the proceedings contain 9 papers. the special focus in this conference is on theory and Practice of Natural computing. the topics include: Dynamic Heuristic Set Selection for Cross-Domain Selection Hyper-heuristics;on...
ISBN:
(纸本)9783030904241
the proceedings contain 9 papers. the special focus in this conference is on theory and Practice of Natural computing. the topics include: Dynamic Heuristic Set Selection for Cross-Domain Selection Hyper-heuristics;on the Transfer Learning of Genetic Programming Classification Algorithms;on Injecting Entropy-Like Features into Deep Neural Networks for Content Relevance Assessment;ABCD: Analogy-Based Controllable Data Augmentation;MOEA/D with Adaptative Number of Weight Vectors;parallel Asynchronous Memetic Optimization for Freeform Optical Design;ant-Based Generation Constructive Hyper-heuristics for the Movie Scene Scheduling Problem.
Recently, the horizon of dynamic time warping (DTW) for matching two sequential patterns has been extended to deal with non-Markovian constraints. the non-Markovian constraints regulate the matching in a wider scale, ...
详细信息
ISBN:
(纸本)9781479918058
Recently, the horizon of dynamic time warping (DTW) for matching two sequential patterns has been extended to deal with non-Markovian constraints. the non-Markovian constraints regulate the matching in a wider scale, whereas Markovian constraints regulate the matching only locally. the global optimization of the non-Markovian DTW is proved to be solvable in polynomial time by a graph cut algorithm. the main contribution of this paper is to reveal what is the best constraint for handwriting recognition by using the non-Markovian DTW. the result showed that the best constraint is not a Markovian but a totally non-Markovian constraint that regulates the matching between very distant points;that is, it was proved that the conventional Markovian DTW has a clear limitation and the non-Markovian DTW should be more focused in future research.
this book contains revised and extended versions of selected papers from the 10th and 11;internationalconference on patternrecognition, ICPRAM 2021 and 2022, held in February 2021 and 2022. Due to COVID-19 pandemic ...
详细信息
ISBN:
(数字)9783031245381
ISBN:
(纸本)9783031245374
this book contains revised and extended versions of selected papers from the 10th and 11;internationalconference on patternrecognition, ICPRAM 2021 and 2022, held in February 2021 and 2022. Due to COVID-19 pandemic the conferences were held virtually. Bothconferences received in total 204 submissions from which 8 full papers were carefully reviewed and selected for presentation in this volume. the papers span a wide range of investigation as well as development lines, which of course always reflect the last trends of research in the patternrecognition community.
Local feature description is gaining a lot of attention in the fields of texture classification, image recognition, and face recognition. In this paper, we propose Center-Symmetric Local Derivative Mapped patterns (CS...
详细信息
ISBN:
(纸本)9789811075124;9789811075117
Local feature description is gaining a lot of attention in the fields of texture classification, image recognition, and face recognition. In this paper, we propose Center-Symmetric Local Derivative Mapped patterns (CS-LDMP) and eXtended Center-Symmetric Local Mapped patterns (XCS-LMP) for local description of images. Strengths from Center-Symmetric Local Derivative pattern (CS-LDP) which is gaining more texture information and Center-Symmetric Local Mapped pattern (CS-LMP) which is capturing nuances between images were combined to make the CS-LDMP, and similarly, we combined CS-LMP and eXtended Center-Symmetric Local Binary pattern (XCS-LBP), which is tolerant to illumination changes and noise were combined to form XCS-LMP. the experiments were conducted on the CIFAR10 dataset and hence proved that CS-LDMP and XCS-LMP perform better than its direct competitors.
the frame sync word (SW) is very important for burst data communication systems. the misdetection (including false alarm and detection failure) probability is a very good performance metric of a SW. Usually, the exact...
详细信息
ISBN:
(纸本)9781424408009
the frame sync word (SW) is very important for burst data communication systems. the misdetection (including false alarm and detection failure) probability is a very good performance metric of a SW. Usually, the exact misdetection probability of one SW is obtained by Exhaustively Full Searching (EFS) through the whole error pattern space. EFS is straightforward, but the drawback is complexity. In this paper, we propose a new full search algorithm-Backtracking Full Searching (BFS), which is based on the backtracking method. Simulation result shows that BFS algorithm is very efficient and flexible.
