Regression is the study of functional dependency of one numeric variable with respect to another. In this paper, we present a novel, efficient, binary search based regression algorithm having the advantage of low comp...
详细信息
One of the serious problems of modern patternrecognition is concept drift i.e., model changing during exploitation of a given classifier. the paper proposes how to adapt a single classifier system to the new model wi...
详细信息
ISBN:
(纸本)9783642284878
One of the serious problems of modern patternrecognition is concept drift i.e., model changing during exploitation of a given classifier. the paper proposes how to adapt a single classifier system to the new model without the knowledge of correct classes. the proposed simulated concept recurrence is implemented in the non-recurring concept shift scenario without the drift detection mechanism. We assume that the model could change slightly, what allows us to predict a set of possible models. Quality of the proposed algorithm was estimated on the basis of computer experiment which was carried out on the benchmark dataset.
Metadata provide a high-level description of digital library resources and represent the key to enable the discovery and selection of suitable resources. However the growth in size and diversity of digital collections...
详细信息
data stream is one emerging topic of datamining, it concerns many applications involving large and temporal data sets such as telephone records data, banking data, multimedia data,... For mining of such data, one cru...
详细信息
the proceedings contain 52 papers. the topics discussed include: multi-view video dissemination and delivery: challenges and solutions;binary SIFT: towards efficient feature matching verification for image search;Touc...
ISBN:
(纸本)9781450316002
the proceedings contain 52 papers. the topics discussed include: multi-view video dissemination and delivery: challenges and solutions;binary SIFT: towards efficient feature matching verification for image search;TouchPaper ? an augmented reality application with cloud-based image recognition service;a transmission scheme for opportunistic networks with social selfish nodes;face recognition method based on dynamic threshold local binary pattern;training support vector machinethrough redundant data reduction;facial expression recognition using geometric and appearance features;cross community news event summary generation based on collaborative ranking;robust hand tracking by integrating appearance, location and depth cues;unsupervised human skeleton extraction from kinect depth images;real-time fingertip tracking and detection using kinect depth sensor for a new writing-in-the air system;and simulated annealing ant colony algorithm based on backfire method for QAP.
Nowadays, Bayesian Networks (BNs) have constituted one of the most complete, self-sustained and coherent formalisms useful for knowledge acquisition, representation and application through computer systems. Yet, the l...
详细信息
Image annotation plays an important role in content-based image understanding, various machinelearning methods have been proposed to solve this problem. In this paper, label correlation is considered as an undirected...
详细信息
the quality of extracted features is the key issue to text mining due to the large number of terms, phrases, and noise. Most existing text mining methods are based on term-based approaches which extract terms from a t...
详细信息
Kernel-based methods have gained great attention by researchers in the field of patternrecognition and statistical machinelearning. they are the most nominated algorithms whenever a non-linear classification model i...
详细信息
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medica...
详细信息
ISBN:
(纸本)9780819490261
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked withthe private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. this paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. this paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.
暂无评论