 500 t = 900 t = 10,000,000 Daily Web traffic data on a 25 x 25 non-parametric toroidal grid, 14 ants

88 ACO Clustering t = 1 t = 100 t = 500 t = 900 t = 10,000,000 Hourly web traffic - hourly Web traffic data on a 45 x 45 nonparametric toroidal grid, 48 ants

89 Performance of i-miner (Training)

90 Performance of i-miner (Test)

91 Performance of the different paradigms Hybrid method Daily (1 day ahead) RMSE Train Test CC ANT-LGP i-miner (FCM-FIS) SOM-ANN SOM-LGP

92 Performance of the different paradigms Hybrid method Hourly (1 hour ahead) RMSE CC Train Test ANT-LGP i-miner (FCM-FIS) SOM-ANN SOM-LGP

93 Test results of the daily trends for 6 days

94 Test results of the average hourly trends

95 Data Mining

96 Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems As a way to overcome the curse-of-dimensionality, it was suggested to arrange several low-dimensional rule base in a hierarchical structure, i.e., a tree, causing the number of possible rules to grow in a linear way according to the number of inputs. Building a hierarchical fuzzy system is a difficult task. This is because we need to define the architecture of the system (the modules, the input variables of each module, and the interactions between modules), as well as the rules of each modules. 96

97 Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems Two approaches could be used to tackle this problem. - Expert supplies all the required knowledge for building the system. - The other one is to use machine and/or optimization techniques to construct/adapt the system. Several machine learning and optimization techniques have been applied to aid the process of building hierarchical fuzzy systems. 97

98 Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems The problems in designing a hierarchical fuzzy logic system includes the following: Selecting an appropriate hierarchical structure; Selecting the inputs for each fuzzy TS sub-model Determining the rule base for each fuzzy TS sub-model Optimizing the parameters in the antecedent parts and the linear weights in the consequent parts. 98

99 Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems 99

100 Proposed Approach The hierarchical structure is evolved using a Probabilistic Incremental Program Evolution (PIPE). The fine tuning of the rule's parameters encoded in the structure is accomplished using Evolutionary Programming (EP). The proposed method interleaves both PIPE and EP optimizations. Starting with random structures and rules' parameters, it first tries to improve the hierarchical structure and then as soon as an improved structure is found, it fine tunes its rules' parameters. It then goes back to improve the structure again and, provided it finds a better structure, it again fine tunes the rules' parameters. This loop continues until a satisfactory solution (hierarchical TS-FS model) is found or a time limit is reached. 10 0

101 Encoding A tree-structural based encoding method. The reasons for choosing this representation: (1) the tree has a natural and typical hierarchical layer; (2) with pre-defined instruction sets, the tree can be created and evolved using the existing tree-structurebased approaches, i.e., Genetic Programming (GP) and PIPE algorithms. 10 1

102 Encoding Assume that the used instruction set is I={+2, +3, x1, x2, x3, x4, where +2 and +3 denote non-leaf nodes' instructions taking 2 and 3 arguments, respectively. x1, x2, x3, x4 are leaf nodes' instructions taking zero arguments each. 10 2

103 PIPE PIPE combines probability vector coding of program instructions, population based incremental learning and treecoded programs. PIPE iteratively generates successive populations of functional programs according to an adaptive probability distribution, represented as a Probabilistic Prototype Tree (PPT), over all possible programs. Each iteration uses the best program to refine the distribution. Thus, the structures of promising individuals are learned and encoded in PPT. 10 3

104 Program Development Example of node s N 1,0 s instruction probability vector P 1,0 (left). Probabilistic proto type treeppt(middle). Possible extracted program (right). 10 4

105 Comparison of the incremental type multilevel FRS (IFRS), aggregated type mutilevel FRS (AFRS), and the hierarchical TS-FS for Mackey-Glass timeseries prediction Model layer No. of rules No. of para. RMSE(train) RMSE(Test) IFRS AFRS HTS-FS Duan, J.-C. and Chung, F.-L. : Multilevel fuzzy relational systems: structure and identification. Soft Computing, Vol. 6, (2002) 71-86

106 The structure of the evolved hierarchical TS-FS model for predicting of Mackey-Glass time-series The importance degree of each input variables for Mackey-Glass time-series xi x0 x1 x2 x3 x4 x5 Impo(xi)

107

108 The developed optimal H-TS-FS architectures (Irisdata)

109

110 The developed optimal H-TS-FS architectures (Wine data)

111 Hybrid Soft Computing: Some Challenges Lots of success stories! We need programs that could deal with common sense informatic situation!! Most of the existing frameworks rely on user specified parameters. The intelligent system should be able to learn from data in a continuous, incremental way, able to grow as they operate, update their knowledge and refine the model through interaction with the environment. Adaptation process could learn from success and mistakes and apply that knowledge to new problems. Managing computational complexity.

