In recent years, a number of powerful kernel based learning algorithms like Support Vector machines, Kernel Fisher Discriminant Analysis, Kernel Principal Component Analysis have reported their success in various doma...
详细信息
ISBN:
(纸本)9783642195419
In recent years, a number of powerful kernel based learning algorithms like Support Vector machines, Kernel Fisher Discriminant Analysis, Kernel Principal Component Analysis have reported their success in various domains like signalprocessing, Image processing and Pattern Classification. In a nutshell, a kernel-based algorithm is a nonlinear version of a linear algorithm where the data has been nonlinearly transformed to a higher dimensional space. in which we need to compute the inner products via a kernel function as in [1]. The attractiveness of such algorithm sterns from their elegant treatment of nonlinear problems and their efficacy in high-dimensional space. In this paper, we illustrate a comprehensive review of kernel methods and its usefulness in signalprocessing problems like target detection and target tracking.
The proceedings contain 10 papers. The topics discussed include: context-aware recommender systems: the next frontier;group recommendation in context;context-aware movie recommendation based on signalprocessing and m...
ISBN:
(纸本)9781450308250
The proceedings contain 10 papers. The topics discussed include: context-aware recommender systems: the next frontier;group recommendation in context;context-aware movie recommendation based on signalprocessing andmachinelearning;group-aware prediction with exponential smoothing for collaborative filtering;informative household recommendation with feature-based matrix factorization;SVD-based group recommendation approaches: an experimental study of Moviepilot;temporal rating habits: a valuable tool for rater differentiation;simple time-aware and social-aware user similarity for a KNN-based recommender system;identifying users from their rating patterns;a heuristic approach to identifying the specific household member for a given rating;and mining relational context-aware graph for rater identification.
The proceedings contain 40 papers. The special focus in this conference is on Autonomous and Intelligent Systems. The topics include: Thermal dynamic modeling and control of injection moulding process;analysis of futu...
ISBN:
(纸本)9783642215377
The proceedings contain 40 papers. The special focus in this conference is on Autonomous and Intelligent Systems. The topics include: Thermal dynamic modeling and control of injection moulding process;analysis of future measurement incorporation into unscented predictive motion planning;Nonlinear maneuvering control of rigid formations of fixed wing UAVs;intelligent control system design for a class of nonlinear mechanical systems;trends in the control schemes for bilateral teleoperation with time delay;bilateral teleoperation system with time varying communication delay: Stability and convergence;online incremental learning of inverse dynamics incorporating prior knowledge;experimental comparison of model-based and model-free output feedback control system for robot manipulators;P-map: An intuitive plot to visualize, understand, and compare variable-gain PI controllers;small tree probabilistic roadmap planner for hyper-redundant manipulators;sufficient conditions for global synchronization of continuous piecewise affine systems;question type classification using a part-of-speech hierarchy;exploring wikipedia’s category graph for query classification;combination of error detection techniques in automatic speech transcription;Developing a secure distributed OSGi cloud computing infrastructure for sharing health records;extreme learningmachine with adaptive growth of hidden nodes and incremental updating of output weights;face recognition based on kernelized extreme learningmachine;detection and tracking of multiple similar objects based on color-pattern;Argo Vehicle Simulation of Motion Driven 3D LIDAR Detection and Environment Awareness;signalprocessing and pattern recognition for eddy current sensors, used for effective land-mine detection;A fuzzy logic approach for indoor mobile robot navigation using UKF and customized RFID Communication;human-machinelearning for intelligent aircraft systems.
A language contains complex history and knowledge of human kinds. Hence, we have to conserve the language in order to conserve the history and knowledge of our ancestors to the next generation. Currently, there are a ...
详细信息
From the requirements of inquiry ability in the informational era and new curriculum reform, this article analyzes the deficiencies of scientific inquiry in college, and then introduces the concept of cognitive tools ...
详细信息
At present, many virtual learning communities are just simple two-dimensional replicas of former teaching materials, most virtual learning environments are not capable of realizing multi-person cooperation, and lots o...
详细信息
The neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, however A and B could improve it by taking more information into account, includ...
详细信息
ISBN:
(纸本)9780769539607
The neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, however A and B could improve it by taking more information into account, including queries in the training process of the neural networks. Alternatively A and B are generating an input which is correlated with its state and A or B is asking the partner for the corresponding output bit[7]. The overlap between input and weight vector is so low that the additional information does not reveal much about the internal states. But queries introduce a mutual influence between A and B which is not available to an attacking network E. In this work query incorporated to the case of the Hebbian training rule. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security against cooperating attackers.
On the basis of sufficient analysis to the characteristic of iterative learning control and PID controller parameter tuning, an idea of applying iterative learning control to PID controller parameter tuning was arouse...
详细信息
Kohonen's Self-Organizing Maps (SOM) is a class of typical artificial neural networks (ANN) with unsupervised learning which has been widely used in clustering tasks, dimensionality reduction, data mining, informa...
详细信息
The large macromolecules of the commercially useful polymers must be synthesized from substances having smaller molecules in a process. The proprties of a polymer may be modified and enchanced by the inclusion of addi...
详细信息
暂无评论