The classical algorithm ISOMAP can find the intrinsic low-dimensional structures hidden in high-dimensional data uniformly distributed on or around a single manifold, but if the data are sampled from multi-class, each...
详细信息
ISBN:
(纸本)9781424441990
The classical algorithm ISOMAP can find the intrinsic low-dimensional structures hidden in high-dimensional data uniformly distributed on or around a single manifold, but if the data are sampled from multi-class, each of which corresponds to an independent manifold, and clusters formed by data points belonging to each class are separated away, several disconnected neighborhood graphs will form, which leads to the failure of ISOMAP algorithm. In this paper, an improved version of ISOMAP, namely Multi-Class Multi-Manifold ISOMAP (MCMM-ISOMAP), is proposed. MCMM-ISOMAP constructs a single neighborhood graph not by increasing the value of neighborhood parameter, but by the following steps that first choose appropriate value with which short-circuit edges can not be introduced, second find such pail-wise data each of which are two endpoints of the shortest Euclidean distance between classes, and finally make them neighborhood points each other. Thereby a single neighborhood graph will form, and then ISOMAP algorithm is applied to find the intrinsic low-dimensional embedding structure. Experimental results on synthetic and real data reveal effectiveness of the proposed method.
The proceedings contain 202 papers. The topics discussed include: local search algorithm for K-means clustering based on minimum sub-cluster size;a discretization algorithm of continuous attributes based on supervised...
ISBN:
(纸本)9781424441990
The proceedings contain 202 papers. The topics discussed include: local search algorithm for K-means clustering based on minimum sub-cluster size;a discretization algorithm of continuous attributes based on supervised clustering;a modified differential evolution algorithm for multi-objective optimization problems;collaborative filtering in personalized recommendation based on users pattern subspace clustering;the generic object classification based on MIML machinelearning;cluster based multi-populations genetic algorithm in noisy environment;feature selection for classifying datastream based on maximum entropy;kernel-plural discriminant analysis based on Fourier transform and its application to face recognition;local graph embedding discriminant analysis for face recognition with single training sample per person;two-dimensional local graph embedding discriminant analysis(F2DLGEDA) with its application to face and palm biometrics;and gait recognition based on multi-resolution regional shape context.
This paper develops a supervised discriminant technique, called marginal and nonlocal discriminant embedding (MNDE), for dimensionality reduction of high-dimensional data in small sample size problems. MNDE can be see...
详细信息
ISBN:
(纸本)9781424441990
This paper develops a supervised discriminant technique, called marginal and nonlocal discriminant embedding (MNDE), for dimensionality reduction of high-dimensional data in small sample size problems. MNDE can be seen as a linear approximation of a multimanifold-based learning framework in which nonlocal property is taken into account besides the marginal property and local property. MNDE seeks to find a set of perfect projections that not only can impact the samples of intraclass and maximize the margin of interclass, but also can simultaneously maximize the nonlocal scatter that characterizes the sum scatter of any pair of data out of local K-neighborhood. This characteristic makes MNDE more intuitive and more powerful than LDA and Marginal Fisher Analysis (MFA). The proposed method is applied to face recognition and is examined on the Yale and AR face image databases.
An anti-compression watermarking scheme is proposed. The scheme uses improved Dougleas-Peucker algorithm to compress redundant vertex data, which is important character of vector map, and embeds the watermark into com...
详细信息
This paper proposed a novel classification approach, called affine subspace nearest points (ASNP) approach, for face recognition. Inspired by the nearest point problem of SVM which computes the nearest points between ...
详细信息
ISBN:
(纸本)9781424441990
This paper proposed a novel classification approach, called affine subspace nearest points (ASNP) approach, for face recognition. Inspired by the nearest point problem of SVM which computes the nearest points between two convex hulls, ASNP replaces the convex hulls with the affine subspaces of each class samples, i.e., ASNP approach constructs the two smallest subspaces which respectively contain the data in each class, and finds the closest points in two subspaces. Then, the plane, which bisects the line segment connecting the two points, is constructed as the separating plane. Compared with SVM, ASNP is simply a linear optimal problem, and it avoids the convex quadratic programming problem. We apply the ASNP approach on face recognition. The experiments on ORL face database, Yale face database and Harvard face database show that the performances of ASNP algorithms are competitive to l-NN classifier and SVM classifier for face classification.
