Speech signal is temporally and acoustically varies. recognition of speech by static input neural network requires temporal normalization of the speech to be equal to the number of input nodes of the NN while maintain...
详细信息
Speech signal is temporally and acoustically varies. recognition of speech by static input neural network requires temporal normalization of the speech to be equal to the number of input nodes of the NN while maintaining the properties of the speech. This paper compares three methods for speech temporal normalization namely the linear, extended linear and zero padded normalizations on isolated speech using different sets of learning parameters on multi layer perceptron neural network with adaptive learning. Although, previous work shows that linear normalization able to give high accuracy up to 95% on similar problem, the result in this experiment shows the opposite. The experimental result shows that zero padded normalization outperformed the two linear normalization methods using all the parameter sets tested. The highest recognition rate using zero padded normalization is 99% while linear and extended linear normalizations give only 74% and 76% respectively. This paper end before conclusion by comparing data used from previous work using linear normalization which gave high accuracy and the data used in this experiment which perform poorer.
Edge detection is one of the most commonly used operations in image processing and patternrecognition, the reason for this is that edges form the outline of an object. An edge is the boundary between an object and th...
详细信息
ISBN:
(纸本)9781424451043
Edge detection is one of the most commonly used operations in image processing and patternrecognition, the reason for this is that edges form the outline of an object. An edge is the boundary between an object and the background, and indicates the boundary between overlapping objects. This means that if the edges in an image can be identified accurately, all of the objects can be located and basic properties such as area, perimeter, and shape can be measured. Since computer vision involves the identification and classification of objects in an image, edge detection is an essential tool. Efficient and accurate edge detection will lead to increase the performance of subsequent image processing techniques, including image segmentation, object-based image coding, and image retrieval. A novel color edge detection algorithm is proposed in this paper. On the basis of standard deviation calculation of pixels the discontinuity among the pixels are detected. Then the image is segmented into a binary image with a fixed threshold where black pixels signify homogeneous region and white pixels signify edges. Finally, a thinning technique is applied to extract thin edges. The proposed method is applied over large database of color images both synthetic and real life images and performance of the algorithm is evident from the results and is comparable with other edge detection algorithms.
Based on the principle of one-against-one support vector machines (SVMs) multi-class classification algorithm, this paper proposes an extended SVMs method which couples adaptive resonance theory (ART) network to recon...
详细信息
Based on the principle of one-against-one support vector machines (SVMs) multi-class classification algorithm, this paper proposes an extended SVMs method which couples adaptive resonance theory (ART) network to reconstruct a multi-class classifier. Different coupling strategies to reconstruct a multi-class classifier from binary SVM classifiers are compared with application to fault diagnosis of transmission line. Majority voting, a mixture matrix and self-organizing map (SOM) network are compared in reconstructing the global classification decision. In order to evaluate the method's efficiency, one-against-all, decision directed acyclic graph (DDAG) and decision-tree (DT) algorithm based SVM are compared too. The comparison is done with Simulations and the best method is validated with experimental data. (c) 2008 Elsevier Ltd. All rights reserved.
Edge detection is one of the most commonly used operations in image processing and patternrecognition, the reason for this is that edges form the outline of an object. An edge is the boundary between an object and th...
详细信息
ISBN:
(纸本)9781424451043
Edge detection is one of the most commonly used operations in image processing and patternrecognition, the reason for this is that edges form the outline of an object. An edge is the boundary between an object and the background, and indicates the boundary between overlapping objects. This means that if the edges in an image can be identified accurately, all of the objects can be located and basic properties such as area, perimeter, and shape can be measured. Since computer vision involves the identification and classification of objects in an image, edge detection is an essential tool. Efficient and accurate edge detection will lead to increase the performance of subsequent image processing techniques, including image segmentation, object-based image coding, and image retrieval. A color image edge detection algorithm is proposed in this paper. Average maximum color difference value is used to predict the optimum threshold value for a color image and thinning technique is applied to extract proper edges. The proposed method is applied over large database of color images both synthetic and real life images and performance of the algorithm is evident from the results and is comparable with other edge detection algorithms.
