• English
    • euskara
    • español
  • English 
    • English
    • euskara
    • español
  • Login
Search 
  •   BIRD Home
  • Data Science (DS)
  • Search
  •   BIRD Home
  • Data Science (DS)
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filtros

Use filtros para refinar sus resultados.

Now showing items 1-10 of 65

  • Opciones de clasificación:
  • Relevancia
  • Título Asc
  • Título Desc
  • Fecha Asc
  • Fecha Desc
  • Resultados por página:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Time Series Classifier Recommendation by a Meta-Learning Approach 

Abanda, A.Autoridad BCAM; Mori, U.; Lozano, J.A.Autoridad BCAM (2022-03-26)
This work addresses time series classifier recommendation for the first time in the literature by considering several recommendation forms or meta-targets: classifier accuracies, complete ranking, top-M ranking, best set ...
Thumbnail

EDA++: Estimation of Distribution Algorithms with Feasibility Conserving Mechanisms for Constrained Continuous Optimization 

Shirazi, A.Autoridad BCAM; Ceberio, J.; Lozano, J.A.Autoridad BCAM (2022-02-25)
Handling non-linear constraints in continuous optimization is challenging, and finding a feasible solution is usually a difficult task. In the past few decades, various techniques have been developed to deal with linear ...
Thumbnail

A Multivariate Time Series Streaming Classifier for Predicting Hard Drive Failures [Application Notes] 

Ircio, J.; Lojo, A.; Mori, U.; Lozano, J.A.Autoridad BCAM (2022)
Digital data storage systems such as hard drives can suffer breakdowns that cause the loss of stored data. Due to the cost of data and the damage that its loss entails, hard drive failure prediction is vital. In this ...
Thumbnail

Analysis of Dominant Classes in Universal Adversarial Perturbations 

Vadillo, J.; Santana, R.; Lozano, J.A.Autoridad BCAM (2022)
The reasons why Deep Neural Networks are susceptible to being fooled by adversarial examples remains an open discussion. Indeed, many differ- ent strategies can be employed to efficiently generate adversarial attacks, some ...
Thumbnail

A cheap feature selection approach for the K -means algorithm 

Capo, M.; Pérez, A.Autoridad BCAM; Lozano, J.A.Autoridad BCAM (2021-05)
The increase in the number of features that need to be analyzed in a wide variety of areas, such as genome sequencing, computer vision or sensor networks, represents a challenge for the K-means algorithm. In this regard, ...
Thumbnail

A Machine Learning Approach to Predict Healthcare Cost of Breast Cancer Patients 

Rakshit, P.; Zaballa-Larumbe, O.; Pérez, A.Autoridad BCAM; Gomez-Inhiesto, E.; Acaiturri-Ayesta, M.T.; Lozano, J.A.Autoridad BCAM (2021)
This paper presents a novel machine learning approach to per- form an early prediction of the healthcare cost of breast cancer patients. The learning phase of our prediction method considers the following two steps: i) in ...
Thumbnail

Delineation of site‐specific management zones using estimation of distribution algorithms 

Lozano, J.A.Autoridad BCAM; Velasco, J.; Vicencio, S.; Cid-García, N.M. (2021)
In this paper, we present a novel methodology to solve the problem of delineating homogeneous site-specific management zones (SSMZ) in agricultural fields. This problem consists of dividing the field into small regions for ...
Thumbnail

Water leak detection using self-supervised time series classification 

Blázquez-García, A.; Conde, A.; Mori, U.; Lozano, J.A.Autoridad BCAM (2021)
Leaks in water distribution networks cause a loss of water that needs to be com- pensated to ensure a continuous supply for all customers. This compensation is achieved by increasing the flow of the network, which entails ...
Thumbnail

Exploring Gaps in DeepFool inSearch of More Effective Adversarial Perturbations 

Vadillo, J.; Santana, R.; Lozano, J.A.Autoridad BCAM (2021)
Adversarial examples are inputs subtly perturbed to produce a wrong prediction in machine learning models, while remaining perceptually similar to the original input. To find adversarial examples, some attack strategies ...
Thumbnail

Analysis of the sensitivity of the End-Of-Turn Detection task to errors generated by the Automatic Speech Recognition process. 

Montenegro, C.; Santana, R.; Lozano, J.A.Autoridad BCAM (2021)
An End-Of-Turn Detection Module (EOTD-M) is an essential component of au- tomatic Spoken Dialogue Systems. The capability of correctly detecting whether a user’s utterance has ended or not improves the accuracy in interpreting ...
  • 1
  • 2
  • 3
  • 4
  • . . .
  • 7

DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
 

 

Browse

All of BIRDCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

My Account

Login

Descubre

Author
Lozano, J.A. (65)
Mendiburu, A. (14)Pérez, A. (13)Ceberio, J. (12)Santana, R. (11)Inza, I. (10)Mori, U. (8)Shirazi, A. (6)Roman, I. (5)Capo, M. (4)... másSubjectAerospace Engineering (5)Evolutionary Algorithm (5)Optimization (5)Spacecraft (5)K-means++ (3)Time series (3)time series (3)Adversarial examples (2)anomaly detection (2)Approximating probability distributions (2)... másFecha2022 (4)2021 (9)2020 (7)2019 (16)2018 (8)2017 (14)2016 (6)2015 (1)

DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback