95 research outputs found

    Automatic large-scale classification of bird sounds is strongly improved by unsupervised feature learning

    Get PDF
    This is an Open Access article distributed in accordance with the terms of the Creative Commons Attribution (CC BY 4.0) license, which permits others to distribute, remix, adapt and build upon this work, for commercial use, provided the original work is properly cited. See: http://creativecommons.org/ licenses/by/4.0

    Gaussian process classification for prediction of in-hospital mortality among preterm infants

    Get PDF
    We present a method for predicting preterm infant in-hospital mortality using Bayesian Gaussian process classification. We combined features extracted from sensor measurements, made during the first 72 h of care for 598 Very Low Birth Weight infants of birth weight <1500 g, with standard clinical features calculated on arrival at the Neonatal Intensive Care Unit. Time periods of 12, 18, 24, 36, 48, and 72 h were evaluated. We achieved a classification result with area under the receiver operating characteristic curve of 0.948, which is in excess of the results achieved by using the clinical standard SNAP-II and SNAPPE-II scores. (C) 2018 Elsevier B.V. All rights reserved.Peer reviewe

    Data-Efficient Classification of Birdcall Through Convolutional Neural Networks Transfer Learning

    Full text link
    Deep learning Convolutional Neural Network (CNN) models are powerful classification models but require a large amount of training data. In niche domains such as bird acoustics, it is expensive and difficult to obtain a large number of training samples. One method of classifying data with a limited number of training samples is to employ transfer learning. In this research, we evaluated the effectiveness of birdcall classification using transfer learning from a larger base dataset (2814 samples in 46 classes) to a smaller target dataset (351 samples in 10 classes) using the ResNet-50 CNN. We obtained 79% average validation accuracy on the target dataset in 5-fold cross-validation. The methodology of transfer learning from an ImageNet-trained CNN to a project-specific and a much smaller set of classes and images was extended to the domain of spectrogram images, where the base dataset effectively played the role of the ImageNet.Comment: Accepted for IEEE Digital Image Computing: Techniques and Applications, 2019 (DICTA 2019), 2-4 December 2019 in Perth, Australia, http://dicta2019.dictaconference.org/index.htm

    Audio-only bird classification using unsupervised feature learning

    Get PDF
    We describe our method for automatic bird species classification, which uses raw audio without segmentation and without using any auxiliary metadata. It successfully classifies among 501 bird categories, and was by far the highest scoring audio-only bird recognition algorithm submitted to BirdCLEF 2014. Our method uses unsupervised feature learning, a technique which learns regularities in spectro-temporal content without reference to the training labels, which helps a classifier to generalise to further content of the same type. Our strongest submission uses two layers of feature learning to capture regularities at two different time scales

    Automatic Detection of Depression in Speech Using Ensemble Convolutional Neural Networks

    Get PDF
    This paper proposes a speech-based method for automatic depression classification. The system is based on ensemble learning for Convolutional Neural Networks (CNNs) and is evaluated using the data and the experimental protocol provided in the Depression Classification Sub-Challenge (DCC) at the 2016 Audioโ€“Visual Emotion Challenge (AVEC-2016). In the pre-processing phase, speech files are represented as a sequence of log-spectrograms and randomly sampled to balance positive and negative samples. For the classification task itself, first, a more suitable architecture for this task, based on One-Dimensional Convolutional Neural Networks, is built. Secondly, several of these CNN-based models are trained with different initializations and then the corresponding individual predictions are fused by using an Ensemble Averaging algorithm and combined per speaker to get an appropriate final decision. The proposed ensemble system achieves satisfactory results on the DCC at the AVEC-2016 in comparison with a reference system based on Support Vector Machines and hand-crafted features, with a CNN+LSTM-based system called DepAudionet, and with the case of a single CNN-based classifier.This research was partly funded by Spanish Government grant TEC2017-84395-P

