Triangulation is widely used in scientific research, such as finite element mesh generation, surface reconstruction and the reconstruction of the density field data. This paper proposes a new method combining image pr...
详细信息
Triangulation is widely used in scientific research, such as finite element mesh generation, surface reconstruction and the reconstruction of the density field data. This paper proposes a new method combining image processing and density-controlled Centroidal Voronoi tessellations to quickly generate a density-controlled constrained Delaunay triangulation lbr 2D sea area. Firstly, preprocess digital images of the sea area and extract the boundary of seawater region by eight-neighbor searching algorithm. Then, 1 use Odd-Even Testing" method to check if one random vertex is inside the boundary and insert random vertices into the boundary. Finally, we get the CDT of random vertices by density-controlled CVT-Lloyd method. We also give some comparisons with existing methods, and our method performs better in final restllt of triangulation.
Image segmentation refers to the process of dividing an image into multiple regions which represent meaningful areas. Image segmentation is an essential step for most image analysis tasks such as object recognition an...
详细信息
ISBN:
(纸本)9781509006212
Image segmentation refers to the process of dividing an image into multiple regions which represent meaningful areas. Image segmentation is an essential step for most image analysis tasks such as object recognition and tracking, pattern recognition, content-based image retrieval, etc. In recent years, a large number of image segmentation algorithms have been developed, but achieving accurate segmentation still remains a challenging task. Recently, reservoir computing (RC) has drawn much attention in machine learning as a new model of recurrent neural networks (RNN). Echo State Network (ESN) represents one efficient realization of RC, which is initially designed to facilitate learning in Recurrent Neural Networks. In this paper we investigate the viability of ESN as feature extractor for pixel classification based colour image segmentation. Extensive experiments are conducted on real world colour image datasets and the global ESN reservoir parameters are varied to identify their operating ranges that allow the use of the reservoir nodes internal activations as new pixel features for the colour image segmentation task. A simple feed forward neural network is used to realize the ESN readout function and classify these new features. The experimental results show that the proposed method achieves high performance image segmentation comparing with state-of-the-art techniques. In addition, a set of empirically derived guidelines for setting the reservoir global parameters are proposed.
The development of science and technology in the field of healthcare increasingly provides convenience in diagnosing respiratory system problem. Recording the breath sounds is one example of these developments. Breath...
The development of science and technology in the field of healthcare increasingly provides convenience in diagnosing respiratory system problem. Recording the breath sounds is one example of these developments. Breath sounds are recorded using a digital stethoscope, and then stored in a file with sound format. This breath sounds will be analyzed by health practitioners to diagnose the symptoms of disease or illness. However, the breath sounds is not free from interference signals. Therefore, noise filter or signal interference reduction system is required so that breath sounds component which contains information signal can be clarified. In this study, we designed a filter called a wavelet transform based filter. The filter that is designed in this study is using Daubechies wavelet with four wavelet transform coefficients. Based on the testing of the ten types of breath sounds data, the data is obtained in the largest SNRdB bronchial for 74.3685 decibels.
Provides an abstract of the plenary presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
Provides an abstract of the plenary presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
The development of Web applications has a crucial role as most organizations have their own corporate Web applications to meet the needs of their respective businesses. Different needs create different complexities wh...
详细信息
ISBN:
(纸本)9781509041725
The development of Web applications has a crucial role as most organizations have their own corporate Web applications to meet the needs of their respective businesses. Different needs create different complexities which represent a new challenge to Web application development. In order to ensure the timely delivery of a project, software providers offering this service choose to use Open Sources (OSS) as an alternative. Since OSS consist of an existing framework that can be implemented directly into the application, how far does this affect the complexity of the effort estimation? A number of research papers have outlined the efforts made to refine the complexity of this field. However, to our best knowledge a systematic overview of the research done on Web application development that involves OSS usage does not appear to exist. Hence, the aim of this paper is to conduct a systematic literature review (SLR) of OSS Web application development. For this purpose, 34 papers from a total of 67 papers were identified and studied. The findings of this study indicate that (a) no research has been carried out on the field mentioned;(b) there is no early effort estimation model for Web projects that involve the usage of OSS. Therefore, this work provides an overview of the field besides identifying future research possibilities.
The advancement in digital image tampering has encouraged studies in the image forensics fields. The image tampering can be found over various image formats such as Joint Photographic Experts Group (JPEG). JPEG is the...
详细信息
Inside the sets of data, hidden knowledge can be acquired by using neural network. These knowledge are described within topology, using activation function and connection weight at hidden neurons and output neurons. I...
详细信息
ISBN:
(纸本)9781509017225
Inside the sets of data, hidden knowledge can be acquired by using neural network. These knowledge are described within topology, using activation function and connection weight at hidden neurons and output neurons. Is hardly to be understanding since neural networks act as a black box. The black box problem can be solved by extracting knowledge (rule) from trained neural network. Thus, the aim of this paper is to extract valuable information from trained neural networks using decision. Further, the Levenberg Marquardt algorithm was applied to training 30 networks for each datasets, using learning parameters and basis weights differences. As the number of hidden neurons increase, mean squared error and mean absolute percentage error decrease, and more time they need to deal with the dataset, that is result of investigation from neural network architectures. Decision tree induction generally performs better in knowledge extraction result with accuracy and precision level from 84.07 to 93.17 percent. The extracted rule can be used to explaining the process of the neural network systems and also can be applied in other systems like expert systems.
Many works of human posture recognition have been published in the literature. Gesture and posture recognition by using Kinect Sensor is an important technique for many types of application. In this paper, we apply a ...
详细信息
Many works of human posture recognition have been published in the literature. Gesture and posture recognition by using Kinect Sensor is an important technique for many types of application. In this paper, we apply a neuro-fuzzy system for classification of human posture. A recent approach of learning algorithm for Single-layer hidden feedforward neural network (SLFN), known as Randomized Neural Network (RNN), has been attracting attention as a solution of several problems of traditional neural networks. However, the performance of RNN varies depending on the number of hidden neurons. In this paper, ensemble learning methods are therefore developed to deal with the issue, using Fuzzy-RNNs with various sizes of networks. Moreover, we utilize evolutionary algorithm to optimize the structure of ensembles. This paper discusses the effectiveness of the proposed approach, comparing with performance of some ensemble learning methods by using benchmark datasets and real measurement data of human posture.
This paper presents the application program of fingerprint detection using wavelet transform for authentication. Fingerprints are obtained from the site of crime, old documents and excavated things. This paper propose...
详细信息
This paper presents a method for generating an optimized ensemble of fuzzy extreme learning machines (FELM) using a combination of genetic algorithms with a Bayesian Information Criterion (GA-BIC) fitness function. Th...
详细信息
ISBN:
(纸本)9781509026791
This paper presents a method for generating an optimized ensemble of fuzzy extreme learning machines (FELM) using a combination of genetic algorithms with a Bayesian Information Criterion (GA-BIC) fitness function. The operation of the FELM is equivalent to that of a fuzzy inference system, and is used for learning and classifying a given data set. The relative simplicity of the FELM structure enables a large number of FELMs to be generated in a short time. GA-BIC is used to select the minimum number of FELMs while maximizing the effectiveness of the classifier ensemble.
暂无评论