Shruti S. Nair, Madhumita Mohan, Jemima Rajesh, P. Chandran
{"title":"On Finding the Best Learning Model for Assessing Confidence in Speech","authors":"Shruti S. Nair, Madhumita Mohan, Jemima Rajesh, P. Chandran","doi":"10.1145/3426826.3426838","DOIUrl":"https://doi.org/10.1145/3426826.3426838","url":null,"abstract":"The human mind is naturally conditioned to assess the confidence of another speaker. Hence, confidence while speaking is crucial for success across most domains and situations. Confidence in speech is a highly useful trait to have when engaged in interactions and discussions. In the right amounts, it can often sound pleasant or reassuring to the listener. For a person striving to achieve a note of confidence in his/her voice, finding a human evaluator to give relevant feedback on the tone and voice is not always possible. Given the growing power of neural networks and other machine learning tools today, a machine could potentially serve as an evaluator for assessing the confidence in the user's speech, and provide scores as feedback for the user's improvement. In this paper, we present the descriptions, results and analysis of our experiments in predicting the confidence of a speaker using machine learning and audio processing tools. The project involved the building and scoring of an unbiased dataset of audio recordings based on the confidence of the speaker. The audio clips were recorded by the peers in the campus and graded based on clarity, modulation, pace, and volume. Three models were trained and tested on the built dataset: a multilayer perceptron (MLP) neural network, a support vector machine (SVM) and a convolutional neural network (CNN) to predict the confidence of a speaker. Our results show that convolutional neural networks produce scores with the highest accuracy, 86.3%, where accuracy is measured with respect to the closeness to the scores awarded by human assessment.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Wu, Jing-Min Dai, Ziling Wei, Xueqi Duan, Shih-Chieh Su
{"title":"Cooperation of Neural Networks for Spoken Digit Classification","authors":"Nan Wu, Jing-Min Dai, Ziling Wei, Xueqi Duan, Shih-Chieh Su","doi":"10.1145/3426826.3426830","DOIUrl":"https://doi.org/10.1145/3426826.3426830","url":null,"abstract":"Notably, all neural network models are trained by using gradient descent, and by far, the most successful approach for machine learning is to use gradient descent. However, this is a greedy algorithm and hits some of the biggest open problems in the neural networks. By using gradient descent, it is not guaranteed that a better solution cannot be found. Here, this article has presented an empirical study of the performance of two hidden layers’ neural networks. It gives practical methods to improve the accuracy of neural networks: cooperation method of neural network. In this study, our group applied the data augmentation method by adding noise into the training data set and compared 3 kinds of training methods: batch gradient descent (BGD), stochastic gradient descent (SGD), and batch stochastic gradient descent (BSGD). According to cooperating the neural networks, the performance of these neural networks has improved compared to baseline neural networks by 47% (PEG (generalization classification error probability) of 9 neural networks in cooperation is 0.071). Finally, the real-time classification using a cooperation method which has PEG equals 0.04 (single neural networks’ PEG is 0.104), further proves the results that cooperation improves the performance of neural networks.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stock Selection Strategy Based on Support Vector Machine","authors":"Runhuan Liu","doi":"10.1145/3426826.3426829","DOIUrl":"https://doi.org/10.1145/3426826.3426829","url":null,"abstract":"Stock traders nowadays attach increasing importance to artificial intelligence and machine learning techniques to construct better-performing stock portfolios. In this paper, a stock-selection model based on support vector machine (SVM) is applied to the data of selected technical indicators. Also, principal component analysis (PCA) is brought into the SVM model in order to cancel out the correlation and reduce the complexity of technical indicators. The model is carried out weekly on 12 years of historical data from 2008 to 2020, based on the component stocks of the Shanghai and Shenzhen 300 Index (CSI 300). Experimental results show that the annualized return yielded by our model reaches 14.5%, which significantly outperforms the return of the CSI 300. By comparing the results before and after employing PCA, the study suggests that PCA performs well when dealing with complex and non-linear data regarding investment securities, and PCA is especially beneficial for investments with relatively higher risk tolerance. It can be concluded that the proposed stock-selection model, which combines SVM with PCA, is of practical value for investors.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"127 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Neural Network Training Using Inverted Probability Distribution","authors":"Teerapaun Tanprasert, T. Tanprasert","doi":"10.1145/3426826.3426827","DOIUrl":"https://doi.org/10.1145/3426826.3426827","url":null,"abstract":"This paper presents strategies to tweak the probability distribution of the data set to bias the training process of a neural network for a better learning outcome. For a real-world problem, provided that the probability distribution of the population can be assumed, the training set can be sampled from the population in such a way that its probability distribution satisfies certain targeted characteristics. For example, if the boundary between classes is critical to the training outcome, a larger proportion of training data may be drawn from the area around the boundaries. On the other hand, if the learning outcome is aimed at resembling a common concept encoded in the training set, learning from the data near the norm may be more effective. In order to explore the effectiveness of the various strategies, the concept was applied to two problems: 3-spiral and wine quality. Experimental results suggest that, whether the problem requires an emphasis on classifying boundary or recognizing the central pattern, our novel sampling strategy – inverted probability distribution – performs exceptionally well.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning in Tourism","authors":"Fatemeh Afsahhosseini, Y. Al-Mulla","doi":"10.1145/3426826.3426837","DOIUrl":"https://doi.org/10.1145/3426826.3426837","url":null,"abstract":"Machine Learning is a subset of Artificial Intelligence, which is a process of learning from different types of data to make accurate predictions. Data in tourism is various such as Statistics, Photos, Maps, and Texts. Also, each tourism cycle has different stages: Pre, During, and After Trip. In this paper application of machine learning in tourism related data and trip stages are introduced in detailed.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123239453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuhao Peng, Houcheng Su, Chao Xu, Ao Feng, Tao Liu
