Results for 'Kohonen algorithm'

993 found
Order:
  1.  15
    Building an Open Source Classifier for the Neonatal EEG Background: A Systematic Feature-Based Approach From Expert Scoring to Clinical Visualization.Saeed Montazeri Moghadam, Elana Pinchefsky, Ilse Tse, Viviana Marchi, Jukka Kohonen, Minna Kauppila, Manu Airaksinen, Karoliina Tapani, Päivi Nevalainen, Cecil Hahn, Emily W. Y. Tam, Nathan J. Stevenson & Sampsa Vanhatalo - 2021 - Frontiers in Human Neuroscience 15:675154.
    Neonatal brain monitoring in the neonatal intensive care units (NICU) requires a continuous review of the spontaneous cortical activity, i.e., the electroencephalograph (EEG) background activity. This needs development of bedside methods for an automated assessment of the EEG background activity. In this paper, we present development of the key components of a neonatal EEG background classifier, starting from the visual background scoring to classifier design, and finally to possible bedside visualization of the classifier results. A dataset with 13,200 5-minute EEG (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  31
    Winner‐relaxing and winner‐enhancing Kohonen maps: Maximal mutual information from enhancing the winner.Jens Christian Claussen - 2003 - Complexity 8 (4):15-22.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  43
    Analyzing Outcomes of Intrauterine Insemination Treatment by Application of Cluster Analysis or Kohonen Neural Networks.Anna Justyna Milewska, Dorota Jankowska, Urszula Cwalina, Teresa Więsak, Dorota Citko, Allen Morgan & Robert Milewski - 2013 - Studies in Logic, Grammar and Rhetoric 35 (1):7-25.
    Intrauterine insemination is one of many treatments provided to infertility patients. Many factors such as, but not limited to, quality of semen, the age of a woman, and reproductive hormone levels contribute to infertility. Therefore, the aim of our study is to establish a statistical probability concerning the prediction of which groups of patients have a very good or poor prognosis for pregnancy after IUI insemination. For that purpose, we compare the results of two analyses: Cluster Analysis and Kohonen (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  4.  15
    Adaptive Shadow and Highlight Invariant Colour Segmentation for Traffic Sign Recognition Based on Kohonen SOM.Al-Hasanat R. M. Bin Mumtaz & Hasan Fleyeh - 2011 - Journal of Intelligent Systems 20 (1):15-31.
    This paper describes an intelligent algorithm for traffic sign recognition which converges quickly, is accurate in its segmentation and adaptive in its behaviour. The proposed approach can segment images of traffic signs in different lighting and environmental conditions and in different countries. It is based on using Kohonen's Self-Organizing Maps as a clustering tool and it is developed for Intelligent Vehicle applications. The current approach does not need any prior training. Instead, a slight portion, which is about 1% (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  27
    Cascading SOFM and RBF Networks for Categorization and Indexing of Fly Ashes.C. N. Ravikumar, M. C. Nataraja & M. A. Jayaram - 2011 - Journal of Intelligent Systems 20 (1):61-77.
    The objective of this work is to categorize the available fly ashes in different parts of the world into distinct groups based on its compositional attributes. Kohonen's self-organizing feature map and radial basis function networks are applied in a cascading fashion for the classification of fly ashes in terms of its chemical parameters. The basic procedure of the methodology consists of three stages: apply self-organizing neural net to ascertain possible number of groups, delineate them and identify the group sensitive (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  44
    Classification system for serial criminal patterns.Kamal Dahbur & Thomas Muscarello - 2003 - Artificial Intelligence and Law 11 (4):251-269.