    ๋ฏผ๊ฐํ•œ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ ๋ณด์กด ๊ธฐ๊ณ„ํ•™์Šต ๊ธฐ์ˆ  ๊ฐœ๋ฐœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์‚ฐ์—…๊ณตํ•™๊ณผ, 2022. 8. ์ด์žฌ์šฑ.์ตœ๊ทผ ์ธ๊ณต์ง€๋Šฅ์˜ ์„ฑ๊ณต์—๋Š” ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์š”์ธ์ด ์žˆ์œผ๋‚˜, ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๊ฐœ๋ฐœ๊ณผ ์ •์ œ๋œ ๋ฐ์ดํ„ฐ ์–‘์˜ ๊ธฐํ•˜๊ธ‰์ˆ˜์ ์ธ ์ฆ๊ฐ€๋กœ ์ธํ•œ ์˜ํ–ฅ์ด ํฌ๋‹ค. ๋”ฐ๋ผ์„œ ๊ธฐ๊ณ„ํ•™์Šต ๋ชจ๋ธ๊ณผ ๋ฐ์ดํ„ฐ๋Š” ์‹ค์žฌ์  ๊ฐ€์น˜๋ฅผ ๊ฐ€์ง€๊ฒŒ ๋˜๋ฉฐ, ํ˜„์‹ค ์„ธ๊ณ„์—์„œ ๊ฐœ์ธ ๋˜๋Š” ๊ธฐ์—…์€ ํ•™์Šต๋œ ๋ชจ๋ธ ๋˜๋Š” ํ•™์Šต์— ์‚ฌ์šฉํ•  ๋ฐ์ดํ„ฐ๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ ์ด์ต์„ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ๋ฐ์ดํ„ฐ ๋˜๋Š” ๋ชจ๋ธ์˜ ๊ณต์œ ๋Š” ๊ฐœ์ธ์˜ ๋ฏผ๊ฐ ์ •๋ณด๋ฅผ ์œ ์ถœํ•จ์œผ๋กœ์จ ํ”„๋ผ์ด๋ฒ„์‹œ์˜ ์นจํ•ด๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์ด ๋ฐํ˜€์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์˜ ๋ชฉํ‘œ๋Š” ๋ฏผ๊ฐ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ ๋ณด์กด ๊ธฐ๊ณ„ํ•™์Šต ๋ฐฉ๋ฒ•๋ก ์„ ๊ฐœ๋ฐœํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ์ตœ๊ทผ ํ™œ๋ฐœํžˆ ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋Š” ๋‘ ๊ฐ€์ง€ ํ”„๋ผ์ด๋ฒ„์‹œ ๋ณด์กด ๊ธฐ์ˆ , ์ฆ‰ ๋™ํ˜• ์•”ํ˜ธ์™€ ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค. ๋จผ์ €, ๋™ํ˜• ์•”ํ˜ธ๋Š” ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด ๊ธฐ๊ณ„ํ•™์Šต ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ ์šฉ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•จ์œผ๋กœ์จ ๋ฐ์ดํ„ฐ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋™ํ˜• ์•”ํ˜ธ๋ฅผ ํ™œ์šฉํ•œ ์—ฐ์‚ฐ์€ ๊ธฐ์กด์˜ ์—ฐ์‚ฐ์— ๋น„ํ•ด ๋งค์šฐ ํฐ ์—ฐ์‚ฐ ์‹œ๊ฐ„์„ ์š”๊ตฌํ•˜๋ฏ€๋กœ ํšจ์œจ์ ์ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๊ตฌ์„ฑํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ํšจ์œจ์ ์ธ ์—ฐ์‚ฐ์„ ์œ„ํ•ด ์šฐ๋ฆฌ๋Š” ๋‘ ๊ฐ€์ง€ ์ ‘๊ทผ๋ฒ•์„ ์‚ฌ์šฉํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋Š” ํ•™์Šต ๋‹จ๊ณ„์—์„œ์˜ ์—ฐ์‚ฐ๋Ÿ‰์„ ์ค„์ด๋Š” ๊ฒƒ์ด๋‹ค. ํ•™์Šต ๋‹จ๊ณ„์—์„œ๋ถ€ํ„ฐ ๋™ํ˜• ์•”ํ˜ธ๋ฅผ ์ ์šฉํ•˜๋ฉด ํ•™์Šต ๋ฐ์ดํ„ฐ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ํ•จ๊ป˜ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ์ถ”๋ก  ๋‹จ๊ณ„์—์„œ๋งŒ ๋™ํ˜• ์•”ํ˜ธ๋ฅผ ์ ์šฉํ•˜๋Š” ๊ฒƒ์— ๋น„ํ•ด ํ”„๋ผ์ด๋ฒ„์‹œ์˜ ๋ฒ”์œ„๊ฐ€ ๋„“์–ด์ง€์ง€๋งŒ, ๊ทธ๋งŒํผ ์—ฐ์‚ฐ๋Ÿ‰์ด ๋Š˜์–ด๋‚œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ผ๋ถ€ ๊ฐ€์žฅ ์ค‘์š”ํ•œ ์ •๋ณด๋งŒ์„ ์•”ํ˜ธํ™”ํ•จ์œผ๋กœ์จ ํ•™์Šต ๋‹จ๊ณ„๋ฅผ ํšจ์œจ์ ์œผ๋กœ ํ•˜๋Š” ๋ฐฉ๋ฒ•๋ก ์„ ์ œ์•ˆํ•œ๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ, ์ผ๋ถ€ ๋ฏผ๊ฐ ๋ณ€์ˆ˜๊ฐ€ ์•”ํ˜ธํ™”๋˜์–ด ์žˆ์„ ๋•Œ ์—ฐ์‚ฐ๋Ÿ‰์„ ๋งค์šฐ ์ค„์ผ ์ˆ˜ ์žˆ๋Š” ๋ฆฟ์ง€ ํšŒ๊ท€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๊ฐœ๋ฐœํ•œ๋‹ค. ๋˜ํ•œ ๊ฐœ๋ฐœ๋œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ™•์žฅ์‹œ์ผœ ๋™ํ˜• ์•”ํ˜ธ ์นœํ™”์ ์ด์ง€ ์•Š์€ ํŒŒ๋ผ๋ฏธํ„ฐ ํƒ์ƒ‰ ๊ณผ์ •์„ ์ตœ๋Œ€ํ•œ ์ œ๊ฑฐํ•  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ๋กœ์ง€์Šคํ‹ฑ ํšŒ๊ท€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ•จ๊ป˜ ์ œ์•ˆํ•œ๋‹ค. ํšจ์œจ์ ์ธ ์—ฐ์‚ฐ์„ ์œ„ํ•œ ๋‘ ๋ฒˆ์งธ ์ ‘๊ทผ๋ฒ•์€ ๋™ํ˜• ์•”ํ˜ธ๋ฅผ ๊ธฐ๊ณ„ํ•™์Šต์˜ ์ถ”๋ก  ๋‹จ๊ณ„์—์„œ๋งŒ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์‹œํ—˜ ๋ฐ์ดํ„ฐ์˜ ์ง์ ‘์ ์ธ ๋…ธ์ถœ์„ ๋ง‰์„ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์„œํฌํŠธ ๋ฒกํ„ฐ ๊ตฐ์ง‘ํ™” ๋ชจ๋ธ์— ๋Œ€ํ•œ ๋™ํ˜• ์•”ํ˜ธ ์นœํ™”์  ์ถ”๋ก  ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋™ํ˜• ์•”ํ˜ธ๋Š” ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์œ„ํ˜‘์— ๋Œ€ํ•ด์„œ ๋ฐ์ดํ„ฐ์™€ ๋ชจ๋ธ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์œผ๋‚˜, ํ•™์Šต๋œ ๋ชจ๋ธ์„ ํ†ตํ•ด ์ƒˆ๋กœ์šด ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ถ”๋ก  ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•  ๋•Œ ์ถ”๋ก  ๊ฒฐ๊ณผ๋กœ๋ถ€ํ„ฐ ๋ชจ๋ธ๊ณผ ํ•™์Šต ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜์ง€ ๋ชปํ•œ๋‹ค. ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๊ณต๊ฒฉ์ž๊ฐ€ ์ž์‹ ์ด ๊ฐ€์ง„ ๋ฐ์ดํ„ฐ์™€ ๊ทธ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ถ”๋ก  ๊ฒฐ๊ณผ๋งŒ์„ ์ด์šฉํ•˜์—ฌ ์ด์šฉํ•˜์—ฌ ๋ชจ๋ธ๊ณผ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ์ถ”์ถœํ•  ์ˆ˜ ์žˆ์Œ์ด ๋ฐํ˜€์ง€๊ณ  ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๊ณต๊ฒฉ์ž๋Š” ํŠน์ • ๋ฐ์ดํ„ฐ๊ฐ€ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ํฌํ•จ๋˜์–ด ์žˆ๋Š”์ง€ ์•„๋‹Œ์ง€๋ฅผ ์ถ”๋ก ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ๋Š” ํ•™์Šต๋œ ๋ชจ๋ธ์— ๋Œ€ํ•œ ํŠน์ • ๋ฐ์ดํ„ฐ ์ƒ˜ํ”Œ์˜ ์˜ํ–ฅ์„ ์ค„์ž„์œผ๋กœ์จ ์ด๋Ÿฌํ•œ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋ฐฉ์–ด๋ฅผ ๋ณด์žฅํ•˜๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ ๊ธฐ์ˆ ์ด๋‹ค. ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ์˜ ์ˆ˜์ค€์„ ์ •๋Ÿ‰์ ์œผ๋กœ ํ‘œํ˜„ํ•จ์œผ๋กœ์จ ์›ํ•˜๋Š” ๋งŒํผ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์ถฉ์กฑ์‹œํ‚ฌ ์ˆ˜ ์žˆ์ง€๋งŒ, ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์ถฉ์กฑ์‹œํ‚ค๊ธฐ ์œ„ํ•ด์„œ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ๊ทธ๋งŒํผ์˜ ๋ฌด์ž‘์œ„์„ฑ์„ ๋”ํ•ด์•ผ ํ•˜๋ฏ€๋กœ ๋ชจ๋ธ์˜ ์„ฑ๋Šฅ์„ ๋–จ์–ด๋œจ๋ฆฐ๋‹ค. ๋”ฐ๋ผ์„œ, ๋ณธ๋ฌธ์—์„œ๋Š” ๋ชจ์Šค ์ด๋ก ์„ ์ด์šฉํ•˜์—ฌ ์ฐจ๋ถ„ ํ”„๋ผ์ด๋ฒ„์‹œ ๊ตฐ์ง‘ํ™” ๋ฐฉ๋ฒ•๋ก ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์œ ์ง€ํ•˜๋ฉด์„œ๋„ ๊ทธ ์„ฑ๋Šฅ์„ ๋Œ์–ด์˜ฌ๋ฆฌ๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•๋ก ์„ ์ œ์•ˆํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ ๊ฐœ๋ฐœํ•˜๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ ๋ณด์กด ๊ธฐ๊ณ„ํ•™์Šต ๋ฐฉ๋ฒ•๋ก ์€ ๊ฐ๊ธฐ ๋‹ค๋ฅธ ์ˆ˜์ค€์—์„œ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๋ณดํ˜ธํ•˜๋ฉฐ, ๋”ฐ๋ผ์„œ ์ƒํ˜ธ ๋ณด์™„์ ์ด๋‹ค. ์ œ์•ˆ๋œ ๋ฐฉ๋ฒ•๋ก ๋“ค์€ ํ•˜๋‚˜์˜ ํ†ตํ•ฉ ์‹œ์Šคํ…œ์„ ๊ตฌ์ถ•ํ•˜์—ฌ ๊ธฐ๊ณ„ํ•™์Šต์ด ๊ฐœ์ธ์˜ ๋ฏผ๊ฐ ์ •๋ณด๋กค ๋ณดํ˜ธํ•ด์•ผ ํ•˜๋Š” ์—ฌ๋Ÿฌ ๋ถ„์•ผ์—์„œ ๋”์šฑ ๋„๋ฆฌ ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๊ธฐ๋Œ€ ํšจ๊ณผ๋ฅผ ๊ฐ€์ง„๋‹ค.Recent development of artificial intelligence systems has been driven by various factors such as the development of new algorithms and the the explosive increase in the amount of available data. In the real-world scenarios, individuals or corporations benefit by providing data for training a machine learning model or the trained model. However, it has been revealed that sharing of data or the model can lead to invasion of personal privacy by leaking personal sensitive information. In this dissertation, we focus on developing privacy-preserving machine learning methods which can protect sensitive information. Homomorphic encryption can protect the privacy of data and the models because machine learning algorithms can be applied to encrypted data, but requires much larger computation time than conventional operations. For efficient computation, we take two approaches. The first is to reduce the amount of computation in the training phase. We present an efficient training algorithm by encrypting only few important information. In specific, we develop a ridge regression algorithm that greatly reduces the amount of computation when one or two sensitive variables are encrypted. Furthermore, we extend the method to apply it to classification problems by developing a new logistic regression algorithm that can maximally exclude searching of hyper-parameters that are not suitable