{"title":"NDWI-DeepLabv3+: High-Precision Extraction of Water Bodies from Remote Sensing Images","authors":"Yuhao Peng, Houcheng Su, Chao Xu, Ao Feng, Tao Liu","doi":"10.1145/3426826.3426847","DOIUrl":"https://doi.org/10.1145/3426826.3426847","url":null,"abstract":"How to efficiently and accurately extract water bodies from remote sensing images is the focus of scholars' research. Current research often does not make full use of the unique multi-band data of remote sensing images. This paper proposes an improved NDWI-DeepLabv3+ network to improve the accuracy of water body extraction, especially from urban remote sensing images. We improve the network from two main aspects: multi-scale input and multi-band data feature fusion. And for the critical parts of the network, we put forward a variety of feasible solutions to compare and select the best. In the end, we chose to convert the feature map calculated by NDWI into an input adapted to the neural network, and at the same time, develop a parallel convolution structure to fuse and extract the band data features. We verify the effectiveness of this method by comparing other multi-scale architecture networks in the same period. The NDWI-DeepLabV3+ network proposed in this paper can extract water from the L2A level data of Sentinel-2, which can slightly increase the computational consumption and obtain better performance. It provides new ideas for intelligently extracting hydrological information from remote sensing images.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Li, Yuhu Nie, WenpengCui Cui, R. Liu, Zhe Zheng
{"title":"Power Transmission Line Foreign Object Detection based on Improved YOLOv3 and Deployed to the Chip","authors":"Jing Li, Yuhu Nie, WenpengCui Cui, R. Liu, Zhe Zheng","doi":"10.1145/3426826.3426845","DOIUrl":"https://doi.org/10.1145/3426826.3426845","url":null,"abstract":"The application of object detection is becoming more and more widely in various fields, including the power industry, of course. And YOLOv3 is one of the most popular algorithms in the field of object detection owing to its high performance and efficiency. However, the conventional YOLOv3 algorithm is still too heavy to deploy on mobile or embedded platforms. Consequently, this paper proposes a method to improve the YOLOv3 thus it can be easily deployed to embedded platforms without losing performance. First, substitutes the backbone of YOLOv3, i.e. Darknet53 for MobileNet, which has been proven to be a very efficiency framework for lightweight network. Second, there are numerous redundancies in the detection heads of YOLOv3 and will take a lot of time in the inference process, so we prune the detection heads to a dead-simple structure. Various experiments on our own Power Transmission Line datasets verify our method has state-of-the-art performance while can meet the requirements for deployment to the mobile platforms.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wavelet-Aided Stock Forecasting Model based on Ensembled Machine Learning","authors":"Yuanyuan Qu, Zhongkai Zhang, Zhiliang Qin","doi":"10.1145/3426826.3426834","DOIUrl":"https://doi.org/10.1145/3426826.3426834","url":null,"abstract":"The stock market is a barometer of a country's economic situation. The research on the stock market is always highly valued, and the prediction of short-term stock price trends is the focus of investors. The stock price data not only has time-domain correlation, but also has certain independence due to the influence of the market environment. In this study, we focus on predicting stock price movements through machine learning, which is a challenging task because there is a significant amount of noise and uncertainty in the information related to stock prices. Therefore, this paper utilizes wavelet transform and multi-step smoothing to denoise the data, obtain the multi-dimensional stock price feature vectors. Subsequently, we apply the LightGBM classification algorithm to predict the price trend in ten days. Experimental results show that the method proposed in this paper has noticeable advantages in the task of short-term stock price trend prediction.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Character-level Recurrent Neural Network for Text Classification Applied to Large Scale Chinese News Corpus","authors":"Xin Wu, Jiang He","doi":"10.1145/3426826.3426842","DOIUrl":"https://doi.org/10.1145/3426826.3426842","url":null,"abstract":"At present, most recurrent neural network models used in text classification are shallow models and have limited ability to express texts especially large scale texts. This paper conducts an empirical study on the use of character-level deep recurrent neural network (Char-RNN) for Chinese corpus text classification. Firstly, it uses character-level features as input, and then uses a multilayer recurrent neural network structure to complete feature extraction. The evaluations on THUCNews dataset that is large scale Chinese news corpus showed that our proposed model is able to reach 94.4% accuracy, which performs better than the traditional models such as LibSVM(A Library for Support Vector Machines),CBOW(Continuous Bag-of-Words),CWE(char-acter enhanced word embedding) and deep learning models such as recurrent neural network on large-scale Chinese text classification mission.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Secure Lightweight RFID Authentication Protocol","authors":"Famei He, Zhou Fang, Dong Wang, Qiuyun Wang, Yueyuan Hao, Xuren Wang","doi":"10.1145/3426826.3426850","DOIUrl":"https://doi.org/10.1145/3426826.3426850","url":null,"abstract":"In order to improve the computing performance and security of RFID authentication protocol, an improved lightweight RFID two-way authentication protocol is proposed. With the authorization of a small amount of additional information, the two-way authentication between the reader and the tag can be completed quickly, without the need to communicate with the backend server frequently, which avoids increasing the security risks and communication costs caused by additional communication. Compared with the existing RFID authentication protocol, the improved protocol has meet requirements of backward security, mutual authentication, synchronization and non-denial of service. The improved protocol is suitable to be deployed in mobile RFID environment and applied in low-cost RFID tags.","PeriodicalId":202857,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}