Internet of things (IoT) has a growing application in agriculture and smart farming. Different monitoring, controlling and tracking systems have been proposed for increasing the efficiency and quality of agricultural ...
详细信息
the proceedings contain 17 papers. the topics discussed include: SuperMod - a model-driven tool that combines version control and software product line engineering;semantic version management based on formal certifica...
ISBN:
(纸本)9789897581151
the proceedings contain 17 papers. the topics discussed include: SuperMod - a model-driven tool that combines version control and software product line engineering;semantic version management based on formal certification;Java-meets Eclipse - an IDE for teaching Java following the object-later approach;systematic identification of information flows from requirements to support privacy impact assessments;model checking to improve precision of design pattern instances identification in OO systems;transformation from R-UML to R-TNCES: new formal solution for verification of flexible control systems;a tool for management of knowledge dispersed throughout multiple references;a pi-calculus-based approach for the verification of UML2 sequence diagrams;on a-posteriori integration of Ecore models and hand-written Java code;OCL for rich domain models implementation - an incremental aspect based solution;and novel approach for computing skyline services with fuzzy consistent model for QoS- based service composition.
the Internet of things technology is developing rapidly, and the data generated has also exploded. Traditional cloud computing technology can no longer meet the demand for efficient processing of massive data. Edge co...
详细信息
the Internet of things technology is developing rapidly, and the data generated has also exploded. Traditional cloud computing technology can no longer meet the demand for efficient processing of massive data. Edge computing technology can move the amount of calculation down to the edge of the network, which can greatly improve computing efficiency. Applying edge computing to the field of equipment health prediction, the combination of strong responsiveness and computing capabilities of edge computing and high-precision prediction technology makes production operation and maintenance more reliable and efficient. At the same time, a neural network prediction model combining Variational Auto-Encoder (VAE) and Time Convolutional Network (TCN) is proposed to improve the accuracy of equipment health prediction. this model uses VAE for dimensionality reduction, extracts the hidden information in the original data, reconstructs high-quality sample data, and then uses TCN to mine the internal connection between the features and the target in the long sequence information. Compared with five benchmark prediction models on the C-MAPSS dataset, experiments show that the proposed model has higher prediction accuracy. (C) 2021the Authors. Published by Elsevier B.V.
In this paper, a syntactic method of patternrecognition is applied to hand radiographs interpretation, in order to recognize erosions and osteophytes in the finger joints. It is shown that, the classical Jakubowski t...
详细信息
ISBN:
(纸本)9783642202667
In this paper, a syntactic method of patternrecognition is applied to hand radiographs interpretation, in order to recognize erosions and osteophytes in the finger joints. It is shown that, the classical Jakubowski transducer does not distinguish contours of healthy bones from contours of affected bones. therefore, the modifications of the transducer are introduced: It is demonstrated, that the modified transducer correctly recognizes the classes of bone shapes obtained based on the medical classification: healthy bone class, erosion bone class and osteophyte bone class.
Video identification in encrypted network traffic has become a trending field in the research area for user behavior and Quality of Experience (QoE) analysis. However, the traditional methods of video identification h...
详细信息
ISBN:
(纸本)9798400702341
Video identification in encrypted network traffic has become a trending field in the research area for user behavior and Quality of Experience (QoE) analysis. However, the traditional methods of video identification have become ineffective withthe usage of Hypertext Transfer Protocol Secure (HTTPS). this paper presents a video identification method in encrypted network traffic using the number of packets received at the user's end in a second. For this purpose, video streams are captured, and feature is extracted from the video streams in the form of a series of Packets per Seconds (PPS). this feature is provided as input to a Convolutional Neural Network (CNN), which learns the pattern from the network traffic feature and successfully identifies the video even if the pattern differs from the training sample. the results show that PPS outperforms the other video identification techniques with a high accuracy of 90%. Moreover, the results show that CNN outperforms its counterpart regarding video identification with a 25% performance increase.
暂无评论