This book constitutes the refereed proceedings of the internationalconference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The 163 revised full papers...
ISBN:
(数字)9783642342400
ISBN:
(纸本)9783642342394
This book constitutes the refereed proceedings of the internationalconference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The 163 revised full papers presented were carefully reviewed and selected from 724 submissions. The papers are organized in topical sections on applications of artificial intelligence; applications of computational intelligence; datamining and knowledge discovering; evolution strategy; intelligent image processing; machinelearning; neural networks; patternrecognition.
Ontology is a formal, explicit specification of a shared conceptual model and provides a way for computers to exchange, search and identify characteristics. datamining is a drawing work from areas including database ...
详细信息
We can face with the patternrecognition problems where the influence of hidden context leads to more or less radical changes in the target concept. This paper proposes the mathematical and algorithmic framework for t...
详细信息
In this paper, we study the computer recognition of emotions involved in facial expressions. We propose a recognition system based on a support vector machine (SVM) system as a classifier for detecting of spontaneous ...
详细信息
Nowadays, internet becomes useful source of information in day-to-day life. It creates huge development of World Wide Web in its quantity of interchange and its size and difficulty of websites. Web Usage mining (WUM) ...
详细信息
ISBN:
(纸本)9781467324816;9781467313445
Nowadays, internet becomes useful source of information in day-to-day life. It creates huge development of World Wide Web in its quantity of interchange and its size and difficulty of websites. Web Usage mining (WUM) is one of the main applications of datamining, artificial intelligence and so on to the web data and forecast the user's visiting behaviors and obtains their interests by investigating the samples. Since WUM directly involves in large range of applications, such as, e-commerce, e-learning, Web analytics, information retrieval etc. Weblog data is one of the major sources which contain all the information regarding the users visited links, browsing patterns, time spent on a particular page or link and this information can be used in several applications like adaptive web sites, modified services, customer summary, pre-fetching, generate attractive web sites etc. There are several problems related with the existing web usage mining approaches. Existing web usage mining algorithms suffer from difficulty of practical applicability. So, a novel research is necessary for the accurate prediction of future performance of web users with rapid execution time. WUM consists of preprocessing, pattern discovery and pattern analysis. Log data is characteristically noisy and unclear. Hence, preprocessing is an essential process for effective mining process. In this paper, a novel pre-processing technique is proposed by removing local and global noise and web robots. Anonymous Microsoft Web dataset and *** Anonymous Web dataset are used for estimating the proposed preprocessing technique.
Multiple instance learning, when instances are grouped into bags, concerns learning of a target concept from the bags without reference to their instances. In this paper, we advance the problem with a novel method bas...
详细信息
Feature extraction is a crucial step for face recognition. In this paper, based on Isometric Projections (IsoP), a new feature extraction method called Uncorrelated Discriminant Isometric Projections (UDIsoP) is propo...
详细信息
ISBN:
(数字)9783642340383
ISBN:
(纸本)9783642340376
Feature extraction is a crucial step for face recognition. In this paper, based on Isometric Projections (IsoP), a new feature extraction method called Uncorrelated Discriminant Isometric Projections (UDIsoP) is proposed for face recognition. The aim of UDIsoP is to preserve the within-class geometry structure by taking into account the class label information. Moreover, the features extracted via UDIsoP are statistically uncorrelated with minimum redundancy, which is desirable for many pattern analysis applications. Experiment results on the publicly available ORL and Yale face databases show that the proposed UDIsoP approach provides a better representation of the data and achieves much higher recognition accuracy.
The proceedings contain 92 papers. The topics discussed include: a distributed algorithm for computation of exact voronoi cell in a multi-robotic system;single document extractive text summarization using genetic algo...
ISBN:
(纸本)9781467318259
The proceedings contain 92 papers. The topics discussed include: a distributed algorithm for computation of exact voronoi cell in a multi-robotic system;single document extractive text summarization using genetic algorithms;modified roaming optimization for multi-modal optima;a simulation-oriented channel modeling methodology for human on-body channel communication;computer-assisted approach to anemic erythrocyte classification using blood pathological information;automated detection of apnea and hypopnea events;retinal vessel segmentation using gabor filter and artificial neural network;region selection in handwritten character recognition using artificial bee colony optimization;information system analysis for monitoring of air quality in peri-urban Howrah;a novel approach to nose-tip and eye corners detection using H-K curvature analysis in case of 3D images;gesture classification with machinelearning using kinect sensor data;queen bee inspired scheme for gateway node selection in WSN;and low jitter hybrid phase locked loop.
Bi-directional Associative Memory (BAM) is an artificial neural network that consists of two Hopfield networks. The most important advantage of BAM is the ability to recall a stored pattern from a noisy input, which d...
详细信息
Malicious PDF files have been used to harm computer security during the past two-three years, and modern antivirus are proving to be not completely effective against this kind of threat. In this paper an innovative te...
详细信息
暂无评论