    The data mining field in computer science specializes in extracting implicit information that is distributed across the stored data records and/or exists as associations among groups of records. Criminal databases contain information on the crimes themselves, the offenders, the victims as well as the vehicles that were involved in the crime. Among these records lie groups of crimes that can be attributed to serial criminals who are responsible for multiple criminal offenses and usually exhibit patterns in their operations, by specializing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  17
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying network parameters during the attack. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. A Note on Factors Affecting the Position of Accusative Objects and Complements in Aelfric's Catholic Homilies I.Viljo Kohonen - 1976 - In Nils Erik Enkvist & Viljo Kohonen (eds.), Reports on text linguistics: approaches to word order. Åbo: [Åbo Akademi]. pp. 175--196.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  13
    Notes on neural computing and associative memory.Teuvo Kohonen - 1990 - In J. McGaugh, Jerry Weinberger & G. Lynch (eds.), Brain Organization and Memory: Cells, Systems, and Circuits. Guilford Press. pp. 323--337.
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  13
    Approaches to word order: reports on text linguistics.Nils Erik Enkvist & Viljo Kohonen (eds.) - 1982 - Åbo: Distribution, Tidningsbokhandeln.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Reports on text linguistics: approaches to word order.Nils Erik Enkvist & Viljo Kohonen (eds.) - 1976 - Åbo: [Åbo Akademi].
     
    Export citation  
     
    Bookmark  
  12.  50
    Rete: A fast algorithm for the many pattern/many object pattern match problem.Charles L. Forgy - 1982 - Artificial Intelligence 19 (1):17-37.
  13.  72
    People Prefer Moral Discretion to Algorithms: Algorithm Aversion Beyond Intransparency.Johanna Jauernig, Matthias Uhl & Gari Walkowitz - 2022 - Philosophy and Technology 35 (1):1-25.
    We explore aversion to the use of algorithms in moral decision-making. So far, this aversion has been explained mainly by the fear of opaque decisions that are potentially biased. Using incentivized experiments, we study which role the desire for human discretion in moral decision-making plays. This seems justified in light of evidence suggesting that people might not doubt the quality of algorithmic decisions, but still reject them. In our first study, we found that people prefer humans with decision-making discretion to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Contextual Vocabulary Acquisition: from Algorithm to Curriculum.Michael W. Kibby & William J. Rapaport - 2014 - In Michael W. Kibby & William J. Rapaport (eds.), Contextual Vocabulary Acquisition: from Algorithm to Curriculum. pp. 107-150.
    Deliberate contextual vocabulary acquisition (CVA) is a reader’s ability to figure out a (not the) meaning for an unknown word from its “context”, without external sources of help such as dictionaries or people. The appropriate context for such CVA is the “belief-revised integration” of the reader’s prior knowledge with the reader’s “internalization” of the text. We discuss unwarranted assumptions behind some classic objections to CVA, and present and defend a computational theory of CVA that we have adapted to a new (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15.  1
    A min-flow algorithm for Minimal Critical Set detection in Resource Constrained Project Scheduling.Michele Lombardi & Michela Milano - 2012 - Artificial Intelligence 182-183 (C):58-67.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  66
    A learning algorithm for boltzmann machines.David H. Ackley, Geoffrey E. Hinton & Terrence J. Sejnowski - 1985 - Cognitive Science 9 (1):147-169.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   218 citations  
  17.  18
    A minimax algorithm better than alpha-beta?G. C. Stockman - 1979 - Artificial Intelligence 12 (2):179-196.
  18.  20
    Hybrid harmony search algorithm and fuzzy mechanism for solving congestion management problem in an electricity market.Aref Jalili & Noradin Ghadimi - 2016 - Complexity 21 (S1):90-98.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Democratizing Algorithmic Fairness.Pak-Hang Wong - 2020 - Philosophy and Technology 33 (2):225-244.
    Algorithms can now identify patterns and correlations in the (big) datasets, and predict outcomes based on those identified patterns and correlations with the use of machine learning techniques and big data, decisions can then be made by algorithms themselves in accordance with the predicted outcomes. Yet, algorithms can inherit questionable values from the datasets and acquire biases in the course of (machine) learning, and automated algorithmic decision-making makes it more difficult for people to see algorithms as biased. While researchers have (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  20.  9
    An admissible and optimal algorithm for searching AND/OR graphs.C. L. Chang & J. R. Slagle - 1971 - Artificial Intelligence 2 (2):117-128.