In the past few years, a number of scholars trained in computer vision;patternrecognition, image processing, computer graphics;and art history have developed rigorous computer methods for addressing an increasing num...
详细信息
ISBN:
(纸本)9783642037665
In the past few years, a number of scholars trained in computer vision;patternrecognition, image processing, computer graphics;and art history have developed rigorous computer methods for addressing an increasing number of problems in the history of art. In some cases;these computer methods are more accurate than even highly trained connoisseurs, art historians and artists. Computer graphics models of artists' studios and subjects allow scholars to explore "what if" scenarios and determine artists' studio praxis. Rigorous computer ray-tracing software sheds light;on claims that;some artists employed optical tools. Computer methods win not replace tradition art historical methods of connoisseurship but enhance and extend them. As such, for these computer methods to be useful to the art community, they must continue to be refilled through application to a variety of significant art historical problems.
Although linear regression is a simple and useful method to build process models, they do not always function well in practice due to not only changes in process characteristics but differences of specifities between ...
详细信息
The capability to support plethora of new diverse applications has placed Wireless Sensor Network (WSN) technology at threshold of an era of significant potential growth. In this paper, an attempt is made to analyze e...
详细信息
Analysis of gene expression data includes classification of the data into groups and subgroups based on similar expression patterns. Standard clustering methods for the analysis of gene expression data only identifies...
详细信息
Analysis of gene expression data includes classification of the data into groups and subgroups based on similar expression patterns. Standard clustering methods for the analysis of gene expression data only identifies the global models while missing the local expression patterns. In order to identify the missed patterns biclustering approach has been introduced. Various biclustering algorithms have been proposed by scientists. Among them binary inclusion maximal algorithm (BiMax) forms biclusters when applied on a gene expression data through divide and conquer approach. The worst-case running-time complexity of BiMax for matrices containing disjoint biclusters is O(nmb) and for arbitrary matrices is of order O(nmb min{n, m}) where b is the number of all inclusion-maximal biclusters in matrix. In this paper we present an improved algorithm, BiSim, for biclustering which is easy and avoids complex computations as in BiMax. The complexity of our approach is O(n*m) for n genes and m conditions, i.e, a matrix of size n*m. Also it avoids extra computations within the same complexity class and avoids missing of any biclusters.
Many drawbacks has been found in Hu's moment Invariant or known as Geometric Moment Invariant (GMI). Due to its flexibility. GMI is still widely used by the researchers until now. This paper proposes an alternativ...
详细信息
ISBN:
(纸本)9783642024566
Many drawbacks has been found in Hu's moment Invariant or known as Geometric Moment Invariant (GMI). Due to its flexibility. GMI is still widely used by the researchers until now. This paper proposes an alternative approach, Weighted Aspect Moment Invariant (WAMI) by combining Weighted Central Moment (WCM) and Aspect Moment Invariant (AsMI) to solve GMI's drawbacks in term of noise and unequal data scaling. Various insect images are used in this study with two different sizes as simulation images. The simulation results show that the proposed WAMI improves inter-class and intra-class criteria for unequally scaling data compared to AsMI.
This paper describes a machine vision system with back lighting illumination and friendly man-machine interface. Subtraction is used to segment target holes quickly and accurately. The oval obtained after tracing boun...
详细信息
ISBN:
(纸本)9781424447947
This paper describes a machine vision system with back lighting illumination and friendly man-machine interface. Subtraction is used to segment target holes quickly and accurately. The oval obtained after tracing boundary is processed by Generalized Hough Transform to acquire the target's center. Marked-hole's area, perimeter and moment invariants are extracted as cluster features. The auto-scoring software, programmed by Visual C++, has successfully solved the recognition of off-target and overlapped holes through alarming surveillance and bullet tacking programs. The experimental results show that, when the target is distorted obviously, the system can recognize the overlapped holes on real time and also clusters random shape holes on the target correctly. The high accuracy, fast computing speed, easy debugging and low cost make the system can be widely used.
暂无评论