112 What color is this rectangle?

113 Is this called yellow?

114 People define the limits of a color, such as yellow Different idea of what is yellow Knowledge is acquired by learning Personal situation, drugs, job etc. all can affect! 114

115 Limitations of the Human Mind Naming of colors. Based on learning, not on absolute standards. Face recognition. Cannot be passed on to another person by explanation. Object recognition. People cannot properly explain how they recognize objects.

116 Moore s Law

117 Thank You &

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

BUSINESS INTELLIGENCE FROM WEB USAGE MINING

BUSINESS INTELLIGENCE FROM WEB USAGE MINING BUSINESS INTELLIGENCE FROM WEB USAGE MINING Ajith Abraham Department of Computer Science, Oklahoma State University, 700 N Greenwood Avenue, Tulsa,Oklahoma 74106-0700, USA, ajith.abraham@ieee.org Abstract.

More information

Lecture 1: Machine Learning Basics

Lecture 1: Machine Learning Basics 1/69 Lecture 1: Machine Learning Basics Ali Harakeh University of Waterloo WAVE Lab ali.harakeh@uwaterloo.ca May 1, 2017 2/69 Overview 1 Learning Algorithms 2 Capacity, Overfitting, and Underfitting 3

More information

Python Machine Learning

Python Machine Learning Python Machine Learning Unlock deeper insights into machine learning with this vital guide to cuttingedge predictive analytics Sebastian Raschka [ PUBLISHING 1 open source I community experience distilled

More information

Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems

Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems Ajith Abraham School of Business Systems, Monash University, Clayton, Victoria 3800, Australia. Email: ajith.abraham@ieee.org

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria FUZZY EXPERT SYSTEMS 16-18 18 February 2002 University of Damascus-Syria Dr. Kasim M. Al-Aubidy Computer Eng. Dept. Philadelphia University What is Expert Systems? ES are computer programs that emulate

More information

Artificial Neural Networks written examination

Artificial Neural Networks written examination 1 (8) Institutionen för informationsteknologi Olle Gällmo Universitetsadjunkt Adress: Lägerhyddsvägen 2 Box 337 751 05 Uppsala Artificial Neural Networks written examination Monday, May 15, 2006 9 00-14

More information

Knowledge-Based - Systems

Knowledge-Based - Systems Knowledge-Based - Systems ; Rajendra Arvind Akerkar Chairman, Technomathematics Research Foundation and Senior Researcher, Western Norway Research institute Priti Srinivas Sajja Sardar Patel University

More information

Evolutive Neural Net Fuzzy Filtering: Basic Description

Evolutive Neural Net Fuzzy Filtering: Basic Description Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:

More information

A Neural Network GUI Tested on Text-To-Phoneme Mapping

A Neural Network GUI Tested on Text-To-Phoneme Mapping A Neural Network GUI Tested on Text-To-Phoneme Mapping MAARTEN TROMPPER Universiteit Utrecht m.f.a.trompper@students.uu.nl Abstract Text-to-phoneme (T2P) mapping is a necessary step in any speech synthesis

More information

Laboratorio di Intelligenza Artificiale e Robotica

Laboratorio di Intelligenza Artificiale e Robotica Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning

More information

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1 Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial

More information

Reinforcement Learning by Comparing Immediate Reward

Reinforcement Learning by Comparing Immediate Reward Reinforcement Learning by Comparing Immediate Reward Punit Pandey DeepshikhaPandey Dr. Shishir Kumar Abstract This paper introduces an approach to Reinforcement Learning Algorithm by comparing their immediate

More information

Rule Learning With Negation: Issues Regarding Effectiveness

Rule Learning With Negation: Issues Regarding Effectiveness Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United

