• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
A Study on Swarm Intelligence Techniques in Intrusion Detection
A Study on Swarm Intelligence Techniques in Intrusion Detection

... Among the discovered rules the best one is selected and augmented to the discovered rules. This is done iteratively until a large base of rules is constructed which can be later on used in test sets as criteria for classifying network connections into intrusive or normal. The experimental results sh ...
CSE 5290: Artificial Intelligence
CSE 5290: Artificial Intelligence

... derived from simple propositions elicited in session 1. LES represents the likelihood with three modalities, probability, certainty factors, and natural languages. The subjects are chose from Oak Ridge National Laboratory and University of Tennessee, Knoxville. The proposition are from three fields, ...
Beyond AI: Artificial Dreams
Beyond AI: Artificial Dreams

... The contrast between desires and dummy-desires cannot be translated into matter of competing desires. The same goes for reducing it into other distinctions such as e.g., first-order and second-order desires, goals and subgoals, etc. Dummy-desires are not weaker versions of desires; dummy-desires are ...
NRC 39221
NRC 39221

A Two-Phase Approach Towards Identifying Argument Structure in
A Two-Phase Approach Towards Identifying Argument Structure in

Recognising Affect in Text using Pointwise
Recognising Affect in Text using Pointwise

... Research in the area of affect recognition in text is currently rooted in the exploitation of human-supplied knowledge of emotion. Since the nature of affect is inherently ambiguous (both in terms of the affect classes and the natural language words that represent them), some researchers have electe ...
Computational Intelligence in Intrusion Detection System
Computational Intelligence in Intrusion Detection System

... proposed NID models shows the models advantages of enhancing the detection accuracy and testing speed by reducing the feature dimension space. Also, it propose and validate a new feature selection approach ”Bi-Layer behavioral-based feature selection approach”, which depends on the behavior of the c ...
A Stochastic Algorithm for Feature Selection in Pattern Recognition
A Stochastic Algorithm for Feature Selection in Pattern Recognition

... discriminant properties . In a recent work of Fleuret (2004), the author suggests to use mutual information to recursively select features and obtain performance as good as that obtained with a boosting algorithm (Friedman et al., 2000) with fewer variables. Weston et al. (2000) and Chapelle et al. ...
Knowledge Based System and Database Management System: An
Knowledge Based System and Database Management System: An

... Hierarchical and network models are frequently considered as a single class of data models since they are based on similar modeling concepts (King & McLeod, 1985). Also, there is very little research in the KBMS field relating to these two models to actually differentiate them. Hence, we have chosen ...
The Twins Corpus of Museum Visitor Questions
The Twins Corpus of Museum Visitor Questions

... mispronunciations, and repetitions. 2. Speech is coming mainly from children. 3. There are no vocabulary constraints. The above characteristics make the corpus an ideal testbed for speech recognition research. Automatic recognition of the handlers’ speech using speaker-adapted models is significantl ...
Impossibles AIBO Four-Legged Team Description Paper
Impossibles AIBO Four-Legged Team Description Paper

... 4-legged league, agents have to have interactions with several physical objects, e.g. the orange ball. This interaction is typically implemented as a perception-action loop. AIBO Robots are equipped with sensors that perceive physical characteristics of the environment and they use these percepts to ...
Intelligent Virtual Environments - A State-of-the
Intelligent Virtual Environments - A State-of-the

Handwritten Gregg Shorthand Recognition
Handwritten Gregg Shorthand Recognition

A hybrid case-based reasoning and neural network approach to
A hybrid case-based reasoning and neural network approach to

... related applications [1]. Traditionally, case-based reasoning (CBR) [2-9] has been successfully applied to fault diagnosis for customer service support or help desk. CBR systems rely on building a large repository of diagnostic cases (or past service reports) in order to circumvent the difficult tas ...
CS437
CS437

... solve it and fail in rather unpredictable ways. n Heuristic rules represent knowledge in abstract form and lack even basic understanding of the domain area. It makes the task of identifying incorrect, incomplete or inconsistent knowledge difficult. n Expert systems, especially the first generation, ...
Advanced Research into AI Ising Computer (PDF format, 212KB)
Advanced Research into AI Ising Computer (PDF format, 212KB)

... obtain a roughly optimal combination of parameters. Unfortunately, as the number of parameters increases, finding even an approximate solution becomes difficult. Furthermore, semiconductor scaling has enabled the computational methods used in the past to deal with larger problems by improving the pe ...
Computational Intelligence: Neural Networks and
Computational Intelligence: Neural Networks and

... ANN [15]. First, it can perform more complex tasks than any of its components (i.e., individual ANNs in the ensemble). Second, it can make the overall system easier to understand and modify. Finally, it is more robust than a monolithic ANN, and can show graceful performance degradation in situations ...
Aalborg Universitet The Meaning of Action
Aalborg Universitet The Meaning of Action

A New Feature Selection Method Based on Ant Colony and
A New Feature Selection Method Based on Ant Colony and

A Review of Class Imbalance Problem
A Review of Class Imbalance Problem

... and data mining. It aims to select important features that improve the accuracy and performance of the classifier. High dimensional data and irrelevant features may reduce the performance of the classifier and increase the misclassification rate especially in imbalance data sets [4], [5]. Feature se ...
Intelligent User Interfaces for Ubiquitous Computing
Intelligent User Interfaces for Ubiquitous Computing

... goals, e.g., being an understandable and enjoyable assistant for some user task, we do not need any system but can make up a fake system without bothering with how to build a real one. A number of methods can be used (Dix et al., 1998; Shneiderman, 1997): Design sketches: Instead of actually buildin ...
New Trends in Intelligent Systems and Soft Computing Towards and
New Trends in Intelligent Systems and Soft Computing Towards and

... interactions and “bouncing ideas” off other people. Seminar on New Trends in Intelligent Systems and Soft Computing October 2-3.2003, Granada, Spain ...
A Review for Detecting Gene-Gene Interactions using Machine
A Review for Detecting Gene-Gene Interactions using Machine

PDF
PDF

... SIGCHI, its CHI conference, and the journals Human Computer Interaction, ACM Transactions on Computer-Human Interaction, and Interacting with Computers. Other threads of HCI research appear in human factors and ergonomics, management information systems, and information science. They are part of the ...
Artificial Intelligence in Network Intrusion Detection
Artificial Intelligence in Network Intrusion Detection

... and/or software. It is an academic field of study which studies the goal of creating intelligence. The central problems (or goals) of AI research include reasoning, knowledge representation, automated planning and scheduling, ML, natural language processing, computer vision, robotics and general int ...
< 1 2 3 4 5 6 7 ... 17 >

Affective computing

Affective Computing is also the title of a textbook on the subject by Rosalind Picard.Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field spanning computer science, psychology, and cognitive science. While the origins of the field may be traced as far back as to early philosophical enquiries into emotion, the more modern branch of computer science originated with Rosalind Picard's 1995 paper on affective computing. A motivation for the research is the ability to simulate empathy. The machine should interpret the emotional state of humans and adapt its behaviour to them, giving an appropriate response for those emotions.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report