The concept of deep learning has been applied to many domains, but the definition of a suitable problem depth has not been sufficiently explored. In this study, we propose a new Hierarchical Covering Algorithm (HCA)...
详细信息
The concept of deep learning has been applied to many domains, but the definition of a suitable problem depth has not been sufficiently explored. In this study, we propose a new Hierarchical Covering Algorithm (HCA) method to determine the levels of a hierarchical structure based on the Covering Algorithm (CA). The CA constructs neural networks based on samples' own characteristics, and can effectively handle multi-category classification and large-scale data. Further, we abstract characters based on the CA to automatically embody the feature of a deep structure. We apply CA to construct hidden nodes at the lower level, and define a fuzzy equivalence relation R on upper spaces to form a hierarchical architecture based on fuzzy quotient space theory. The covering tree naturally becomes from R. HCA experiments performed on MNIST dataset show that the covering tree embodies the deep architecture of the problem, and the effects of a deep structure are shown to be better than having a single level.
Accurate endpoint detection is crucial for speech recognition accuracy. This paper presents a new technique for speech endpoint detection in a noisy environment based on the empirical mode decomposition(EMD) algorithm...
详细信息
Accurate endpoint detection is crucial for speech recognition accuracy. This paper presents a new technique for speech endpoint detection in a noisy environment based on the empirical mode decomposition(EMD) algorithm and higher order statistics. With the EMD, the noise speech signals can be decomposed into a sum of the band-limited function called intrinsic mode functions(IMFs), which is a zero-mean AM-FM component. Then higher order statistics of the IMF components can be used to extract the desired feature for endpoint detection. In order to show the effectiveness of the proposed method, we present examples showing that the new measure is more effective than traditional measures. The experimental results show that the performance of the proposed algorithm is noticeable in the real speech signal tests with different SNR.
Since the existing full-rate cooperative transmission schemes have a serious defect in low Bit Error Rate (BER) performance while the existing high-rate cooperative transmission schemes have a serious defect in low sp...
详细信息
Since the existing full-rate cooperative transmission schemes have a serious defect in low Bit Error Rate (BER) performance while the existing high-rate cooperative transmission schemes have a serious defect in low spectral efficiency, a distributed high-rate cooperative relay transmission scheme based on full-rate cooperative communication model is proposed in this paper, in which Cyclic Delay Diversity (CDD) technology and Linear Constellation Precoding (LCP) technology are employed. Moreover, the proposed scheme addresses the issue of obtaining maximum spatial and multipath diversity with low decoding complexity and high transmission reliability. The BER performance of the proposed scheme is contrasted to that of the full-rate transmission scheme where better performance is achieved, and is improved when the number of the multipath or the relay nodes increases.
Since the single-antenna relay cooperative communication systems have a serious defect in reliability of data transmission, while the MIMO communication systems have difficulty in design and decoding, we propose a mix...
详细信息
Since the single-antenna relay cooperative communication systems have a serious defect in reliability of data transmission, while the MIMO communication systems have difficulty in design and decoding, we propose a mixed structure of full-rate and low-detection complexity cooperative relay transmission scheme based on full-rate relay cooperative transmission model, which combines the advantages of cyclic delay diversity (CDD) technology and linear constellation precoding (LCP) technology. This scheme can excavation diversity gain by using single antenna terminal and multiple antenna simultaneously, moreover, the decoding complexity is low. The bit error rate (BER) performance is improved with the number of the antenna or the multipath or the relay nodes increases.
Multiple-Instance Learning (MIL) is used to predict the unlab.led bags' lab.l by learning the lab.led positive training bags and negative training *** bag is made up of several unlab.led instances.A bag is lab.led ...
详细信息
Multiple-Instance Learning (MIL) is used to predict the unlab.led bags' lab.l by learning the lab.led positive training bags and negative training *** bag is made up of several unlab.led instances.A bag is lab.led positive if at least one of its instances is positive,otherwise *** multiple-instance learning methods with instance selection ignore the representative degree of the selected *** example,if an instance has many similar instances with the same lab.l around it,the instance should be more representative than *** on this idea,in this paper,a multiple-instance learning with instance selection via constructive covering algorithm (MilCa) is *** MilCa,we firstly use maximal Hausdorff to select some initial positive instances from positive bags,then use a Constructive Covering Algorithm (CCA) to restructure the structure of the original instances of negative *** an inverse testing process is employed to exclude the false positive instances from positive bags and to select the high representative degree instances ordered by the number of covered instances from training ***,a similarity measure function is used to convert the training bag into a single sample and CCA is again used to classification for the converted *** results on synthetic data and standard benchmark datasets demonstrate that MilCa can decrease the number of the selected instances and it is competitive with the state-of-the-art MIL algorithms.
Multi-objective optimization algorithms have demonstrated their effectiveness and efficiency in detecting community structure in complex networks, by which a set of trade-off partitions of networks are obtained instea...
详细信息
The precise prediction of bus routes or the arrival time of buses for a traveler can enhance the quality of bus service. However, many social factors influence people's preferences for taking buses. These social f...
详细信息
Collab.ration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collab.rations ...
详细信息
Collab.ration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collab.rations or future popular academic topics. This paper demonstrates the change of Structural Holes in the whole network and for some individual authors from 2009 to 2012 in ICML. This paper is going to study the biggest subset in 2009, which separates into several smaller subsets with less structural holes in 2010 and 2011, while the number of structural holes in 2012 increases. The graphs of the whole networks from 2009 to 2012 drawn by Ucinet are going to demonstrate the changes of structural holes from 2009 to 2012 and expl the reason why there are more structural holes in 2012 compared to 2010 and 2011. The reason is that the ainnumber of authors in 2012 increases about 50 percent compared to 2011, which results in that authors need to find new collab.rations and leaders may become intermediaries to connect new authors and existing authors occupying structural holes. And some authors whose papers are published on ICML continuously from 2009 to 2012 are going to be analysed to indicate the changes of their position in the network. Some authors are increasingly constrained in certain groups, while some other authors become bridges connecting different groups and some other authors changes are correspond to the changes of the whole network. They are constrained in certain subset with less structural holes in 2010 and 2011 but, due to large number of authors joining in ICML, more likely to occupy more structural holes.
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, ...
详细信息
ISBN:
(纸本)9781467372190
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, an algorithm based on electrooculogram(EOG) has been proposed in this paper. In the proposed approach, wavelet packet decomposition was firstly used to smooth EOG signals during reading tasks, and then, according to the predefined coding strategy, the smoothed EOG waveform is translated into a coding string to represent current reading state. Finally, Levenshtein distance is employed to measure the similarity of the template string and the output string. The experiments under the experimental paradigms of autonomy-reading and stimulus-reading and reading with rest state have been carried out. The mean accurate has reached 90%. The experimental results indicate that the proposed algorithm can effectively recognize human reading activity state.
Speech enhancement is crucial for speech recognition accuracy. How to eliminate the effect of the noise constitutes a challenging problem in speech processing. This paper presents a new technique for speech enhancemen...
详细信息
暂无评论