Image segmentation is the indispensable part in the field of computer vision. there are tremendous methods for handling this task such as Otsu-thresholding and Fuzzy C-means (FCM). However, the segmentation results of...
详细信息
ISBN:
(纸本)9781728140698
Image segmentation is the indispensable part in the field of computer vision. there are tremendous methods for handling this task such as Otsu-thresholding and Fuzzy C-means (FCM). However, the segmentation results of the images are occasionally unsatisfactory due to the presence of noise. In this paper, two kinds of spatial information consisting of the relative position information and the intensity information of the neighborhood pixels in an image are taken into consideration in constructing the objective function in FCM. Moreover, Ant Lion Optimization, one of the recently proposed optimization algorithms is utilized to optimize the relevant index. Bio-inspired ALO has the robust ability to find optimal parameters in search spaces. So the proposed approach to image segmentation based on Fuzzy C-Means (FCM) and Ant Lion Optimization (ALO) may alleviate this problem to a certain degree. A series of experimental validation has been implemented for demonstrating the performance of the proposed approach in the end of the paper.
Withthe ever increasing volumes of electronic information generation, users of information systems are facing an information overload. It is desirable to support information filtering as a complement to traditional r...
详细信息
ISBN:
(纸本)0818654007
Withthe ever increasing volumes of electronic information generation, users of information systems are facing an information overload. It is desirable to support information filtering as a complement to traditional retrieval mechanism. the number of users, and thus profiles (representing users' long-term interests), handled by an information filtering system is potentially huge, and the system has to process a constant stream of incoming information in a timely fashion. the efficiency of the filtering process is thus an important issue. In this paper, we study what datastructures and algorithms can be used to efficiently perform large-scale information filtering under the vector space model, a retrieval model established as being effective. We apply the idea of the standard inverted index to index user profiles. We devise an alternative to the standard inverted index, in which we, instead of indexing every term in a profile, select only the significant ones to index. We evaluate their performance and show that the indexing methods require orders of magnitude fewer I/Os to process a document than when no index is used. We also show that the proposed alternative performs better in terms of I/O and CPU processing time in many cases.
In this paper, the determination of defects in concrete structures using an ultrasound technique is discussed. A diagnostic model for concrete pillars by means of Multi Layer Perceptron neural networks is developed to...
详细信息
In this paper, the determination of defects in concrete structures using an ultrasound technique is discussed. A diagnostic model for concrete pillars by means of Multi Layer Perceptron neural networks is developed to locate and classify the defects. Finite Elements numerical techniques have been used to model a concrete pillar of specified size (i.e., rectangular cross section and 2 meters in span) affected by defects of different position and size. the numerical analyses enable to obtain several received signals containing the fault information. these signals have been processed by a feature extractor system, whose purpose is to reduce the data dimensionality and to compute suitable features. Results showed good accuracy in the identification of the position and entity of the faults.
Artificial Intelligence (AI) and Machine Learning (ML) provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including many whose appli...
详细信息
ISBN:
(纸本)9781450349468
Artificial Intelligence (AI) and Machine Learning (ML) provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including many whose applications have security-sensitive elements. However, while security researchers often utilize such techniques to address problems and AI/ML researchers develop techniques for Big data analytics applications, neither community devotes much attention to the other. Within security research, AI/ML components are usually regarded as black-box solvers. Conversely, the learning community seldom considers the security/privacy implications entailed in the application of their algorithms when they are designing them. While these two communities generally focus on different directions, where these two fields do meet, interesting problems appear. Researchers working in this intersection have raised many novel questions for both communities and created a new branch of research known as secure learning. the AISec workshop has become the primary venue for this unique fusion of research.
Automatic medical image segmentation is an important part of medical image analysis, and plays an indispensable role in computer-aided diagnosis. Recently, FCN (Fully Convolutional Network) and U-Net have become the m...
详细信息
the paper describes the basic principles of complex threats modeling, and the task of complex threats detection is formalized. the proposed modeling principles are based on the idea of identifying the links between el...
详细信息
the proceedings contain 23 papers. the special focus in this conference is on Similarity Search and Applications. the topics include: Cost models and scheduling policies for quality-controlled similarity queries;cache...
ISBN:
(纸本)9783319684734
the proceedings contain 23 papers. the special focus in this conference is on Similarity Search and Applications. the topics include: Cost models and scheduling policies for quality-controlled similarity queries;cache and priority queue based approximation technique for a stream of similarity search queries;a benchmarking tool for approximate nearest neighbor algorithms;sketches with unbalanced bits for similarity search;an extreme-value-theoretic foundation for similarity applications;multivariate analysis and distributional support;high-dimensional simplexes for supermetric search;improving k-NN graph accuracy using local intrinsic dimensionality;dynamic time warping and the (windowed) dog-keeper distance;fast similarity search withthe earth mover's distance via feasible initialization and pruning;a new perspective on the tree edit distance;good and bad neighborhood approximations for outlier detection ensembles;scalable similarity search for molecular descriptors;self-indexed motion planning;practical space-efficient datastructures for high-dimensional orthogonal range searching;semantic similarity group by operators for metric data;succinct quadtrees for road data;on competitiveness of nearest-neighbor-based music classification;dataset proximity mining for governing the data lake;similarity-based browsing through large lists (extended abstract).;malware discovery using behaviour-based exploration of network traffic and concepts and challenges for effective retrieval considering users, tasks, and data.
the integrated approach is a classifier established on statistical estimator and artificial neural network. this consists of preliminary data whitening transformation which provides good starting weight vector, and fa...
详细信息
For digital twin in current time, some applications have gradually matured. But there are still some unsatisfactory, such as t oversized production line models, the hardware requirements have also increased, so this a...
详细信息
Increased reliance on optimistic data replication has led to burgeoning interest in tools and frameworks for synchronizing disconnected updates to replicated data. We have implemented a generic synchronization framewo...
详细信息
暂无评论