  21.  7
    The B∗ tree search algorithm—New results.Andrew J. Palay - 1982 - Artificial Intelligence 19 (2):145-163.
  22.  14
    An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator.Ashish Jain & Narendra S. Chaudhari - 2017 - Complexity:1-17.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  9
    A minimax algorithm better than alpha-beta? Yes and No.Igor Roizen & Judea Pearl - 1983 - Artificial Intelligence 21 (1-2):199-220.
  24.  7
    A heuristic search algorithm with modifiable estimate.László Mérõ - 1984 - Artificial Intelligence 23 (1):13-27.
  25.  9
    A generic arc-consistency algorithm and its specializations.Pascal Van Hentenryck, Yves Deville & Choh-Man Teng - 1992 - Artificial Intelligence 57 (2-3):291-321.
  26.  25
    On the Composition of Force: Algorithm and Experiment.R. Lopes Coelho - 2021 - Axiomathes 31 (2):199-210.
    Philosophers have disagreed on the composition of force for decades. The main divergence concerns the fundamental question: given a certain motion that is observable, which force or forces are present in it, component or resultant forces? The present paper focuses on the conditions for dealing with this problem. I will argue that we are not able to infer force from the observation of a motion, as required by the problem. I will further argue that the validity of the Newtonian (...) is not a sufficient condition for that inference because the Gaussian algorithm, which is equally valid, differs from the former with regard to the forces present in motions. Under these circumstances, I will make recourse to an experiment available in physics in which the force present in a motion is measured. Thus, we obtain a numerical value for this force. This result, playing the role of a counterexample, clarifies the composition of force issue significantly. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  29
    Reflections on art, nature and technology: The role of technology, algorithm, nature, psyche and imagination in the aspiration of an aesthetic experience.Paola Lopreiato - 2014 - Technoetic Arts 12 (2):423-428.
    There is something frustrating in the concept of algorithm that can even worry: its limitations. An algorithm does not need the time to define itself, it possesses in its structure everything that defines it and can work exclusively in a site, such as a computer, which is itself another finite system. Whenever a particular algorithm will be executed it will always be inexorably equal to itself because the number of possible states is finite. A logical­mathematical algorithm (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  38
    Algorithms Don’t Have A Future: On the Relation of Judgement and Calculation.Daniel Stader - 2024 - Philosophy and Technology 37 (1):1-29.
    This paper is about the opposite of judgement and calculation. This opposition has been a traditional anchor of critiques concerned with the rise of AI decision making over human judgement. Contrary to these approaches, it is argued that human judgement is not and cannot be replaced by calculation, but that it is human judgement that contextualises computational structures and gives them meaning and purpose. The article focuses on the epistemic structure of algorithms and artificial neural networks to find that they (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  8
    WPM3: An (in)complete algorithm for weighted partial MaxSAT.Carlos Ansótegui & Joel Gabàs - 2017 - Artificial Intelligence 250 (C):37-57.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. A potential theory approach to an algorithm of conceptual space partitioning.Roman Urban & Magdalena Grzelińska - 2017 - Cognitive Science 17:1-10.
    This paper proposes a new classification algorithm for the partitioning of a conceptual space. All the algorithms which have been used until now have mostly been based on the theory of Voronoi diagrams. This paper proposes an approach based on potential theory, with the criteria for measuring similarities between objects in the conceptual space being based on the Newtonian potential function. The notion of a fuzzy prototype, which generalizes the previous definition of a prototype, is introduced. Furthermore, the necessary (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  33
    Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation.Qiuzhen Lin, Xiaozhou Wang, Bishan Hu, Lijia Ma, Fei Chen, Jianqiang Li & Carlos A. Coello Coello - 2018 - Complexity 2018:1-18.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  30
    The general algorithm for adaptation in learning, evolution, and perception.Donald T. Campbell - 1983 - Behavioral and Brain Sciences 6 (1):178-179.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  10
    A predictive evolutionary algorithm for dynamic constrained inverse kinematics problems.Patryk Filipiak, Krzysztof Michalak & Piotr Lipinski - 2012 - In Emilio Corchado, Vaclav Snasel, Ajith Abraham, Michał Woźniak, Manuel Grana & Sung-Bae Cho (eds.), Hybrid Artificial Intelligent Systems. Springer. pp. 610--621.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Evolution of communication with a spatialized genetic algorithm.Patrick Grim - manuscript
    We extend previous work by modeling evolution of communication using a spatialized genetic algorithm which recombines strategies purely locally. Here cellular automata are used as a spatialized environment in which individuals gain points by capturing drifting food items and are 'harmed' if they fail to hide from migrating predators. Our individuals are capable of making one of two arbitrary sounds, heard only locally by their immediate neighbors. They can respond to sounds from their neighbors by opening their mouths or (...)
