253,857 research outputs found

    Withdrawal ruptures in adolescents with borderline personality disorder psychotherapy are marked by increased speech pauses-can minimal responses be automatically detected?

    Get PDF
    Alliance ruptures of the withdrawal type are prevalent in adolescents with borderline personality disorder (BPD). Longer speech pauses are negatively perceived by these patients. Safran and Muran's rupture model is promising but its application is very work intensive. This workload makes research costly and limits clinical usage. We hypothesised that pauses can be used to automatically detect one of the markers of the rupture model i.e. the minimal response marker. Additionally, the association of withdrawal ruptures with pauses was investigated. A total of 516 ruptures occurring in 242 psychotherapy sessions collected in 22 psychotherapies of adolescent patients with BPD and subthreshold BPD were investigated. Trained observers detected ruptures based on video and audio recordings. In contrast, pauses were automatically marked in the audio-recordings of the psychotherapy sessions and automatic speaker diarisation was used to determine the speaker-switching patterns in which the pauses occur. A random forest classifier detected time frames in which ruptures with the minimal response marker occurred based on the quantity of pauses. Performance was very good with an area under the ROC curve of 0.89. Pauses which were both preceded and followed by therapist speech were the most important predictors for minimal response ruptures. Research costs can be reduced by using machine learning techniques instead of manual rating for rupture detection. In combination with other video and audio derived features like movement analysis or automatic facial emotion detection, more complete rupture detection might be possible in the future. These innovative machine learning techniques help to narrow down the mechanisms of change of psychotherapy, here specifically of the therapeutic alliance. They might also be used to technologically augment psychotherapy training and supervision

    Detecting Concept Drift With Neural Network Model Uncertainty

    Get PDF
    Deployed machine learning models are confronted with the problem of changing data over time, a phenomenon also called concept drift. While existing approaches of concept drift detection already show convincing results, they require true labels as a prerequisite for successful drift detection. Especially in many real-world application scenarios-like the ones covered in this work-true labels are scarce, and their acquisition is expensive. Therefore, we introduce a new algorithm for drift detection, Uncertainty Drift Detection (UDD), which is able to detect drifts without access to true labels. Our approach is based on the uncertainty estimates provided by a deep neural network in combination with Monte Carlo Dropout. Structural changes over time are detected by applying the ADWIN technique on the uncertainty estimates, and detected drifts trigger a retraining of the prediction model. In contrast to input data-based drift detection, our approach considers the effects of the current input data on the properties of the prediction model rather than detecting change on the input data only (which can lead to unnecessary retrainings). We show that UDD outperforms other state-of-the-art strategies on two synthetic as well as ten real-world data sets for both regression and classification tasks

    Aplicación de las técnicas de Machine Learning para la detección en imágenes de monedas falsas y verdaderas de cinco soles

    Get PDF
    Conseguir desarrollar un modelo con técnicas de Machine Learning para la detección por imágenes en monedas falsas y verdaderas de cinco soles Peruanos El tipo de investigación en este proyecto definió como básico tecnológico con un nivel experimental y un diseño pre-experimental al usar como métrica porcentual derivada de la ma- triz de confusión. La población se constituyó de un total de 496 imágenes de monedas de cinco soles entre verdaderas y falsas teniendo las cuales pasaran por la técnica de Data Augmentation para tener 800 imágenes por cada categoría expedidas en el modelo 2010-2015 y como instrumento de recolección de datos utilizaremos una cámara fotografía. Como conclusión principal tenemos que el modelo “Final_Model” se desarrolló usando las técnicas de Machine Learning de manera teórica y práctica que conllevo a cumplir nuestro objetivo principal en esta investigación que es aplicar las técnicas de Machine Learning en la detección de monedas falsas y verdaderas de cinco soles Peruanos satisfactoriamente respondiendo al objetivo principal de la investigación.This research focuses on the application of Machine Learning techniques for the development of a model that allows the detection by images of false and true coins of five Peruvian soles. Since the invention of currency, counterfeiting was also born. It is necessary to make proposals for change in the aspects concerning the means of security in physical means of payment to protect the economic, social and political level. For its part, the field of Machine Learning has grown more intensely since 2009, being able to apply to more branches of study, our country is late in the use of Machine Learning techniques since we find a lack of studies and development of tools that apply Machine Learning being a problem to reach a solution in detection of false and true coins in the REPUBLIC OF PERU. Therefore, we propose the application of Machine Learning techniques to contribute to a future solution to this latent problem. This research proposed the construction of a model using the Transfer Learning technique to join a pre-trained model and a personalized head model that was trained with images of true and false coins from the year 2010-2015. Analyzing the learning curve of the model and using the confusion matrix, the average error of the predictions was obtained with an approximate error of 20% in a population of 1600 photographic samples between false and true coins.Desarrollo de aplicaciones usando inteligencia artificia

    Handling Concept Drift for Predictions in Business Process Mining

    Get PDF
    Predictive services nowadays play an important role across all business sectors. However, deployed machine learning models are challenged by changing data streams over time which is described as concept drift. Prediction quality of models can be largely influenced by this phenomenon. Therefore, concept drift is usually handled by retraining of the model. However, current research lacks a recommendation which data should be selected for the retraining of the machine learning model. Therefore, we systematically analyze different data selection strategies in this work. Subsequently, we instantiate our findings on a use case in process mining which is strongly affected by concept drift. We can show that we can improve accuracy from 0.5400 to 0.7010 with concept drift handling. Furthermore, we depict the effects of the different data selection strategies

    Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

    Full text link
    Machine learning based solutions have been successfully employed for automatic detection of malware in Android applications. However, machine learning models are known to lack robustness against inputs crafted by an adversary. So far, the adversarial examples can only deceive Android malware detectors that rely on syntactic features, and the perturbations can only be implemented by simply modifying Android manifest. While recent Android malware detectors rely more on semantic features from Dalvik bytecode rather than manifest, existing attacking/defending methods are no longer effective. In this paper, we introduce a new highly-effective attack that generates adversarial examples of Android malware and evades being detected by the current models. To this end, we propose a method of applying optimal perturbations onto Android APK using a substitute model. Based on the transferability concept, the perturbations that successfully deceive the substitute model are likely to deceive the original models as well. We develop an automated tool to generate the adversarial examples without human intervention to apply the attacks. In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph. The perturbations can also be implemented directly onto APK's Dalvik bytecode rather than Android manifest to evade from recent detectors. We evaluated the proposed manipulation methods for adversarial examples by using the same datasets that Drebin and MaMadroid (5879 malware samples) used. Our results show that, the malware detection rates decreased from 96% to 1% in MaMaDroid, and from 97% to 1% in Drebin, with just a small distortion generated by our adversarial examples manipulation method.Comment: 15 pages, 11 figure
    corecore