More information

Seminar - Organic Computing

Seminar - Organic Computing Seminar - Organic Computing Self-Organisation of OC-Systems Markus Franke 25.01.2006 Typeset by FoilTEX Timetable 1. Overview 2. Characteristics of SO-Systems 3. Concern with Nature 4. Design-Concepts

More information

Evolution of Symbolisation in Chimpanzees and Neural Nets

Evolution of Symbolisation in Chimpanzees and Neural Nets Evolution of Symbolisation in Chimpanzees and Neural Nets Angelo Cangelosi Centre for Neural and Adaptive Systems University of Plymouth (UK) a.cangelosi@plymouth.ac.uk Introduction Animal communication

More information

Laboratorio di Intelligenza Artificiale e Robotica

Laboratorio di Intelligenza Artificiale e Robotica Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning

More information

(Sub)Gradient Descent

(Sub)Gradient Descent (Sub)Gradient Descent CMSC 422 MARINE CARPUAT marine@cs.umd.edu Figures credit: Piyush Rai Logistics Midterm is on Thursday 3/24 during class time closed book/internet/etc, one page of notes. will include

More information

The Good Judgment Project: A large scale test of different methods of combining expert predictions

The Good Judgment Project: A large scale test of different methods of combining expert predictions The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania

More information

Axiom 2013 Team Description Paper

Axiom 2013 Team Description Paper Axiom 2013 Team Description Paper Mohammad Ghazanfari, S Omid Shirkhorshidi, Farbod Samsamipour, Hossein Rahmatizadeh Zagheli, Mohammad Mahdavi, Payam Mohajeri, S Abbas Alamolhoda Robotics Scientific Association

More information

Software Maintenance

Software Maintenance 1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories

More information

10.2. Behavior models

10.2. Behavior models User behavior research 10.2. Behavior models Overview Why do users seek information? How do they seek information? How do they search for information? How do they use libraries? These questions are addressed

More information

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System QuickStroke: An Incremental On-line Chinese Handwriting Recognition System Nada P. Matić John C. Platt Λ Tony Wang y Synaptics, Inc. 2381 Bering Drive San Jose, CA 95131, USA Abstract This paper presents

More information

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, 2013 10.12753/2066-026X-13-154 DATA MINING SOLUTIONS FOR DETERMINING STUDENT'S PROFILE Adela BÂRA,

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

CSL465/603 - Machine Learning

CSL465/603 - Machine Learning CSL465/603 - Machine Learning Fall 2016 Narayanan C Krishnan ckn@iitrpr.ac.in Introduction CSL465/603 - Machine Learning 1 Administrative Trivia Course Structure 3-0-2 Lecture Timings Monday 9.55-10.45am

More information

Probabilistic Latent Semantic Analysis

Probabilistic Latent Semantic Analysis Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview

More information

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics Machine Learning from Garden Path Sentences: The Application of Computational Linguistics http://dx.doi.org/10.3991/ijet.v9i6.4109 J.L. Du 1, P.F. Yu 1 and M.L. Li 2 1 Guangdong University of Foreign Studies,

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

Rule Learning with Negation: Issues Regarding Effectiveness

Rule Learning with Negation: Issues Regarding Effectiveness Rule Learning with Negation: Issues Regarding Effectiveness Stephanie Chua, Frans Coenen, and Grant Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX

More information

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming Data Mining VI 205 Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming C. Romero, S. Ventura, C. Hervás & P. González Universidad de Córdoba, Campus Universitario de

More information

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach #BaselOne7 Deep search Enhancing a search bar using machine learning Ilgün Ilgün & Cedric Reichenbach We are not researchers Outline I. Periscope: A search tool II. Goals III. Deep learning IV. Applying

More information

Time series prediction

Time series prediction Chapter 13 Time series prediction Amaury Lendasse, Timo Honkela, Federico Pouzols, Antti Sorjamaa, Yoan Miche, Qi Yu, Eric Severin, Mark van Heeswijk, Erkki Oja, Francesco Corona, Elia Liitiäinen, Zhanxing

More information

Abstractions and the Brain

Abstractions and the Brain Abstractions and the Brain Brian D. Josephson Department of Physics, University of Cambridge Cavendish Lab. Madingley Road Cambridge, UK. CB3 OHE bdj10@cam.ac.uk http://www.tcm.phy.cam.ac.uk/~bdj10 ABSTRACT

