High precision is vital to the success of just-in-time information retrieval system. This paper attempts to improve it from two aspects: better understanding the user's current need and providing a highly relevant...
详细信息
To acquire the optimal coding mode of each macroblock, the H.264/AVC encoder exhaustively calculates the rate-distortion cost for all available modes and chooses the minimum one as the best mode. Therefore, the mode d...
详细信息
In this paper, we propose a vehicle detection method based on AdaBoost. We focus on the detection of front-view car and bus with occlusions on highway. Samples with different occlusion situations are selected into the...
详细信息
Efficient coding hypothesis provides a quantitative relationship between environmental statistics and neural processing. In this paper, we put forward a novel sparse coding model based on structural similarity (SS-SC)...
详细信息
We describe a method for filtering object category from a large number of noisy images. This problem is particularly difficult due to the greater variation within object categories and lack of labeled object images. O...
详细信息
ISBN:
(纸本)9781424456536;9781424456543
We describe a method for filtering object category from a large number of noisy images. This problem is particularly difficult due to the greater variation within object categories and lack of labeled object images. Our method deals with it by combining a co-training algorithm CoBoost [7] with two features - 1st and 2nd order features, which define bag of words representation and spatial relationship between local features respectively. We iteratively train two boosting classifiers based on the 1st and 2nd order features, during which each classifier provides labeled data for the other classifier. It is effective because the 1st and 2nd order features make up an independent and redundant feature split. We evaluate our method on Berg dataset and demonstrate the precision comparative to the state-of-the-art.
This paper describes the ICT Statistical Machine Translation systems that used in the evaluation campaign of the International Workshop on Spoken Language Translation (IWSLT) 2009. For this year's evaluation, we p...
详细信息
Zadeh proposed that there are three basic concepts that underlie human cognition: granulation, organization and causation and a granule being a clump of points (objects) drawn together by indistinguishability, similar...
详细信息
Zadeh proposed that there are three basic concepts that underlie human cognition: granulation, organization and causation and a granule being a clump of points (objects) drawn together by indistinguishability, similarity, proximity or functionality. In this paper, we give out a novel definition of Granular computing which can be easily treated by neural network. Perception learning as granular computing tries to study the machine learning from perception information sampling to dimensional reduction and samples classification in a granular way, and can be summaries as two kind approaches:(1) covering learning, (2) svm kind learning. We proved that although there are tremendous algorithms for dimensional reduction and information transformation, their ability can't transcend wavelet kind nested layered granular computing which are very easy for neural network processing.
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we p...
详细信息
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-thc-middle attack and successfully protecting AP from SYN Flood attack than other existing approaches.
In this paper, an improved method of calculating ontology semantic similarity is proposed to enhance the information retrieval recall and precision. To filter out the document which have smaller related degree with or...
详细信息
In this paper, an improved method of calculating ontology semantic similarity is proposed to enhance the information retrieval recall and precision. To filter out the document which have smaller related degree with original query, the scores of search results document is re-calculated by use of ontology semantic similarity. A new definition of the iterative query expansion parameters is put forward which can reduce the number of expansion and further improve the efficiency of the query. The use of open source tools for text semantic retrieval test, i.e., Jena and Lucene, has verified the feasibility and effectiveness of the proposed method.
This paper presents a framework that actively selects informative documents pairs for semi-supervised document clustering. The semi-supervised document clustering algorithm is a Constrained DBSCAN (Cons-DBSCAN), which...
详细信息
This paper presents a framework that actively selects informative documents pairs for semi-supervised document clustering. The semi-supervised document clustering algorithm is a Constrained DBSCAN (Cons-DBSCAN), which incorporates instance-level constraints to guide the clustering process in DBSCAN. By obtaining user feedbacks, our proposed active learning algorithm can get informative instance level constraints to aid clustering process. Experimental results show that Cons-DBSCAN with the proposed active learning approach can provide an appealing clustering performance.
暂无评论