     
    Export citation  
     
    Bookmark   7 citations  
  35. Neutrosophic Treatment of Duality Linear Models and the Binary Simplex Algorithm.Maissam Jdid & Florentin Smarandache - 2023 - Prospects for Applied Mathematics and Data Analysis 2 (1).
    One of the most important theories in linear programming is the dualistic theory and its basic idea is that for every linear model has dual linear model, so that solving the original linear model gives a solution to the dual model. Therefore, when we solving the linear programming model, we actually obtain solutions for two linear models. In this research, we present a study of the models. The neutrosophic dual and the binary simplex algorithm, which works to find the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  23
    Research on QR image code recognition system based on artificial intelligence algorithm.Pljonkin Anton Pavlovich, Pradeep Kumar Singh, Jianxing Zhu & Lina Huo - 2021 - Journal of Intelligent Systems 30 (1):855-867.
    The QR code recognition often faces the challenges of uneven background fluctuations, inadequate illuminations, and distortions due to the improper image acquisition method. This makes the identification of QR codes difficult, and therefore, to deal with this problem, artificial intelligence-based systems came into existence. To improve the recognition rate of QR image codes, this article adopts an improved adaptive median filter algorithm and a QR code distortion correction method based on backpropagation (BP) neural networks. This combination of artificial intelligence (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  54
    The application of neural network algorithm and embedded system in computer distance teach system.Qin Qiu - 2022 - Journal of Intelligent Systems 31 (1):148-158.
    The computer distance teaching system teaches through the network, and there is no entrance threshold. Any student who is willing to study can log in to the network computer distance teaching system for study at any free time. Neural network has a strong self-learning ability and is an important part of artificial intelligence research. Based on this study, a neural network-embedded architecture based on shared memory and bus structure is proposed. By looking for an alternative method of exp function to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  33
    The Open Algorithm Based on Numbers Method: An Effective Instructional Approach to Domain-Specific Precursors of Arithmetic Development.Gamal Cerda, Estíbaliz Aragón, Carlos Pérez, José I. Navarro & Manuel Aguilar - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. A Hybrid Fuzzy Wavelet Neural Network Model with Self-Adapted Fuzzy c-Means Clustering and Genetic Algorithm for Water Quality Prediction in Rivers.Mingzhi Huang, Hongbin di TianLiu, Chao Zhang, Xiaohui Yi, Jiannan Cai, Jujun Ruan, Tao Zhang, Shaofei Kong & Guangguo Ying - 2018 - Complexity 2018:1-11.
    Water quality prediction is the basis of water environmental planning, evaluation, and management. In this work, a novel intelligent prediction model based on the fuzzy wavelet neural network including the neural network, the fuzzy logic, the wavelet transform, and the genetic algorithm was proposed to simulate the nonlinearity of water quality parameters and water quality predictions. A self-adapted fuzzy c-means clustering was used to determine the number of fuzzy rules. A hybrid learning algorithm based on a genetic (...) and gradient descent algorithm was employed to optimize the network parameters. Comparisons were made between the proposed FWNN model and the fuzzy neural network, the wavelet neural network, and the neural network. The results indicate that the FWNN made effective use of the self-adaptability of NN, the uncertainty capacity of FL, and the partial analysis ability of WT, so it could handle the fluctuation and the nonseasonal time series data of water quality, while exhibiting higher estimation accuracy and better robustness and achieving better performances for predicting water quality with high determination coefficients R2 over 0.90. The FWNN is feasible and reliable for simulating and predicting water quality in river. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  7
    A hybrid exact algorithm for complete set partitioning.Tomasz Michalak, Talal Rahwan, Edith Elkind, Michael Wooldridge & Nicholas R. Jennings - 2016 - Artificial Intelligence 230 (C):14-50.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  10
    Seeing Like a State, Enacting Like an Algorithm: (Re)assembling Contact Tracing and Risk Assessment during the COVID-19 Pandemic.Chuncheng Liu - 2022 - Science, Technology, and Human Values 47 (4):698-725.