More information

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

OCR for Arabic using SIFT Descriptors With Online Failure Prediction OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,

More information

A Genetic Irrational Belief System

A Genetic Irrational Belief System A Genetic Irrational Belief System by Coen Stevens The thesis is submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Science Knowledge Based Systems Group

More information

Unsupervised Learning of Word Semantic Embedding using the Deep Structured Semantic Model

Unsupervised Learning of Word Semantic Embedding using the Deep Structured Semantic Model Unsupervised Learning of Word Semantic Embedding using the Deep Structured Semantic Model Xinying Song, Xiaodong He, Jianfeng Gao, Li Deng Microsoft Research, One Microsoft Way, Redmond, WA 98052, U.S.A.

More information

Computerized Adaptive Psychological Testing A Personalisation Perspective

Computerized Adaptive Psychological Testing A Personalisation Perspective Psychology and the internet: An European Perspective Computerized Adaptive Psychological Testing A Personalisation Perspective Mykola Pechenizkiy mpechen@cc.jyu.fi Introduction Mixed Model of IRT and ES

More information

Word Segmentation of Off-line Handwritten Documents

Word Segmentation of Off-line Handwritten Documents Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department

More information

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks 1 Tzu-Hsuan Yang, 2 Tzu-Hsuan Tseng, and 3 Chia-Ping Chen Department of Computer Science and Engineering

More information

Classification Using ANN: A Review

Classification Using ANN: A Review International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 7 (2017), pp. 1811-1820 Research India Publications http://www.ripublication.com Classification Using ANN:

More information

Assignment 1: Predicting Amazon Review Ratings

Assignment 1: Predicting Amazon Review Ratings Assignment 1: Predicting Amazon Review Ratings 1 Dataset Analysis Richard Park r2park@acsmail.ucsd.edu February 23, 2015 The dataset selected for this assignment comes from the set of Amazon reviews for

More information

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,

More information

TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD

TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD TABLE OF CONTENTS LIST OF FIGURES LIST OF TABLES LIST OF APPENDICES LIST OF

More information

SARDNET: A Self-Organizing Feature Map for Sequences

SARDNET: A Self-Organizing Feature Map for Sequences SARDNET: A Self-Organizing Feature Map for Sequences Daniel L. James and Risto Miikkulainen Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 dljames,risto~cs.utexas.edu

More information

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Todd Holloway Two Lecture Series for B551 November 20 & 27, 2007 Indiana University Outline Introduction Bias and

More information

Mathematics subject curriculum

Mathematics subject curriculum Mathematics subject curriculum Dette er ei omsetjing av den fastsette læreplanteksten. Læreplanen er fastsett på Nynorsk Established as a Regulation by the Ministry of Education and Research on 24 June

More information

Lecture 10: Reinforcement Learning

Lecture 10: Reinforcement Learning Lecture 1: Reinforcement Learning Cognitive Systems II - Machine Learning SS 25 Part III: Learning Programs and Strategies Q Learning, Dynamic Programming Lecture 1: Reinforcement Learning p. Motivation

More information

Forget catastrophic forgetting: AI that learns after deployment

Forget catastrophic forgetting: AI that learns after deployment Forget catastrophic forgetting: AI that learns after deployment Anatoly Gorshechnikov CTO, Neurala 1 Neurala at a glance Programming neural networks on GPUs since circa 2 B.C. Founded in 2006 expecting

More information

A Case Study: News Classification Based on Term Frequency

A Case Study: News Classification Based on Term Frequency A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center

More information

Test Effort Estimation Using Neural Network

Test Effort Estimation Using Neural Network J. Software Engineering & Applications, 2010, 3: 331-340 doi:10.4236/jsea.2010.34038 Published Online April 2010 (http://www.scirp.org/journal/jsea) 331 Chintala Abhishek*, Veginati Pavan Kumar, Harish

More information

Physics 270: Experimental Physics

Physics 270: Experimental Physics 2017 edition Lab Manual Physics 270 3 Physics 270: Experimental Physics Lecture: Lab: Instructor: Office: Email: Tuesdays, 2 3:50 PM Thursdays, 2 4:50 PM Dr. Uttam Manna 313C Moulton Hall umanna@ilstu.edu

