Malicious PDF files have been used to harm computer security during the past two-three years, and modern antivirus are proving to be not completely effective against this kind of threat. In this paper an innovative te...
详细信息
A new method for dimensionality reduction and feature extraction based on Support Vector machines and minimization of the within-class data dispersion is proposed. An iterative procedure is proposed that successively ...
详细信息
Metadata provide a high-level description of digital library resources and represent the key to enable the discovery and selection of suitable resources. However the growth in size and diversity of digital collections...
详细信息
Regression is the study of functional dependency of one numeric variable with respect to another. In this paper, we present a novel, efficient, binary search based regression algorithm having the advantage of low comp...
详细信息
there is a need to facilitate access to the required information in the web and adapting it to the users' preferences and requirements. this paper presents a system that, based on a collaborative filtering approac...
详细信息
Nowadays, Bayesian Networks (BNs) have constituted one of the most complete, self-sustained and coherent formalisms useful for knowledge acquisition, representation and application through computer systems. Yet, the l...
详细信息
the traditional classifier cannot keep its quality, when the concept drift appears. the paper proposes how to protect against classification quality decreasing when concept drift occurs. Invented methods do not train ...
详细信息
ISBN:
(纸本)9783642289309;9783642289316
the traditional classifier cannot keep its quality, when the concept drift appears. the paper proposes how to protect against classification quality decreasing when concept drift occurs. Invented methods do not train classifiers all the time but they try to use earlier gained knowledge about models and switched older model to suitable new one. In this work we assume that the set of models is known and stored as the pool of classifiers. then, by using drift detecting and searching models methods, we can choose the best model. Our propositions and the main characteristics of them were evaluated on the basis of the experiments which were carried out on chosen artificial data set.
this volume proceedings contains revised selected papers from the 4thinternationalconference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. the total o...
ISBN:
(数字)9783642334788
ISBN:
(纸本)9783642334771
this volume proceedings contains revised selected papers from the 4thinternationalconference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. the total of 163 high-quality papers presented were carefully reviewed and selected from 724 submissions. the papers are organized into topical sections on applications of artificial intelligence, applications of computational intelligence, data mining and knowledge discovery, evolution strategy, expert and decision support systems, fuzzy computation, information security, intelligent control, intelligent image processing, intelligent information fusion, intelligent signal processing, machinelearning, neural computation, neural networks, particle swarm optimization, and patternrecognition.
Image annotation plays an important role in content-based image understanding, various machinelearning methods have been proposed to solve this problem. In this paper, label correlation is considered as an undirected...
详细信息
Peer-to-peer (P2P) networking has introduced a major shift in the application and traffic mix of the Internet and established itself as the main driver of increasing traffic volume. the high requirements of some P2P a...
详细信息
暂无评论