The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various...
详细信息
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various *** have established several learning methods for writer identification including supervised and unsupervised ***,supervised methods require a large amount of annotation data,which is impossible in most *** the other hand,unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be *** paper introduces an unsupervised writer identification system that analyzes the data and recognizes the writer based on the inter-feature relations of the data to resolve the uncertainty of the features.A pairwise architecturebased Autoembedder was applied to generate clusterable embeddings for handwritten text ***,the trained baseline architecture generates the embedding of the data image,and the K-means algorithm is used to distinguish the embedding of individual *** proposed model utilized the IAM dataset for the experiment as it is inconsistent with contributions from the authors but is easily accessible for writer identification *** addition,traditional evaluation metrics are used in the proposed ***,the proposed model is compared with a few unsupervised models,and it outperformed the state-of-the-art deep convolutional architectures in recognizing writers based on unlabeled data.
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul...
详细信息
The most serious and hazardous for an electrical provider these days are non-technical losses caused due to electricity theft. The economy as a whole is impacted by fraudulent electricity usage, which lowers supply qu...
详细信息
Human activity recognition (HAR) is a prominent research direction in ubiquitous computing. Current state-of-the-art HAR models achieve great success by learning the correlations between the regions of the body parts ...
详细信息
The focus of this research is on addressing the inefficient management of Municipal Solid Waste (MSW), which often results in large quantities of waste being dumped into garbage bins. Previous approaches have struggle...
详细信息
Power load forecasting is essential for optimizing power generation and distribution efficiency. This paper proposes a novel method for daily average load forecasting, referred to as LARSI-TPE-XGB, which integrates th...
详细信息
To manage the huge data, cloud computing necessitates a significant number of disc I/O, network bandwidth and CPU cycles. To handle the massive volumes of data, the programming paradigm known as data flow integrates t...
详细信息
In modern wireless systems, the feedback of DownLink (DL) Channel State Information (CSI) from User Equipment (UE) to Base Stations (BS) may require substantial computational and feedback bandwidth overheads. A promis...
详细信息
The Marine Predators Algorithm (MPA) is an effective optimization technique that simulates the foraging behavior of ocean creatures. Despite its strong performance on numerical optimization problems, the MPA algorithm...
详细信息
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
暂无评论