1,419 research outputs found
Pre-processing for Triangulation of Probabilistic Networks
The currently most efficient algorithm for inference with a probabilistic
network builds upon a triangulation of a network's graph. In this paper, we
show that pre-processing can help in finding good triangulations
forprobabilistic networks, that is, triangulations with a minimal maximum
clique size. We provide a set of rules for stepwise reducing a graph, without
losing optimality. This reduction allows us to solve the triangulation problem
on a smaller graph. From the smaller graph's triangulation, a triangulation of
the original graph is obtained by reversing the reduction steps. Our
experimental results show that the graphs of some well-known real-life
probabilistic networks can be triangulated optimally just by preprocessing; for
other networks, huge reductions in their graph's size are obtained.Comment: Appears in Proceedings of the Seventeenth Conference on Uncertainty
in Artificial Intelligence (UAI2001
Configuring Alarm System Based on Time to Arrive at Appointment
Generally, the present disclosure is directed to setting an alarm to alert a user based on an appointment. In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage one or more machine-learned models to predict a time to alert a user based on a user’s schedule and location
An extended depth-first search algorithm for optimal triangulation of Bayesian networks
The junction tree algorithm is currently the most popular algorithm for exact inference on Bayesian networks. To improve the time complexity of the junction tree algorithm, we need to find a triangulation with the optimal total table size. For this purpose, Ottosen and Vomlel have proposed a depth-first search (DFS) algorithm. They also introduced several techniques to improve the DFS algorithm, including dynamic clique maintenance and coalescing map pruning. Nevertheless, the efficiency and scalability of that algorithm leave much room for improvement. First, the dynamic clique maintenance allows to recompute some cliques. Second, in the worst case, the DFS algorithm explores the search space of all elimination orders, which has size n!, where n is the number of variables in the Bayesian network. To mitigate these problems, we propose an extended depth-first search (EDFS) algorithm. The new EDFS algorithm introduces the following two techniques as improvements to the DFS algorithm: (1) a new dynamic clique maintenance algorithm that computes only those cliques that contain a new edge, and (2) a new pruning rule, called pivot clique pruning. The new dynamic clique maintenance algorithm explores a smaller search space and runs faster than the Ottosen and Vomlel approach. This improvement can decrease the overhead cost of the DFS algorithm, and the pivot clique pruning reduces the size of the search space by a factor of O(n2). Our empirical results show that our proposed algorithm finds an optimal triangulation markedly faster than the state-of-the-art algorithm does
LIS: Localization based on an intelligent distributed fuzzy system applied to a WSN
The localization of the sensor nodes is a fundamental problem in wireless sensor networks.
There are a lot of different kinds of solutions in the literature. Some of them use external
devices like GPS, while others use special hardware or implicit parameters in wireless
communications.
In applications like wildlife localization in a natural environment, where the power available
and the weight are big restrictions, the use of hungry energy devices like GPS or hardware
that add extra weight like mobile directional antenna is not a good solution.
Due to these reasons it would be better to use the localization’s implicit characteristics in
communications, such as connectivity, number of hops or RSSI. The measurement related
to these parameters are currently integrated in most radio devices. These measurement
techniques are based on the beacons’ transmissions between the devices.
In the current study, a novel tracking distributed method, called LIS, for localization of
the sensor nodes using moving devices in a network of static nodes, which have no additional
hardware requirements is proposed.
The position is obtained with the combination of two algorithms; one based on a local
node using a fuzzy system to obtain a partial solution and the other based on a centralized
method which merges all the partial solutions. The centralized algorithm is based on the
calculation of the centroid of the partial solutions.
Advantages of using fuzzy system versus the classical Centroid Localization (CL)
algorithm without fuzzy preprocessing are compared with an ad hoc simulator made for
testing localization algorithms.
With this simulator, it is demonstrated that the proposed method obtains less localization
errors and better accuracy than the centroid algorithm.Junta de AndalucĂa P07-TIC-0247
Generating Travel Itineraries Based on Travel History of Similar Users
Generally, the present disclosure is directed to generating a travel itinerary for a user based on travel history of similar users. In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage one or more machine-learned models to generate a travel itinerary for a user based on travel history data from one or more users
Analysis and evaluation of Wi-Fi indoor positioning systems using smartphones
This paper attempts to analyze the main algorithms used in Machine Learning applied to the indoor location. New technologies are facing new challenges. Satellite positioning has become a typical application of mobile phones, but stops working satisfactorily in enclosed spaces. Currently there is a problem in positioning which is unresolved. This circumstance motivates the research of new methods. After the introduction, the first chapter presents current methods of positioning and the problem of positioning indoors. This part of the work shows globally the current state of the art. It mentions a taxonomy that helps classify the different types of indoor positioning and a selection of current commercial solutions. The second chapter is more focused on the algorithms that will be analyzed. It explains how the most widely used of Machine Learning algorithms work. The aim of this section is to present mathematical algorithms theoretically. These algorithms were not designed for indoor location but can be used for countless solutions. In the third chapter, we learn gives tools work: Weka and Python. the results obtained after thousands of executions with different algorithms and parameters showing main problems of Machine Learning shown. In the fourth chapter the results are collected and the conclusions drawn are shown
- …