Biometric Person Authentication such as face, fingerprint, palmprint and signature depends on the quality of image processing. When it needs to be done under a low-resolution image, the accuracy will be impaired. So h...
详细信息
The research field of intelligent Service Robots, which has become more and more popular over the last years, covers a wide range of applications from climbing machines for cleaning large storefronts to robotic assist...
详细信息
ISBN:
(纸本)1595933751
The research field of intelligent Service Robots, which has become more and more popular over the last years, covers a wide range of applications from climbing machines for cleaning large storefronts to robotic assistance for disabled or elderly people. When developing service robot software, it is a challenging problem to design the robot architecture by carefully considering user needs and requirements, implement robot application components based on the architecture, and integrate these components in a systematic and comprehensive way for maintainability and reusability. Furthermore, it becomes more difficult to communicate among development teams and with others when many engineers from different teams participate in developing the service robot. To solve these problems, we applied the COMET design method, which uses the industry-standard UML notation, to developing the software of an intelligent service robot for the elderly, called T-Rot, under development at Center for intelligentrobotics (CIR). In this paper, we discuss our experiences with the project in which we successfully addressed these problems and developed the autonomous navigation system of the robot with the COMET/UML method. Copyright 2006 ACM.
Current models of human motor learning and control typically employ continuous (or near continuous) movement commands and sensory information. However, research suggests that voluntary motor commands are issued in dis...
详细信息
Current models of human motor learning and control typically employ continuous (or near continuous) movement commands and sensory information. However, research suggests that voluntary motor commands are issued in discrete-time submovements. There is also reasonable support for the hypothesis that human sensory experience is episodic as well. These facts have motivated the development of a learning algorithm that employs discrete-time sensory and motor control events, S-learning. We present this algorithm together with the results of simulated robot control. The results show that the learning that takes place is adaptive and is robust to a variety of conditions that many traditional controllers are not capable of handling, including random errors in the actuators and sensors, random transmission time delays, hard nonlinearities, time varying system behavior, and unknown structure of system dynamics. The performance of S-learning suggests that it may be an appropriate high-level control scheme for complex robotic systems, including walking, cooperative manipulation, and humanoid robots
Inspiring by biological immune principles, many immune detection algorithms in the area of artificial immune system are introduced. In this paper, such problems as immune memory, immune match and niching strategy in t...
详细信息
Inspiring by biological immune principles, many immune detection algorithms in the area of artificial immune system are introduced. In this paper, such problems as immune memory, immune match and niching strategy in the algorithms are discussed. The idea of scheme match and complement operator are proposed. The experiments that are in the area of virus detection and intrusion detection are made. Shown by experiments, the algorithm joined scheme match and complement operator improves the problem of hole and keeps variety of antibodies. And its detecting efficiency is increased obviously
While manifold learning algorithms can discover intrinsic low-dimensional manifold embedded in the high-dimensional Euclidean space, the discriminant ability of the low-dimensional subspaces obtained by the algorithms...
详细信息
In face-to-face communication, eyes play a central role, for example, in directing attention and regulating turntaking. For this reason, the eyes have been a central topic in several fields of interaction study. Altho...
详细信息
In this paper, we propose a novel classification algorithm, called geometrical probability covering (GPC) algorithm, to improve classification ability. On the basis of geometrical properties of data, the proposed algo...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were hardly represented in the participating filters, and not represented at all in the better results. A non-traditional technique - Prediction by Partial Matching (PPM) - performed exceptionally well, at or near the top of every test. Are the TREC results an anomaly? Is PPM really the best method for spam filtering? How are these results to be reconciled with others showing that methods like Support Vector Machines (SVM) are superior? We address these issues by testing implementations of five different classification methods on the TREC public corpus using the online evaluation methodology introduced in TREC. These results are complemented with cross validation experiments, which facilitate a comparison of the methods considered in the study under different evaluation schemes, and also give insight into the nature and utility of the evaluation regimens themselves. For comparison with previously published results, we also conducted cross validation experiments on the Ling-Spam and PU1 datasets. These tests reveal substantial differences attributable to different test assumptions, in particular batch vs. on-line training and testing, the order of classification, and the method of tokenization. Notwithstanding these differences, the methods that perform well at TREC also perform well using established test methods and corpora. Two previously untested methods - one based on Dynamic Markov Compression and one using logistic regression - compare favorably with competing approaches.
In multi-target tracking, the maintaining of the correct identity of targets is challenging. In the presented tracking method, accurate target identification is achieved by incorporating the appearance information of ...
详细信息
In multi-target tracking, the maintaining of the correct identity of targets is challenging. In the presented tracking method, accurate target identification is achieved by incorporating the appearance information of the spatial and temporal context of each target. The spatial context of a target involves local background and nearby targets. The first contribution of the paper is to provide a new discriminative model for multi-target tracking with the embedded classification of each target against its context. As a result, the tracker not only searches for the image region similar to the target but also avoids latching on nearby targets or on a background region. The temporal context of a target includes its appearances seen during tracking in the past. The past appearances are used to train a probabilistic PCA that is used as the measurement model of the target at the present. As the second contribution, we develop a new incremental scheme for probabilistic PCA. It can update accurately the full set of parameters including a noise parameter still ignored in related literature. The experiments show robust tracking performance under the condition of severe clutter, occlusions and pose changes.
暂无评论