Searched for: +
(1 - 20 of 330)

Pages

document
Van den Eijkel, G.C. (author)
doctoral thesis 1999
document
Juszczak, P. (author)
The thesis treats classification problems which are undersampled or where there exist an unbalance between classes in the sampling. The thesis is divided into three parts. The first two parts treat the problem of one-class classification. In the one-class classification problem, it is assumed that only examples of one of the classes, the target...
doctoral thesis 2006
document
Landgrebe, T.C.W. (author), Duin, R.P.W. (author)
Receiver operator characteristic (ROC) analysis has become a standard tool in the design and evaluation of two-class classification problems. It allows for an analysis that incorporates all possible priors, costs, and operating points, which is important in many real problems, where conditions are often nonideal. Extending this to the multiclass...
journal article 2008
document
Khoshelham, K. (author), Nardinocchi, C. (author)
This paper presents a learning Dempster-Shafer model for the detection of buildings in aerial image and range data. The process of evidence assignment in the Dempster-Shafer method is implemented through membership functions in an adaptive network-based fuzzy inference system, where a back propagation learning rule is employed to tune the...
conference paper 2009
document
Verwer, S.E. (author)
This thesis contains a study in a subfield of artificial intelligence, learning theory, machine learning, and statistics, known as system (or language) identification. System identification is concerned with constructing (mathematical) models from observations. Such a model is an intuitive description of a complex system. One of the main nice...
doctoral thesis 2010
document
Van Ast, J.M. (author)
The very basis of this thesis is the collective behavior of ants in colonies. Ants are an excellent example of how rather simple behavior on a local level can lead to complex behavior on a global level that is beneficial for the individuals. The key in the self-organization of ants is communication through pheromones. When an ant forages for...
doctoral thesis 2010
document
Clements, M. (author)
On many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making use of collaborative annotation methods. Next to an improved...
doctoral thesis 2010
document
Klijn, C.N. (author)
Cancer is a genetic disease. Step-wise alteration of genes that have a normal function in the cell can lead to the transformation of a healthy cell into a malignant cancer cell. Cancer genes provide several traits to the cell that allow it to become malignant. These traits have been researched for many years, and currently one knows quite well...
doctoral thesis 2011
document
De Vries, J.A. (author)
Cyber-attacks against companies and governments are seeing an increase in complexity and persistence. These more complex attacks are aimed at penetrating corporate and government networks to obtain classified information. Common intrusion detection methods lack in their ability to detect such complex attacks. A framework is proposed to relate...
master thesis 2012
document
Hendrikx, M.J.C. (author)
Automated negotiation agents are agents that interact in an environment for the settlement of a mutual concern. An important factor influencing the performance of a negotiation agent is how it takes the opponent into account. The main challenge in this aspect, is that opponents typically hide private information to avoid exploitation. In such a...
master thesis 2012
document
Van Tulder, G. (author)
Recent advances in importance-weighted active learning solve many of the problems of traditional active learning strategies. But does importance-weighted active learning also produce a reusable sample selection? This thesis explains why reusability can be a problem, how importance-weighted active learning removes some of the barriers to...
master thesis 2012
document
Giger, E. (author), Pinzger, M. (author), Gall, H.C. (author)
Preprint of paper published in: 9th IEEE Working Conference on Mining Software Repositories (MSR), 2-3 June 2012; doi:10.1109/MSR.2012.6224284 There exist many approaches that help in pointing developers to the change-prone parts of a software system. Although beneficial, they mostly fall short in providing details of these changes. Fine-grained...
report 2012
document
Li, Y. (author)
Scale is an important parameter of images. Different objects or image structures (e.g. edges and corners) can appear at different scales and each is meaningful only over a limited range of scales. Multi-scale analysis has been widely used in image processing and computer vision, serving as the basis for many high-level image analysis systems....
doctoral thesis 2013
document
Rudinac, S. (author)
To facilitate finding of relevant information in ever-growing multimedia collections, a number of multimedia information retrieval solutions have been proposed over the past years. The essential element of any such solution is the relevance criterion deployed to select or rank the items from a multimedia collection to be presented to the user....
doctoral thesis 2013
document
Spadaro, A. (author)
Rapidly evolving IT infrastructures bring beneficial effects to society and promote information sharing and use. However, vulnerabilities create opportunities for hostile users to perform malicious activities and IT security has gradually turned into a critical research area for organizations and governments. Processes of decision making in...
master thesis 2013
document
Li, Z. (author)
Authorship verification is one subfield of authorship analysis. However, the majority of the research in the field of authorship analysis is on the authorship identification problem. The authorship verification problem has received less attention than the authorship identification problem. Thus, there is a demand for a study on the authorship...
master thesis 2013
document
Poddighe, R. (author), Roos, N. (author)
In this paper, two alternative methods to the Inverse Kinematics problem are compared to traditional methods regarding computation time, accuracy, and convergence rate. The test domain is the arm of the NAO humanoid robot. The results show that FABRIK, a heuristic iterative approximation algorithm outperforms the two traditional methods, which...
conference paper 2013
document
Dentro, S.C. (author)
Next generation sequencing is brought into the clinic. Screening of disease associated genes will aid the diagnosis of disorders with a genetic component. The diagnosis of cancer is of particular interest due to its variety and prevalence. The obtained mutations provide clues about underlying biological properties that could be used for...
master thesis 2013
document
Kayastha, N. (author), Solomatine, D.P. (author), Lal Shrestha, D. (author)
In the MLUE method (reported in Shrestha et al. [1, 2]) we run a hydrological model M for multiple realizations of parameters vectors (Monte Carlo simulations), and use this data to build a machine learning model V to predict uncertainty (quantiles) of the model M output. In this paper, for model V, we employ three machine learning techniques,...
conference paper 2014
document
Palachanis, D. (author)
Cell differentiation is a natural process occurring in all higher organisms, since the early fetal stage of life. It is, also, a part of disease – such as cancer – as the cell cycle becomes deregulated and cells behave differently compared to healthy ones. Differentiation occurs although the genome of all cells is identical across all cell types...
master thesis 2014
Searched for: +
(1 - 20 of 330)

Pages