machine learning methods have been applied to infer activities of users. However, the small number of training samples and their primitive representation often complicates the learning task. In order to correctly infe...
详细信息
Content-based image retrieval (CBIR) has attracted people39;s attention for many years,while the semantic gap and curse of dimensionality are still two open questions of *** this paper,we propose a new interactive i...
详细信息
Content-based image retrieval (CBIR) has attracted people's attention for many years,while the semantic gap and curse of dimensionality are still two open questions of *** this paper,we propose a new interactive image retrieval method based on locality-sensitive hashing (LSH) and support vector machine (SVM):LSH is adopted to overcome the curse of dimensionality and a SVM-based relevance feedback (RF) scheme is introduced to shorten the semantic *** experimental results show the effectiveness of the proposed method.
The bearing of rotating machine often fails due to the frictional forces of rolling element, such frictional forces often generate a series of ultrasound, and that is to say, there must be some necessary relationships...
详细信息
ISBN:
(纸本)9783037853726
The bearing of rotating machine often fails due to the frictional forces of rolling element, such frictional forces often generate a series of ultrasound, and that is to say, there must be some necessary relationships between the faults of rotating machinery equipment and the ultrasound from the equipment. In this paper, the histogram method which is the simplest method in statistics is used to analyze the ultrasonic signals. Through the analysis, the bearing faults could be preliminarily diagnosed. A verification research with respect to vibration method is carried out to analyze the effectiveness and superiority of ultrasonic method by using the histogram. Extensive experiments have been performed in a bearing vibration measuring instrument, and the results indicated that the fault diagnosis method based on the ultrasonic amplitude histogram is more useful than the method based on the vibration amplitude histogram. In addition, it is more sensitive and more effective than the method based on vibration amplitude histogram.
A mechanism for describing 3-D local geometries is presented which is suitable for input into a classifier generator. The objective is to predict the springback that will occur when Asymmetric Incremental Sheet Formin...
详细信息
This paper presents a new simple and robust set of features to classify emotional states in sequences of facial images. The proposed method is derived from simple geometric-based features that deliver a fast, highly d...
详细信息
ISBN:
(纸本)9783642335648;9783642335631
This paper presents a new simple and robust set of features to classify emotional states in sequences of facial images. The proposed method is derived from simple geometric-based features that deliver a fast, highly discriminative, low-dimensional, and robust classification across individuals. The proposed method was compared to other state-of-the-art methods such as Gabor, LBP and AAM-based features. They were all compared using four different classifiers and experimental results based on these classifiers have shown that the proposed features are more stable in "leave-same-sequence-image-out" (LSSIO) environments, less computational intense and faster when compared to others.
The proceedings contain 21 papers. The topics discussed include: building general purpose security services on trusted computing;enforcing sticky policies with TPM and virtualization;mass transit ticketing with NFC mo...
ISBN:
(纸本)9783642322976
The proceedings contain 21 papers. The topics discussed include: building general purpose security services on trusted computing;enforcing sticky policies with TPM and virtualization;mass transit ticketing with NFC mobile phones;anonymous ticketing for NFC-enabled mobile phones;some improvements to the cost-based framework for analyzing denial of service attacks;computationally sound symbolic analysis of EAP-TNC protocol;a technique for remote detection of certain virtual machine monitors;indifferentiability of domain extension modes for hash functions;multicollisions and graph-based hash functions;a general, flexible and efficient proof of inclusion and exclusion;MQQ-SIG: an ultra-fast and provably CMA resistant digital signature scheme;multifactor authenticated key renewal;restricted identification scheme and Diffie-Hellman linking problem;and mixed-strategy game based trust management for clustered wireless sensor networks.
The automatic scheduling is not suitable for manufacture in most case, because it cannot fully utilize the experience of the operator and effectively response the disturbance events from the production progress. In or...
详细信息
ISBN:
(纸本)9783037853702
The automatic scheduling is not suitable for manufacture in most case, because it cannot fully utilize the experience of the operator and effectively response the disturbance events from the production progress. In order to solve these problems the manual scheduling technology using the pattern of human-computer collaborative is proposed. The graphical scheduling block has been discrete through applying the kernel methods including the combination of multi-layer displaying of Gantt-Chart, the model of machine calendar, mouse selected mechanism and auxiliary function for manual scheduling. By building multi-layer normative modular manual scheduling operations, we divide the manual scheduling operation into three steps: the selection of manual scheduling process, the selection of the inserting base, and the inserting mode. At the same time constrains transferring mode provoked by the three kinds of inserting mode is analyzed. By controlling constrains in the progress of the manual adjustment makes sure that the manual scheduling result meets the demand of job shop production. Finally, the algorithms in this paper are validated by the software developed with C++.
To date, the majority of sentiment analysis research has focused on English language. Recent studies, however, show that non-native English speakers heavily support the growing use of Internet. Chinese, specifically, ...
详细信息
Retrieving information from Twitter is always challenging due to its large volume, inconsistent writing and noise. Most existing information retrieval (IR) and text mining methods focus on term-based approach, but suf...
详细信息
This paper reports some pioneering results in which optimal parametric classification is achieved in a counter-intuitive manner, quite opposed to the Bayesian paradigm. The paper, which builds on the results of [1], d...
详细信息
ISBN:
(纸本)9783642312953
This paper reports some pioneering results in which optimal parametric classification is achieved in a counter-intuitive manner, quite opposed to the Bayesian paradigm. The paper, which builds on the results of [1], demonstrates (with both theoretical and experimental results) how this can be done for some distributions within the exponential family. To be more specific, within a Bayesian paradigm, if we are allowed to compare the testing sample with only a single point in the feature space from each class, the optimal Bayesian strategy would be to achieve this based on the (Mahalanobis) distance from the corresponding means, which in one sense, is the most central point in the respective distribution. In this paper, we shall show that we can obtain optimal results by operating in a diametrically opposite way, i.e., a so-called "anti-Bayesian" manner. Indeed, we shall show that by working with a very few (sometimes as small as two) points distant from the mean, one can obtain remarkable classification accuracies. These points, in turn, are determined by the Order Statistics of the distributions, and the accuracy of our method, referred to as Classification by Moments of Order Statistics (CMOS), attains the optimal Bayes' bound! In this paper, we shall show the claim for two uni-dimensional members of the exponential family. The theoretical results, which have been verified by rigorous experimental testing, also present a theoretical foundation for the families of Border Identification (BI) reported algorithms.
暂无评论