The proceedings contain 85 papers. The topics discussed include: entity attribute alignment method based on attribute value distribution;solving the lunar lander problem with multiple uncertainties using a deep Q-lear...
ISBN:
(纸本)9798400707988
The proceedings contain 85 papers. The topics discussed include: entity attribute alignment method based on attribute value distribution;solving the lunar lander problem with multiple uncertainties using a deep Q-learning based short-term memory agent;sentiment analysis of Weibo text using a deep combination model;an ontology-enhanced knowledge graph embedding method;Chinese event extraction algorithm of multi-information semantic enhancements;comparative analysis of classification methods for diagnosing myasthenia gravis based on lumbar electromyography;rare association rule mining based on reinforcement learning;research on identification and prediction of financial fraud of listed companies based on machine learning;using process enhancement to predict organizational citizenship behavior via the role of sustainable training practices;self-supervised contrastive few-shot learning for motor imagery brain-computer interfaces;and a wearable brain-computer interface system for fatigue detection in driving.
Reservoir computing (RC), a framework for recurrent neural networks, is adept at learning the dynamics of time series data. RC, requiring less computational cost for training than traditional recurrent neural networks...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
Reservoir computing (RC), a framework for recurrent neural networks, is adept at learning the dynamics of time series data. RC, requiring less computational cost for training than traditional recurrent neural networks, is versatile in applications such as time series generation, prediction, patternrecognition, and robot control. Recently, the integration of physical system dynamics, particularly oscillatory phenomena, into RC has been explored. This study presents an RC model incorporating oscillators with hysteresis as network elements, focusing on their ubiquitous nature. In speech patternrecognition, the audio waveform, a complex vibration pattern of air, is typically preprocessed into a frequency component time series. This study, however, attempts patternrecognition by using the raw speech waveform as the direct input to the oscillator-based reservoir. The application of this model in recognizing and classifying time series vocal data is investigated, including an assessment of the oscillator elements' bifurcation parameter on RC performance.
The proceedings contain 98 papers. The topics discussed include: multi-scale channel attention for Chinese scene text recognition;recognition of human walking motion using a wearable camera;an efficient lightweight sp...
ISBN:
(纸本)9781450397056
The proceedings contain 98 papers. The topics discussed include: multi-scale channel attention for Chinese scene text recognition;recognition of human walking motion using a wearable camera;an efficient lightweight spatio-temporal attention module for action recognition;rice disease recognition and feature visualization using a convolutional neural network;vehicle re-identification based on multi-scale attention feature fusion;improving pedestrian attribute recognition with dual adaptive fusion attention;coordinate attention-enabled ship object detection with electro-optical image;few-shot object detection via refining eigenspace;object detection algorithm based on coordinate attention and context feature enhancement;Swin transformer with multi-scale residual attention for semantic segmentation of remote sensing images;drivable area segmentation in unstructured roads for autonomous vehicles based on multi-sensor fusion;and a brief comparison of deep learning methods for semantic segmentation.
patterns are crucial for efficiently scheduling microservice workflow applications to containers in cloud computing scenarios. However, it is challenging to learn patterns of microservice workflows because of their co...
详细信息
patterns are crucial for efficiently scheduling microservice workflow applications to containers in cloud computing scenarios. However, it is challenging to learn patterns of microservice workflows because of their complex precedence constrained structures provided by users with more lightweighted, diversified, and personalized services. In this paper, we propose a graph neural network is designed to identify patterns within a set of microservice workflows by mining the common substructures of workflows. Based on the learned patterns, a pattern-based scheduling algorithm framework is developed for microservice workflows with soft deadline constraints to minimize the average tardiness. A sorting strategy is introduced based on urgency and pattern coverage rate. For simplification of the task sorting process, the pattern-based task sorting algorithm (PB-TS) is devised. Furthermore, a resource selection phase is incorporated to the pattern-based resource selection algorithm (PB-RS) to minimize the candidate resource space. Experimental results demonstrate the proposed method is much efficient as compared to three classical algorithms.
We present an approach to accelerate Neural Field training by efficiently selecting sampling locations. While Neural Fields have recently become popular, it is often trained by uniformly sampling the training domain, ...
ISBN:
(纸本)9798350353006
We present an approach to accelerate Neural Field training by efficiently selecting sampling locations. While Neural Fields have recently become popular, it is often trained by uniformly sampling the training domain, or through handcrafted heuristics. We show that improved convergence and final training quality can be achieved by a soft mining technique based on importance sampling: rather than either considering or ignoring a pixel completely, we weigh the corresponding loss by a scalar. To implement our idea we use Langevin Monte-Carlo sampling. We show that by doing so, regions with higher error are being selected more frequently, leading to more than 2x improvement in convergence speed. The code and related resources for this study are publicly available at project page.
This manuscript focuses on a real-time pattern detection system using smart musical instruments, and its importance in Internet of Musical Things (IoMusT) applications, where smart musical instruments equipped with wi...