for machine learning with homomorphic encryption. Another approach is to apply homomorphic encryption only when the trained model is used for inference, which prevents direct exposure of the test data and the model information. We propose a homomorphic-encryption-friendly algorithm for inference of support based clustering. Though homomorphic encryption can prevent various threats to data and the model information, it cannot defend against secondary attacks through inference APIs. It has been reported that an adversary can extract information about the training data only with his or her input and the corresponding output of the model. For instance, the adversary can determine whether specific data is included in the training data or not. Differential privacy is a mathematical concept which guarantees defense against those attacks by reducing the impact of specific data samples on the trained model. Differential privacy has the advantage of being able to quantitatively express the degree of privacy, but it reduces the utility of the model by adding randomness to the algorithm. Therefore, we propose a novel method which can improve the utility while maintaining the privacy of differentially private clustering algorithms by utilizing Morse theory. The privacy-preserving machine learning methods proposed in this paper can complement each other to prevent different levels of attacks. We expect that our methods can construct an integrated system and be applied to various domains where machine learning involves sensitive personal information.Chapter 1 Introduction 1 1.1 Motivation of the Dissertation 1 1.2 Aims of the Dissertation 7 1.3 Organization of the Dissertation 10 Chapter 2 Preliminaries 11 2.1 Homomorphic Encryption 11 2.2 Differential Privacy 14 Chapter 3 Efficient Homomorphic Encryption Framework for Ridge Regression 18 3.1 Problem Statement 18 3.2 Framework 22 3.3 Proposed Method 25 3.3.1 Regression with one Encrypted Sensitive Variable 25 3.3.2 Regression with two Encrypted Sensitive Variables 30 3.3.3 Adversarial Perturbation Against Attribute Inference Attack 35 3.3.4 Algorithm for Ridge Regression 36 3.3.5 Algorithm for Adversarial Perturbation 37 3.4 Experiments 40 3.4.1 Experimental Setting 40 3.4.2 Experimental Results 42 3.5 Chapter Summary 47 Chapter 4 Parameter-free Homomorphic-encryption-friendly Logistic Regression 53 4.1 Problem Statement 53 4.2 Proposed Method 56 4.2.1 Motivation 56 4.2.2 Framework 58 4.3 Theoretical Results 63 4.4 Experiments 68 4.4.1 Experimental Setting 68 4.4.2 Experimental Results 70 4.5 Chapter Summary 75 Chapter 5 Homomorphic-encryption-friendly Evaluation for Support Vector Clustering 76 5.1 Problem Statement 76 5.2 Background 78 5.2.1 CKKS scheme 78 5.2.2 SVC 80 5.3 Proposed Method 82 5.4 Experiments 86 5.4.1 Experimental Setting 86 5.4.2 Experimental Results 87 5.5 Chapter Summary 89 Chapter 6 Differentially Private Mixture of Gaussians Clustering with Morse Theory 95 6.1 Problem Statement 95 6.2 Background 98 6.2.1 Mixture of Gaussians 98 6.2.2 Morse Theory 99 6.2.3 Dynamical System Perspective 101 6.3 Proposed Method 104 6.3.1 Differentially private clustering 105 6.3.2 Transition equilibrium vectors and the weighted graph 108 6.3.3 Hierarchical merging of sub-clusters 111 6.4 Theoretical Results 112 6.5 Experiments 117 6.5.1 Experimental Setting 117 6.5.2 Experimental Results 119 6.6 Chapter Summary 122 Chapter 7 Conclusion 124 7.1 Conclusion 124 7.2 Future Direction 126 Bibliography 128 ๊ตญ๋ฌธ์ดˆ๋ก 154๋ฐ•