    As states increasingly use algorithms to improve the legibility of society, particularly during the COVID-19 pandemic, it is common for concerns about the expanding power of the algorithm or the state to be raised in a deterministic manner. However, how are the algorithms for states’ legibility projects enacted, contested, and reconfigured? Drawing on interviews and media data, this study fills this gap by examining Health Code, the Chinese contact tracing and risk assessment algorithmic system that serves as the COVID-19 (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  5
    An incremental algorithm for generating all minimal models.Rachel Ben-Eliyahu – Zohary - 2005 - Artificial Intelligence 169 (1):1-22.
  43.  7
    A complete anytime algorithm for number partitioning.Richard E. Korf - 1998 - Artificial Intelligence 106 (2):181-203.
  44.  13
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  17
    Optimization of Teaching Management System Based on Association Rules Algorithm.Qing Niu - 2021 - Complexity 2021:1-13.
    The teaching management department carries all the work related to teaching in the whole school. A scientific, efficient, and complete teaching management system cannot only help the teaching management department improve work efficiency and quality but also greatly reduce many problems caused by manual labour risk. This paper designs and implements a teaching management system based on an improved association rule algorithm. First, aiming at the low efficiency of the Apriori algorithm for mining association rules, an association rule (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  6
    Deep Belief Network-Based Multifeature Fusion Music Classification Algorithm and Simulation.Tianzhuo Gong - 2021 - Complexity 2021:1-10.
    In this paper, the multifeature fusion music classification algorithm and its simulation results are studied by deep confidence networks, the multifeature fusion music database is established and preprocessed, and then features are extracted. The simulation is carried out using multifeature fusion music data. The multifeature fusion music preprocessing includes endpoint detection, framing, windowing, and pre-emphasis. In this paper, we extracted the rhythm features, sound quality features, and spectral features, including energy, cross-zero rate, fundamental frequency, harmonic noise ratio, and 12 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  24
    The validation of a clinical algorithm for the prevention and management of pulmonary dysfunction in intubated adults: A synthesis of evidence and expert opinion.Susan Hanekom, Sue Berney, Brenda Morrow, George Ntoumenopoulos, Jennifer Paratz, Shane Patman & Quinette Louw - 2011 - Journal of Evaluation in Clinical Practice 17 (4):801-810.
  48.  24
    The Q∗ algorithm—a search strategy for a deductive question-answering system.Jack Minker, Daniel H. Fishman & James R. McSkimin - 1973 - Artificial Intelligence 4 (3-4):225-243.
  49.  55
    A Decomposition-Based Multiobjective Evolutionary Algorithm with Adaptive Weight Adjustment.Cai Dai & Xiujuan Lei - 2018 - Complexity 2018:1-20.
    Recently, decomposition-based multiobjective evolutionary algorithms have good performances in the field of multiobjective optimization problems and have been paid attention by many scholars. Generally, a MOP is decomposed into a number of subproblems through a set of weight vectors with good uniformly and aggregate functions. The main role of weight vectors is to ensure the diversity and convergence of obtained solutions. However, these algorithms with uniformity of weight vectors cannot obtain a set of solutions with good diversity on some MOPs (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  13
    An optimal backtrack algorithm for tree-structured constraint satisfaction problems.Roberto J. Bayardo & Daniel P. Miranker - 1994 - Artificial Intelligence 71 (1):159-181.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 993