详细信息
ISBN:
(纸本)9798400709685
This manuscript focuses on a real-time pattern detection system using smart musical instruments, and its importance in Internet of Musical Things (IoMusT) applications, where smart musical instruments equipped with wireless connectivity and embedded computing devices can detect musical patterns and use them as controls for various peripheral devices. The demonstration showcases a pattern detection algorithm controlled by a digital musical instrument. The algorithm is capable of identifying pre-defined patterns during live performances and using them to trigger peripheral devices and other stage equipment. The demo features two smart musical instruments, a smart guitar, and a smart keyboard, each equipped with embedded computing devices running the real-time pattern detection algorithm.
This paper studies a patternrecognition method for English online discussion text mining data based on corpus, aiming to reveal the main language patterns and potential information structures in online discussions. B...
详细信息
Human activity recognition is a key challenge in pervasive computing and its solutions have been presented based on various disciplines. Specifically, for human activity recognition in smart spaces without privacy and...
详细信息
ISBN:
(纸本)9798350376975;9798350376968
Human activity recognition is a key challenge in pervasive computing and its solutions have been presented based on various disciplines. Specifically, for human activity recognition in smart spaces without privacy and accessibility issues, data streams generated by deployed ambient sensors are leveraged. In this paper, we focus on group activities by which a group of users perform a collaborative task without user identification and propose an efficient group activity recognition scheme that extracts causality patterns from ambient sensor event sequences, to support as good recognition accuracy as the state-of-the-art models with missing or false data tolerance. To filter out irrelevant noise events from a given data stream, a set of rules is leveraged to highlight causally related events. Then, a pattern-tree algorithm extracts frequent causal patterns by means of a growing tree structure. Based on the extracted patterns, a weighted sum-based pattern-matching algorithm computes the likelihood of stored group activities to the given test event sequence using matched event pattern counts for group activity recognition. We evaluate the proposed scheme using the data collected from real-world testbed and open datasets where users perform their tasks on a daily basis. Experiment results show that the proposed scheme performs higher recognition accuracy and is tolerant to missing or false data with a smaller amount of runtime overhead than the existing schemes.
This paper introduces a novel, lightweight, on-board approach to crowd pattern identification, ingeniously using the processes of existing video compression standards, particularly H.264 or MPEG-4. Piggy-backing on th...
详细信息
ISBN:
(纸本)9798350326031;9798350326048
This paper introduces a novel, lightweight, on-board approach to crowd pattern identification, ingeniously using the processes of existing video compression standards, particularly H.264 or MPEG-4. Piggy-backing on the H.264 video-encoding algorithm, we propose real-time crowd patternrecognition and identification methodologies that can identify macroscopic patterns in as low as 2 milliseconds on NVIDIA TX2, resulting in around 45x execution time reduction compared to existing approaches. Furthermore, we introduce a temporally aware approach to pinpoint and adapt to crowd movement patterns, continuously recalibrating as a drone's Point Of View (POV) varies or observed motions diverge. Evaluating our method against publicly available datasets, we emphasize our system's performance and computational advantages, especially when faced with real-time observational shifts. In conclusion, our approach elegantly bridges the gap between crowd safety imperatives and the challenges of UAV monitoring, heralding a new era of real-time drone-centric crowd management intelligence.
The proceedings contain 28 papers. The special focus in this conference is on Image Processing, Computer Vision, and patternrecognition. The topics include: Image-Based Seal recognition: Approaches and Challenge...
ISBN:
(纸本)9783031859328
The proceedings contain 28 papers. The special focus in this conference is on Image Processing, Computer Vision, and patternrecognition. The topics include: Image-Based Seal recognition: Approaches and Challenges in Current Automated Systems;Deep Learning Techniques for Lunar Impact Crater Identification Based on CCD and DEM Data;silicon Wafer Map Defect Classification Using Artificial Intelligence Models;low Light Image Enhancement Using Autoencoder-Based Deep Neural Networks;towards Elephants Intelligent Monitoring in Zakouma National Park, Chad;a Review of Multi-modal and Multi-view Applications in Hand-Drawn Sketch Images;residential Real Estate Image Classification for Property Valuation;Novel Method to Investigate Decay in Rotting Bananas Using RGB Color Images;lalitha: A Hand Gesture-Based Computer Control System;dishari: A Novel Gesture-Based Educational Application for Specially Challenged People;mobility Anomaly Detection with Intelligent Video Surveillance;Weakly-Supervised Video Anomaly Detection Using Modified Anomaly Score Module and Modified BERT;Contour Detection of Seeds Based on Traditional and Convolutional Neural Network (CNN) Based Algorithms;Early Detection of Lameness in Dairy Cattle Using Activity Data, Image Analysis, AI and ML - An Approach for Improved Animal Welfare and Economic Impact;implications for Designing Hawks Detection with Data Augmentation and Network Optimizations;a Review of Detecting and Quantification of Cracks Using Convolutional Neural Networks and Image Processing Techniques;using Linkage Context for Automated Correction in Unsupervised Entity Resolution;the Rising Threat Against Modern Technology in Cybersecurity;an Online Bookstore Design and Implementation;cybersecurity: Sight and Foresight;the Application of Blockchain Technology in the Transmission of Semiconductor Process Recipes;the Use of Social Media and the Internet for the Facilitation of Human Trafficking.
暂无评论