the proceedings contain 35 papers. the special focus in this conference is on Machine Learning, Data Mining, Web Mining, Multi-agent Systems, Automatic Reasoning, Decision Algorithms, Multimedia patternrecognition an...
ISBN:
(纸本)9783662449790
the proceedings contain 35 papers. the special focus in this conference is on Machine Learning, Data Mining, Web Mining, Multi-agent Systems, Automatic Reasoning, Decision Algorithms, Multimedia patternrecognition and Information Security. the topics include: Semi-paired probabilistic canonical correlation analysis;using bat algorithm with levy walk to solve directing orbits of chaotic systems;complex proteomes analysis using label-free mass spectrometry- based quantitative approach coupled with biomedical knowledge;online migration solver based on instructions statistics;extracting part-whole relations from online encyclopedia;topic detection and evolution analysis on microblog;adaptive mechanism based on shared learning in multi-agent system;an agent-based autonomous management approach to dynamic services;research and application analysis of feature binding mechanism;verification of branch-time property based on dynamic description logic;dynamic description logic based on DL-Lite;formalizing the matrix inversion based on the adjugate matrix in HOL4;a heuristic approach to acquisition of minimum decision rule sets in decision systems;cooperative decision algorithm for time critical assignment without explicit communication;using PDDL to solve vehicle routing problems;automated localization and accurate segmentation of optic disc based on intensity within a minimum enclosing circle;a traffic camera calibration method based on multi-rectangle;a multi-instance multi-label learning framework of image retrieval;the retrieval of shoeprint images based on the integral histogram of the Gabor transform domain;scene classification using spatial and color features;multipath convolutional-recursive neural networks for object recognition;identification of co-regulated gene network by using path consistency algorithm based on gene ontology and efficient integrity protection for P2P streaming.
the discriminative training of classifiers for handwritten Chinese character recognition (HCCR) is highly demanding in computation due to the large number of categories. the inability of discriminative training with l...
详细信息
ISBN:
(纸本)9781479901937
the discriminative training of classifiers for handwritten Chinese character recognition (HCCR) is highly demanding in computation due to the large number of categories. the inability of discriminative training with large sample set on personal computers has hindered the accuracy promotion for HCCR. To overcome this problem, we have implemented the training algorithm of discriminative learning quadratic discriminant function (DLQDF) on our graphics processing units (GPU) server, and have achieved 15 times speedup compared to single-core computation. By enlarging training sample set via distortion on a standard dataset of 3,755 classes, we could train the DLQDF on more than 50 million samples within 150min and get the test accuracy improved by 1.36%.
We report on the third international Competition on Handwritten Mathematical Expression recognition (CROHME), in which eight teams from academia and industry took part. For the third CROHME, the training dataset was e...
详细信息
We report on the third international Competition on Handwritten Mathematical Expression recognition (CROHME), in which eight teams from academia and industry took part. For the third CROHME, the training dataset was expanded to over 8000 expressions, and new tools were developed for evaluating performance at the level of strokes as well as expressions and symbols. As an informal measure of progress, the performance of the participating systems on the CROHME 2012 data set is also reported. Data and tools used for the competition will be made publicly available.
this paper discusses a prototype of a temporal pattern predictor, which was built on specifications derived from the descriptions of the "Ergotrix" temporal memory network in Valentino Braitenberg s "Ve...
详细信息
Hidden Markov models are well-known methods for image processing. they are used in many areas where 1D data are processed. In the case of 2D data, there appear some problems with application HMM. there are some soluti...
详细信息
ISBN:
(纸本)9783642386572
Hidden Markov models are well-known methods for image processing. they are used in many areas where 1D data are processed. In the case of 2D data, there appear some problems with application HMM. there are some solutions, but they convert input observation from 2D to 1D, or create parallel pseudo 2D HMM, which is set of 1D HMMs in fact. this paper describes authentic 2D HMM with two-dimensional input data, and its application for patternrecognition in image processing.
the proceedings contain 96 papers. the topics discussed include: a study of requirement definition in user-oriented virtual network architecture;approaches to analyze requirements of billing management for cloud compu...
ISBN:
(纸本)9781479901746
the proceedings contain 96 papers. the topics discussed include: a study of requirement definition in user-oriented virtual network architecture;approaches to analyze requirements of billing management for cloud computing services;instant distributed minimum diameter tree construction for scalable application layer multicast;adaptation of region growing thresholds using the memetic programming algorithm;a framework for evaluating software design pattern specification languages;analysis of impression received from reverse perspective illusion to create innovative advertising;analysis of programming competency for PEAS system innovation - PEAS system: programming experience assessment scale system;layout-tree-based approach for identifying visually similar blocks in a web page;mapping of nearest neighbor for classification;and developing an argumentation support system for face-to-face collaborative learning.
We propose a statistical learning model for classifying cognitive processes based on distributed patterns of neural activation in the brain, acquired via functional magnetic resonance imaging (fMRI). In the proposed l...
详细信息
this book constitutes the thoroughly refereed workshop proceedings of the Second international Workshop on Medical Computer Vision, MCV 2012, held in Nice, France, October 2012 in conjunction withthe 15th Internation...
ISBN:
(数字)9783642366208
ISBN:
(纸本)9783642366192;9783642366208
this book constitutes the thoroughly refereed workshop proceedings of the Second international Workshop on Medical Computer Vision, MCV 2012, held in Nice, France, October 2012 in conjunction withthe 15thinternationalconference on Medical Image computing and Computer Assisted Intervention, MICCAI 2012. the 24 papers have been selected out of 42 submissions. At MCV 2012, 12 papers were presented as a poster and 12 as a poster together with a plenary talk. the book also features four selected papers which were presented at the previous CVPR Medical Computer Vision workshop held in conjunction withthe internationalconference on Computer Vision and patternrecognition on June 21 2012 in Providence, Rhode Island, USA. the papers explore the use of modern computer vision technology in tasks such as automatic segmentation and registration, localization of anatomical features and detection of anomalies, as well as 3D reconstruction and biophysical model personalization.
A core concept in geoscience/physical science research is the concept of transport. We present an ontology design pattern for the notion of transport in the geosciences using natural language coupled with a concept ma...
New communications technologies have revolutionized human interaction. One of the main features of this new order is an explosion of relationships a person can establish and the issues that she can start. However, kee...
详细信息
ISBN:
(纸本)9783642386091
New communications technologies have revolutionized human interaction. One of the main features of this new order is an explosion of relationships a person can establish and the issues that she can start. However, keeping control of the course of these relationships has become a very complex issue. this paper presents a generic platform for implementing social networks which aim to establish serious relationships between people based on their membership to affinity groups. the proposed social network platform uses an artificial intelligence approach which has been designated as Ubiquitous Artificial Intelligence. the basis of this approach is a multi-agent architecture that integrates a variety of patternrecognition algorithms to determine the profiles of social network use along with mobile expert systems that assist the user in their social network communication from the mobile. this approach also uses a specific ontology of the social network that simplifies communication and makes it safer.
暂无评论