More information

Softprop: Softmax Neural Network Backpropagation Learning

Softprop: Softmax Neural Network Backpropagation Learning Softprop: Softmax Neural Networ Bacpropagation Learning Michael Rimer Computer Science Department Brigham Young University Provo, UT 84602, USA E-mail: mrimer@axon.cs.byu.edu Tony Martinez Computer Science

More information

A Comparison of Standard and Interval Association Rules

A Comparison of Standard and Interval Association Rules A Comparison of Standard and Association Rules Choh Man Teng cmteng@ai.uwf.edu Institute for Human and Machine Cognition University of West Florida 4 South Alcaniz Street, Pensacola FL 325, USA Abstract

More information

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE EE-589 Introduction to Neural Assistant Prof. Dr. Turgay IBRIKCI Room # 305 (322) 338 6868 / 139 Wensdays 9:00-12:00 Course Outline The course is divided in two parts: theory and practice. 1. Theory covers

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean

More information

INPE São José dos Campos

INPE São José dos Campos INPE-5479 PRE/1778 MONLINEAR ASPECTS OF DATA INTEGRATION FOR LAND COVER CLASSIFICATION IN A NEDRAL NETWORK ENVIRONNENT Maria Suelena S. Barros Valter Rodrigues INPE São José dos Campos 1993 SECRETARIA

More information

CHAPTER 4: REIMBURSEMENT STRATEGIES 24

CHAPTER 4: REIMBURSEMENT STRATEGIES 24 CHAPTER 4: REIMBURSEMENT STRATEGIES 24 INTRODUCTION Once state level policymakers have decided to implement and pay for CSR, one issue they face is simply how to calculate the reimbursements to districts

More information

Major Milestones, Team Activities, and Individual Deliverables

Major Milestones, Team Activities, and Individual Deliverables Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering

More information

CS Machine Learning

CS Machine Learning CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing

More information

Human Emotion Recognition From Speech

Human Emotion Recognition From Speech RESEARCH ARTICLE OPEN ACCESS Human Emotion Recognition From Speech Miss. Aparna P. Wanare*, Prof. Shankar N. Dandare *(Department of Electronics & Telecommunication Engineering, Sant Gadge Baba Amravati

More information

USER ADAPTATION IN E-LEARNING ENVIRONMENTS

USER ADAPTATION IN E-LEARNING ENVIRONMENTS USER ADAPTATION IN E-LEARNING ENVIRONMENTS Paraskevi Tzouveli Image, Video and Multimedia Systems Laboratory School of Electrical and Computer Engineering National Technical University of Athens tpar@image.

More information

arxiv: v1 [cs.lg] 15 Jun 2015

arxiv: v1 [cs.lg] 15 Jun 2015 Dual Memory Architectures for Fast Deep Learning of Stream Data via an Online-Incremental-Transfer Strategy arxiv:1506.04477v1 [cs.lg] 15 Jun 2015 Sang-Woo Lee Min-Oh Heo School of Computer Science and

More information

A Reinforcement Learning Variant for Control Scheduling

A Reinforcement Learning Variant for Control Scheduling A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement

More information

Discriminative Learning of Beam-Search Heuristics for Planning

Discriminative Learning of Beam-Search Heuristics for Planning Discriminative Learning of Beam-Search Heuristics for Planning Yuehua Xu School of EECS Oregon State University Corvallis,OR 97331 xuyu@eecs.oregonstate.edu Alan Fern School of EECS Oregon State University

More information

Radius STEM Readiness TM

Radius STEM Readiness TM Curriculum Guide Radius STEM Readiness TM While today s teens are surrounded by technology, we face a stark and imminent shortage of graduates pursuing careers in Science, Technology, Engineering, and

More information

Lecture 1: Basic Concepts of Machine Learning

Lecture 1: Basic Concepts of Machine Learning Lecture 1: Basic Concepts of Machine Learning Cognitive Systems - Machine Learning Ute Schmid (lecture) Johannes Rabold (practice) Based on slides prepared March 2005 by Maximilian Röglinger, updated 2010

More information

BMBF Project ROBUKOM: Robust Communication Networks

BMBF Project ROBUKOM: Robust Communication Networks BMBF Project ROBUKOM: Robust Communication Networks Arie M.C.A. Koster Christoph Helmberg Andreas Bley Martin Grötschel Thomas Bauschert supported by BMBF grant 03MS616A: ROBUKOM Robust Communication Networks,