As an important tool, clustering analysis is used in many applications such as patternrecognition, datamining, machinelearning and statistics etc. K-means clustering, based on minimizing a formal objective function...
详细信息
ISBN:
(纸本)9781424452729
As an important tool, clustering analysis is used in many applications such as patternrecognition, datamining, machinelearning and statistics etc. K-means clustering, based on minimizing a formal objective function, is perhaps the most widely used and studied. But k the number of clusters needs users specify and the effective initial centers are difficult to select. Meanwhile, it is sensitive to noise data points. In this paper, we focus on choice the better initial centers to improve the quality of k-means and to reduce the computational complexity of k-means method. The proposed algorithm called GK-means, which combines grid structure and spatial index with k-means algorithm. Theoretical analysis and experimental results show the algorithm has high quality and efficiency.
Video shot segmentation is a solid foundation for automatic video content analysis, for most content based video retrieval tasks require accurate segmentation of video boundaries. In recent years, using the tools of d...
详细信息
ISBN:
(纸本)9781605588407
Video shot segmentation is a solid foundation for automatic video content analysis, for most content based video retrieval tasks require accurate segmentation of video boundaries. In recent years, using the tools of datamining and machinelearning to detect shot boundaries has become more and more popular. In this paper, we propose an effective video segmentation approach based on a dominant-set clustering algorithm. The algorithm can not only automatically determine the number of video shots, but also obtain accurate shot boundaries with low computation complexity. Experimental results have demonstrated the effectiveness of the proposed shot segmentation approach. Copyright 2009 ACM.
In this paper, Anomaly Detection by Resource Monitoring (Ayaka), a novel lightweight anomaly and fault detection infrastructure, is presented for Information Appliances. Ayaka provides a general monitoring method for ...
详细信息
ISBN:
(纸本)9781424435654
In this paper, Anomaly Detection by Resource Monitoring (Ayaka), a novel lightweight anomaly and fault detection infrastructure, is presented for Information Appliances. Ayaka provides a general monitoring method for detecting anomalies using only resource usage information on systems independent of its domain, target application and programming languages. Ayaka modifies the kernel to detect faults and uses a completely application black-box approach based on machinelearning methods. It uses the clustering method to quantize the resource usage vector data and learn the normal patterns with Hidden Markov Model. In the running phase, Ayaka finds anomalies by comparing the application resource usage with learned model. The evaluation experiment indicates that our prototype system is able to detect anomalies, such as SQL injection and buffer overrun, without significant overheads.
The proceedings contain 8 papers. The topics discussed include: a new framework to automate constrained microaggregation;record linkage performance for large data sets;SAX: a privacy preserving general pupose method a...
ISBN:
(纸本)9781605588049
The proceedings contain 8 papers. The topics discussed include: a new framework to automate constrained microaggregation;record linkage performance for large data sets;SAX: a privacy preserving general pupose method applied to detection of intrusions;applying differential privacy to search queries in a policy based interactive framework;weighted network decapitation: the economics of iterated attack and defense;incremental privacy preservation for associative classification;a novel approach for privacy mining of generic basic association rules;and on privacy preservation in text and document-based active learning for named entity recognition.
The proceedings contain 168 papers. The topics discussed include: research on automatic control system based on 6K controller welding robot;implementation of embedded web server based on Mc9s12ne64;effective communica...
ISBN:
(纸本)9780769536040
The proceedings contain 168 papers. The topics discussed include: research on automatic control system based on 6K controller welding robot;implementation of embedded web server based on Mc9s12ne64;effective communication on the prevention of psychological contract breach;knowledge construction based ion visualization e-learning in digital library;global spatial datamining basing on web geological database;an improving and application of attribute reduction arithmetic in agroclimatology;effect of navigation aids and landmarks on acquisition of spatial knowledge in virtual environments;research on performance analysis and comprehensive evaluation model of MES for machining workshop;expropriation of the biggest shareholdings based on principal component analysis in neural networks;empirical analysis of Beijing logistics industry's GDP contribution to the national economy;and road surface condition recognition method based on color models.
暂无评论