The conventional 'OR' fusion rule is frequently applied in two pre-determined limits energy detection networks but its overall performance of the false alarm and miss detection probability is generally. The ne...
详细信息
We study the visual learning models that could work efficiently with little ground-truth annotation and a mass of noisy unlabeled data for large scale Web image applications, following the subroutine of semi-supervise...
详细信息
We study the visual learning models that could work efficiently with little ground-truth annotation and a mass of noisy unlabeled data for large scale Web image applications, following the subroutine of semi-supervised learning (SSL) that has been deeply investigated in various visual classification tasks. However, most previous SSL approaches are not able to incorporate multiple descriptions for enhancing the model capacity. Furthermore, sample selection on unlabeled data was not advocated in previous studies, which may lead to unpredictable risk brought by real-world noisy data corpse. We propose a learning strategy for solving these two problems. As a core contribution, we propose a scalable semi-supervised multiple kernel learning method (S 3 MKL) to deal with the first problem. The aim is to minimize an overall objective function composed of log-likelihood empirical loss, conditional expectation consensus (CEC) on the unlabeled data and group LASSO regularization on model coefficients. We further adapt CEC into a group-wise formulation so as to better deal with the intrinsic visual property of real-world images. We propose a fast block coordinate gradient descent method with several acceleration techniques for model solution. Compared with previous approaches, our model better makes use of large scale unlabeled images with multiple feature representation with lower time complexity. Moreover, to address the issue of reducing the risk of using unlabeled data, we design a multiple kernel hashing scheme to identify the “informative” and “compact” unlabeled training data subset. Comprehensive experiments are conducted and the results show that the proposed learning framework provides promising power for real-world image applications, such as image categorization and personalized Web image re-ranking with very little user interaction.
This paper presents a novel WQA (Web Question Answering) approach based on the combination CCG (Combinatory Categorial Grammar) and DL (Description Logic) ontology, in order to promote semantic-level accuracy through ...
详细信息
ISBN:
(纸本)9781467312882
This paper presents a novel WQA (Web Question Answering) approach based on the combination CCG (Combinatory Categorial Grammar) and DL (Description Logic) ontology, in order to promote semantic-level accuracy through deep text understanding capabilities. We propose to take DL based semantic modeling, i.e., translating lambda-expression encoding of question meaning into DL based semantic representations. The advantage of such approach is a seamless exploitation of existing semantic resource coded as DL ontology, which is widespread in such area as the Semantic Web and conceptual modeling. The experiments are conducted with a repository of complex Chinese questions which involves the satisfaction of some object property restrictions. The experimental results show that producing the semantic representations with the combination of CCG parsing and DL reasoning is an effective approach for question understanding at semantic level, in terms of both understanding accuracy promotion and semantic resource exploitation.
This paper investigates the chaos control problem for a class of fractional order unified chaotic systems. By introducing the sliding mode control method, a feedback controller is established to guarantee the asymptot...
详细信息
ISBN:
(纸本)9781467325813
This paper investigates the chaos control problem for a class of fractional order unified chaotic systems. By introducing the sliding mode control method, a feedback controller is established to guarantee the asymptotical stability, and its parameter is obtained in terms of LMI, which can be easily obtained by Matlab's LMI Toolbox. A dynamic compensator is designed to overcome the difficulty of dealing with the nonlinear items in the chaotic system. To reduce the chattering phenomenon, a power reaching law is adopted. The validity of the methods is verified by a numerical example.
Accumulating commonsense knowledge (CK) has proven very useful for many natural language processing tasks. So far the most reliable way of acquisition is still relying on knowledge contributors to offer CK. Unfortunat...
详细信息
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorith...
详细信息
Crowd sourcing (CS) systems offer a new way for businesses and individuals to leverage on the power of mass collaboration to accomplish complex tasks in a divide-and-conquer manner. In existing CS systems, no facility...
Crowd sourcing (CS) systems offer a new way for businesses and individuals to leverage on the power of mass collaboration to accomplish complex tasks in a divide-and-conquer manner. In existing CS systems, no facility has been provided for analyzing the trustworthiness of workers and providing decision support for allocating tasks to workers, which leads to high dependency of the quality of work on the behavior of workers in CS systems as shown in this paper. To address this problem, trust management mechanisms are urgently needed. Traditional trust management techniques are focused on identifying the most trustworthy service providers (SPs) as accurately as possible. Little thoughts were given to the question of how to utilize these SPs due to two common assumptions: 1) an SP can serve an unlimited number of requests in one time unit, and 2) a service consumer (SC) only needs to select one SP for interaction to complete a task. However, in CS systems, these two assumptions are no longer valid. Thus, existing models cannot be directly used for trust management in CS systems. This paper takes the first step towards a systematic investigation of trust management in CS systems by extending existing trust management models for CS trust management and conducting extensive experiments to study and analyze the performance of various trust management models in crowd sourcing. In this paper, the following key contributions are made. We 1) propose extensions to existing trust management approaches to enable them to operate in CS systems, 2) design a simulation test-bed based on the system characteristics of Amazon's Mechanical Turk (AMT) to make evaluation close to practical CS systems, 3) discuss the effect of incorporating trust management into CS system on the overall social welfare, and 4) identify the challenges and opportunities for future trust management research in CS systems.
Some expanded fuzzy rough sets models have been investigated to handle fuzzy databases with uncertain, imprecise and incomplete real-valued information. In this paper, we make further research on fuzzy rough sets mode...
详细信息
Some expanded fuzzy rough sets models have been investigated to handle fuzzy databases with uncertain, imprecise and incomplete real-valued information. In this paper, we make further research on fuzzy rough sets models in fuzzy environment, and we generalize rough fuzzy sets model based on a covering to fuzzy rough sets model based on a fuzzy covering. The lower and upper approximations of fuzzy subsets are defined based on a fuzzy covering, and basic properties are investigated. Then, the axiom definition of the lower approximation operator is given. It is shown that the rough fuzzy sets model based on a covering is a special instance of the fuzzy rough sets model based on a fuzzy covering.
Relational Database Model (RDM) has been proven to be a very useful data-storage technique. As information is stored as data in relational databases, the induction of concepts from data is a pivotal topic in the data ...
详细信息
The motivation for this work was that little is known about the construction of asymmetric quantum error-correcting codes from linear codes over finite rings. In this work, attempts are made to construct asymmetric qu...
详细信息
The motivation for this work was that little is known about the construction of asymmetric quantum error-correcting codes from linear codes over finite rings. In this work, attempts are made to construct asymmetric quantum error-correcting codes from linear codes over finite rings Zp2, where p is any prime. Furthermore, we present explicit parameters for infinite families of asymmetric quantum error correcting codes which derived from linear over finite rings.
暂无评论