More information

MYCIN. The MYCIN Task

MYCIN. The MYCIN Task MYCIN Developed at Stanford University in 1972 Regarded as the first true expert system Assists physicians in the treatment of blood infections Many revisions and extensions over the years The MYCIN Task

More information

Calibration of Confidence Measures in Speech Recognition

Calibration of Confidence Measures in Speech Recognition Submitted to IEEE Trans on Audio, Speech, and Language, July 2010 1 Calibration of Confidence Measures in Speech Recognition Dong Yu, Senior Member, IEEE, Jinyu Li, Member, IEEE, Li Deng, Fellow, IEEE

More information

Mining Association Rules in Student s Assessment Data

Mining Association Rules in Student s Assessment Data www.ijcsi.org 211 Mining Association Rules in Student s Assessment Data Dr. Varun Kumar 1, Anupama Chadha 2 1 Department of Computer Science and Engineering, MVN University Palwal, Haryana, India 2 Anupama

More information

Artificial Neural Networks

Artificial Neural Networks Artificial Neural Networks Andres Chavez Math 382/L T/Th 2:00-3:40 April 13, 2010 Chavez2 Abstract The main interest of this paper is Artificial Neural Networks (ANNs). A brief history of the development

More information

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Email Marilyn A. Walker Jeanne C. Fromer Shrikanth Narayanan walker@research.att.com jeannie@ai.mit.edu shri@research.att.com

More information

Proposal of Pattern Recognition as a necessary and sufficient principle to Cognitive Science

Proposal of Pattern Recognition as a necessary and sufficient principle to Cognitive Science Proposal of Pattern Recognition as a necessary and sufficient principle to Cognitive Science Gilberto de Paiva Sao Paulo Brazil (May 2011) gilbertodpaiva@gmail.com Abstract. Despite the prevalence of the

More information

Truth Inference in Crowdsourcing: Is the Problem Solved?

Truth Inference in Crowdsourcing: Is the Problem Solved? Truth Inference in Crowdsourcing: Is the Problem Solved? Yudian Zheng, Guoliang Li #, Yuanbing Li #, Caihua Shan, Reynold Cheng # Department of Computer Science, Tsinghua University Department of Computer

More information

A student diagnosing and evaluation system for laboratory-based academic exercises

A student diagnosing and evaluation system for laboratory-based academic exercises A student diagnosing and evaluation system for laboratory-based academic exercises Maria Samarakou, Emmanouil Fylladitakis and Pantelis Prentakis Technological Educational Institute (T.E.I.) of Athens

More information

Emergent Narrative As A Novel Framework For Massively Collaborative Authoring

Emergent Narrative As A Novel Framework For Massively Collaborative Authoring Emergent Narrative As A Novel Framework For Massively Collaborative Authoring Michael Kriegel and Ruth Aylett School of Mathematical and Computer Sciences, Heriot Watt University, Edinburgh, EH14 4AS,

More information

Generative models and adversarial training

Generative models and adversarial training Day 4 Lecture 1 Generative models and adversarial training Kevin McGuinness kevin.mcguinness@dcu.ie Research Fellow Insight Centre for Data Analytics Dublin City University What is a generative model?

More information

Exploration. CS : Deep Reinforcement Learning Sergey Levine

Exploration. CS : Deep Reinforcement Learning Sergey Levine Exploration CS 294-112: Deep Reinforcement Learning Sergey Levine Class Notes 1. Homework 4 due on Wednesday 2. Project proposal feedback sent Today s Lecture 1. What is exploration? Why is it a problem?

More information

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF Read Online and Download Ebook ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF Click link bellow and free register to download

More information

Issues in the Mining of Heart Failure Datasets

Issues in the Mining of Heart Failure Datasets International Journal of Automation and Computing 11(2), April 2014, 162-179 DOI: 10.1007/s11633-014-0778-5 Issues in the Mining of Heart Failure Datasets Nongnuch Poolsawad 1 Lisa Moore 1 Chandrasekhar

More information

AQUA: An Ontology-Driven Question Answering System

AQUA: An Ontology-Driven Question Answering System AQUA: An Ontology-Driven Question Answering System Maria Vargas-Vera, Enrico Motta and John Domingue Knowledge Media Institute (KMI) The Open University, Walton Hall, Milton Keynes, MK7 6AA, United Kingdom.

