Unsupervised Learning Techniques
1,567 Followers
Recent papers in Unsupervised Learning Techniques
A method for maximizing mutual information between segment representations and the generated sequence of phonemes for unsupervised speech recognition using GAN for better control over the inclusion of unrelated textual information in the... more
This thesis provides a theoretical description of on-line unsupervised learning from high-dimensional data. In particular, the learning dynamics of the on-line Hebbian algorithm is studied for the following two popular statistical... more
The current body of literature lacks studies related to organizational managers' classification of systems thinking (ST) skills based on both their overall systemic tendency and the organizational ownership structure. The purpose of this... more
Stock worth measures have reliably pulled in the thought of various agents and authorities. Standard speculation holds that stock trades are sporadic in nature, and it is senseless to endeavour to envision them. Since various components... more
The area of predictive maintenance has taken a lot of prominence in the last couple of years due to various reasons. With new algorithms and methodologies growing across different learning methods, it has remained a challenge for... more
The objective of this paper is to discuss a state-of-the-art of methodology and algorithms for integrating fuzzy sets and neural networks in a unique framework for dealing with pattern recognition· problems, in particular classification... more
Machine learning is one of the most exciting technology& it gives the computer that makes it more similar to humans .It is actively being used today, perhaps in many more places than one would expect. Learning is a natural human behaviour... more
Thanks to more powerful hardware and a new generation of learning algorithms, artificial intelligence is supporting the automation of a number of tasks and activities that are changing the job landscape as much as they have impacted on... more
The ‘special sauce’ that makes machine learning so interesting and what captures our imagination is not the ability of the machine to behave according to what you have already taught it in terms of explicit inputs, it is the implicit... more
"This paper compares various approaches to argument structure. We start out presenting the lexical proposal that we want to defend in this paper. We then introduce phrasal proposals that are common in Construction Grammar. A historical... more
Scope of the book: This book focusses on the technical concepts of deep learning and its associated branch Neural Networks for the various dimensions of image processing applications. The proposed volume intends to bring together... more
The k-means algorithm is generally the most known and used clustering method. There are various extensions of k-means to be proposed in the literature. Although it is an unsupervised learning to clustering in pattern recognition and... more
This paper presents the corpus developed by the LIUM for Automatic Speech Recognition (ASR), based on the TED Talks. This corpus was built during the IWSLT 2011 Evaluation Campaign, and is composed of 118 hours of speech with its... more
Supervised and unsupervised seismic facies classification methods are slowly gaining popularity in hydrocarbon exploration and production workflows. Unsupervised clustering is data driven, unbiased by the interpreter beyond the choice of... more
For more than a century, the methods for data representation and the exploration of the intrinsic structures of data have developed remarkably and consist of supervised and unsupervised methods. However, recent years have witnessed the... more
The k-means clustering algorithm is the oldest and most known method in cluster analysis. It has been widely studied with various extensions and applied in a variety of substantive areas. Since internet, social network, and big data grow... more
The present article reviews work on morphological analysis, a subfield of computational linguistics. Special focus is given on statistical approach for morpheme segmentation. We delineate morphological analysis as a problem of persuading... more
Data analysis is a primal skill of human beings. Cluster analysis, primitive exploration of data based on little or no prior knowledge of the structure underlying it, consists of research developed across various disciplines. Artificial... more
Learning good representations is of crucial importance in deep learning. Mutual Information (MI) or similar measures of statistical dependence are promising tools for learning these representations in an unsupervised way. Even though the... more
i. Two paradoxes Paradigm Function Morphology (PFM), Construction Morphology (CxM), Amorphous morphology (A-morphM): There are no morphemes BUT there is morphology. (Inflectional) morphemes are listed as markings (exponents) without... more
Machine learning has become popular today as so many of its algorithms are now commonly used in different data science projects in various industries especially in the health care sector. It is imperative for researchers and medical... more
Abstrak Pemilihan jurusan bagi siswa merupakan langkah positif yang dilakukan untuk memfokuskan siswa sesuai dengan potensi yang dimiliki, hal ini dianggap penting karena dengan adanya jurusan, siswa diharapkan mampu mengembangkan... more
The learning dynamics of on-line independent component analysis is analysed in the limit of large data dimension. We study a simple Hebbian learning algorithm that can be used to separate out a small number of non-Gaussian components from... more
Automatic detection of gait events has primarily been confined to methods which require a heuristic or biometric determination of threshold values for each event, which are then stipulated as conditions while defining algorithms. This... more
Manufacturing industries have been on a steady path considering for new methods to achieve near-zero downtime to have flexibility in the manufacturing process and being economical. In the last decade with the availability of industrial... more
There are many situations where we need to separate data into clusters without any labels being provided. This is an example of Unsupervised learning. In this assignment we apply K-Means algorithm for unsupervised learning on the given... more
During the past decade, the size of 3D seismic data volumes and the number of seismic attributes have increased to the extent that it is difficult, if not impossible, for interpreters to examine every seismic line and time slice. To... more
Automatic detection of antonymy is an important task in Natural Language Processing (NLP) for Information Retrieval (IR), Ontology Learning (OL) and many other semantic applications. However, current unsupervised approaches to antonymy... more
Motivation: The genotype assignment problem consists of predicting, from the genotype of an individual , which of a known set of populations it originated from. The problem arises in a variety of contexts, including wildlife forensics,... more
The security challenge on IoT (Internet of Things) is one of the hottest and most relevant topics at the moment particularly the few security challenges. The Botnet is one of the security challenges that most impact for several purposes.... more
El estudio del comercio internacional es una de las áreas de investigación clásicas de las ciencias económicas. Su caracterización empírica, a la vez que se remonta en el tiempo, constituye hoy en día un espacio de aplicación para nuevas... more
The amount of data managed in many academic institutions has increased in recent years, particularly in all the research work done by undergraduate students, who simply use empirical techniques for keyword selection, forgetting existing... more
We consider the problem of stable region detection and segmentation of deformable shapes. We pursue this goal by determining a consensus segmentation from a heterogeneous ensemble of putative segmentations, which are generated by a... more
The volume of SMS messages sent on a daily basis globally has continued to grow significantly over the past years. Hence, mobile phones are becoming increasingly vulnerable to SMS spam messages, thereby exposing users to the risk of fraud... more