Age estimation from facial images is an important problem in computer vision and patternrecognition. Typically the goal is to predict the chronological age of a person given his or her face picture. It is seldom to s...
详细信息
ISBN:
(纸本)9780769557205
Age estimation from facial images is an important problem in computer vision and patternrecognition. Typically the goal is to predict the chronological age of a person given his or her face picture. It is seldom to study a related problem, that is, how old does a person look like from the face photo? It is called apparent age estimation. A key difference between apparent age estimation and the traditional age estimation is that the age labels are annotated by human assessors rather than the real chronological age. The challenge for apparent age estimation is that there are not many face images available with annotated age labels. Further, the annotated age labels for each face photo may not be consistent among different assessors. We study the problem of apparent age estimation by addressing the issues from different aspects, such as how to utilize a large number of face images without apparent age labels to learn a face representation using the deep neural networks, how to tune the deep networks using a limited number of examples with apparent age labels, and how well the machinelearning methods can perform to estimate apparent ages. The apparent age data is from the ChaLearn Looking At People (LAP) challenge 2015. Using the protocol and time frame given by the challenge competition, we have achieved an error of 0.294835 on the final evaluation, and our result has been ranked the 3rd place in this competition.
In datamining, association rules can be shown when customers buy products, which products will be purchased at the same time. Scholars use this feature to develop market basket analysis to formulate marketing strateg...
详细信息
ISBN:
(数字)9783319238623
ISBN:
(纸本)9783319238623;9783319238616
In datamining, association rules can be shown when customers buy products, which products will be purchased at the same time. Scholars use this feature to develop market basket analysis to formulate marketing strategies for business. As we know, the data are changing all the time. When new data generate, the old data will be replaced. In the database, time become a very important attribute. And new datamining method have been proposed, called Generalized Sequential patterns (GSP). GSP uses time stamp to find the product portfolio with sequential patterns. However, the GSP parameter is user-defined. The result of the operation may be unstable, because of the parameter setting incorrectly. Tuning the parameters used in this study combined GSP and Genetic Algorithm (GA) to improve the result continuously, to find the appropriate parameters. In the experiment, we use a medium-sized supermarket verify the results and found that after comparing with random input parameters, the parameters of the proposed method found significantly better than a random set of parameters.
The proceedings contain 114 papers. The topics discussed include: named entity recognition for malayalam language: a CRF based approach;an approach to identify subject specific human emotions;contemporary semantic sea...
ISBN:
(纸本)9781479998555
The proceedings contain 114 papers. The topics discussed include: named entity recognition for malayalam language: a CRF based approach;an approach to identify subject specific human emotions;contemporary semantic search using natural language processing;DD-SARP: dynamic data secure anonymous routing protocol for MANETs in attacking environments;question answering system: a survey;authentication of MAV communication using Caesar cipher cryptography;RMCHS: ridge method based cluster head selection for energy efficient clustering hierarchy protocol in WSN;comparative analysis of machinelearning algorithms along with classifiers for network intrusion detection;and IMMIX-intrusion detection and prevention system.
Detecting and adapting to concept drifts make learningdata stream classifiers a difficult task. It becomes even more complex when the distribution of classes in the stream is imbalanced. Currently, proper assessment ...
详细信息
Stress is recognized as a factor of predominant disease and in the future the costs for treatment will increase. The presented approach tries to detect stress in a very basic and easy to implement way, so that the cos...
详细信息
The paper describes a method of supervised context classification for an industrial machinery. The main objective of this study is to compare single and ensemble classifiers in order to classify groups of contexts whi...
详细信息
ISBN:
(纸本)9788360810668
The paper describes a method of supervised context classification for an industrial machinery. The main objective of this study is to compare single and ensemble classifiers in order to classify groups of contexts which are based on an operating state of the device. The applied research was conducted with the assumption that only classic and well-practised classification methods would be adopted. The comparison study was carried out using real data recorded from an industrial machinery working underground in a mine in Poland. The achieved results confirm the effectiveness of the proposed approach and also show its limitations.
Building a labeled corpus which contains sufficient data and good coverage along with solving the problems of cost, effort and time is a popular research topic in natural language processing. The problem of constructi...
详细信息
ISBN:
(数字)9783319179964
ISBN:
(纸本)9783319179964;9783319179957
Building a labeled corpus which contains sufficient data and good coverage along with solving the problems of cost, effort and time is a popular research topic in natural language processing. The problem of constructing automatic or semi-automatic training data has become a matter of the research community. For this reason, we consider the problem of building a corpus in phenotype entity recognition problem, classs-specific feature detectors from unlabeled data based on over 10260 unique terms (more than 15000 synonyms) describing human phenotypic features in the Human Phenotype Ontology (HPO) and about 9000 unique terms (about 24000 synonyms) of mouse abnormal phenotype descriptions in the Mammalian Phenotype Ontology. This corpus evaluated on three corpora: Khordad corpus, Phenominer 2012 and Phenominer 2013 corpora with Maximum Entropy and Beam Search method. The performance is good for three corpora, with F-scores of 31.71% and 35.77% for Phenominer 2012 corpus and Phenominer 2013 corpus;78.36% for Khordad corpus.
Automatic systems for estimating operator fatigue have application in safety-critical environments. We develop and evaluate a system to detect fatigue from speech recordings collected from speakers kept awake over a 6...
详细信息
Determining the convex hull, its lower convex hull, and Voronoi diagram of a point set is a basic operation for many applications of patternrecognition, image processing, and datamining. To date, the lower convex hu...
详细信息
ISBN:
(数字)9783319179964
ISBN:
(纸本)9783319179964;9783319179957
Determining the convex hull, its lower convex hull, and Voronoi diagram of a point set is a basic operation for many applications of patternrecognition, image processing, and datamining. To date, the lower convex hull of a finite point set is determined from the entire convex hull of the set. There arises a question "How can we determine the lower convex hull of a finite point set without relying on the entire convex hull?" In this paper, we show that the lower convex hull is wrapped by lower facets starting from an extreme edge of the lower convex hull. Then a direct method for determining the lower convex hull of a finite point set in 3D without the entire convex hull is presented. The actual running times on the set of random points (in the uniform distribution) show that our corresponding algorithm runs significantly faster than the incremental convex hull algorithm and some versions of the gift-wrapping algorithm.
The next big thing in the IT world is Big data. The values generated from storing and processing of Big data cannot be analyzed using traditional computing techniques. The main aim of this paper is to design a scalabl...
详细信息
暂无评论