More information

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS L. Descalço 1, Paula Carvalho 1, J.P. Cruz 1, Paula Oliveira 1, Dina Seabra 2 1 Departamento de Matemática, Universidade de Aveiro (PORTUGAL)

More information

Outreach Connect User Manual

Outreach Connect User Manual Outreach Connect A Product of CAA Software, Inc. Outreach Connect User Manual Church Growth Strategies Through Sunday School, Care Groups, & Outreach Involving Members, Guests, & Prospects PREPARED FOR:

More information

Linking Task: Identifying authors and book titles in verbose queries

Linking Task: Identifying authors and book titles in verbose queries Linking Task: Identifying authors and book titles in verbose queries Anaïs Ollagnier, Sébastien Fournier, and Patrice Bellot Aix-Marseille University, CNRS, ENSAM, University of Toulon, LSIS UMR 7296,

More information

Applications of data mining algorithms to analysis of medical data

Applications of data mining algorithms to analysis of medical data Master Thesis Software Engineering Thesis no: MSE-2007:20 August 2007 Applications of data mining algorithms to analysis of medical data Dariusz Matyja School of Engineering Blekinge Institute of Technology

More information

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC On Human Computer Interaction, HCI Dr. Saif al Zahir Electrical and Computer Engineering Department UBC Human Computer Interaction HCI HCI is the study of people, computer technology, and the ways these

More information

Speech Recognition at ICSI: Broadcast News and beyond

Speech Recognition at ICSI: Broadcast News and beyond Speech Recognition at ICSI: Broadcast News and beyond Dan Ellis International Computer Science Institute, Berkeley CA Outline 1 2 3 The DARPA Broadcast News task Aspects of ICSI

More information

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14)

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14) IAT 888: Metacreation Machines endowed with creative behavior Philippe Pasquier Office 565 (floor 14) pasquier@sfu.ca Outline of today's lecture A little bit about me A little bit about you What will that

More information

Modeling user preferences and norms in context-aware systems

Modeling user preferences and norms in context-aware systems Modeling user preferences and norms in context-aware systems Jonas Nilsson, Cecilia Lindmark Jonas Nilsson, Cecilia Lindmark VT 2016 Bachelor's thesis for Computer Science, 15 hp Supervisor: Juan Carlos

More information

Automating the E-learning Personalization

Automating the E-learning Personalization Automating the E-learning Personalization Fathi Essalmi 1, Leila Jemni Ben Ayed 1, Mohamed Jemni 1, Kinshuk 2, and Sabine Graf 2 1 The Research Laboratory of Technologies of Information and Communication

More information

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Stephan Gouws and GJ van Rooyen MIH Medialab, Stellenbosch University SOUTH AFRICA {stephan,gvrooyen}@ml.sun.ac.za

More information

Language Acquisition Fall 2010/Winter Lexical Categories. Afra Alishahi, Heiner Drenhaus

Language Acquisition Fall 2010/Winter Lexical Categories. Afra Alishahi, Heiner Drenhaus Language Acquisition Fall 2010/Winter 2011 Lexical Categories Afra Alishahi, Heiner Drenhaus Computational Linguistics and Phonetics Saarland University Children s Sensitivity to Lexical Categories Look,

More information

Bluetooth mlearning Applications for the Classroom of the Future

Bluetooth mlearning Applications for the Classroom of the Future Bluetooth mlearning Applications for the Classroom of the Future Tracey J. Mehigan Daniel C. Doolan Sabin Tabirca University College Cork, Ireland 2007 Overview Overview Introduction Mobile Learning Bluetooth

More information

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 11/2007, ISSN 1642-6037 Marek WIŚNIEWSKI *, Wiesława KUNISZYK-JÓŹKOWIAK *, Elżbieta SMOŁKA *, Waldemar SUSZYŃSKI * HMM, recognition, speech, disorders

More information

Impact of Cluster Validity Measures on Performance of Hybrid Models Based on K-means and Decision Trees

Impact of Cluster Validity Measures on Performance of Hybrid Models Based on K-means and Decision Trees Impact of Cluster Validity Measures on Performance of Hybrid Models Based on K-means and Decision Trees Mariusz Łapczy ski 1 and Bartłomiej Jefma ski 2 1 The Chair of Market Analysis and Marketing Research,

More information