    Strategic ambivalence above, selective implementation below: an institutional analysis of Kazakhstan`s policy toward skilled labor

    Get PDF
    Aiming at entering the top thirty most competitive economies in the world by 2050 Kazakhstan faces a problem of inadequate human capital. However, an objective demand for foreign skilled workers notwithstanding, Kazakhstan fails to attract as many of them as its labor market needs. Driven by this puzzle, the given study analyzes labor migration policy of Kazakhstan regarding skilled workers. It attempts to explain what factors make Kazakhstani labor migration policy ineffective under the condition when skilled foreign workers are needed. Two main factors influence the outcomes of labor migration policy implementation: decentralized decision-making and strategic ambiguity. Transferring the function of policy implementation to local-level bureaucratic institutions the state not only shifts its responsibilities to bureaucrats but also provides them with a certain degree of autonomy and discretion. However, the state and its institutions have no a coherent vision of the national interest in labor migration. Bureaucrats concerned with their professional duties have a more protectionist stance on foreign specialistsโ€™ inflows. Meanwhile, aimed at increasing these inflows the state ensures its interest through strategic ambiguity in its discourse and practices. It allows the state to reconcile an economic need in more foreign skilled workers with a political demand for a more restrictive labor migration policy. Thus, starting from above ambiguity is manipulated by local bureaucrats to meet their professional and, occasionally, personal interests when implementing the policy. As a result, the state fails to attract the needed numbers of foreign specialists. In other words, the policy through which the state aims to achieve its goals turns to be ineffective. This thesis demonstrates that an institutional approach with an emphasis on the bureaucratic model of decision-making is a better way to understand the reasons of labor ix migration policy ineffectiveness in Kazakhstan. However, it also shows that when bureaucrats are involved in the policy-making process the findings from this case can be applied to the countries other than Kazakhstan and public policies other than migratio
    • โ€ฆ
    corecore