Sequential pattern mining (SPM) with gap constraints (or repetitive SPM or tandem repeat discovery in bioinformatics) can find frequent repetitive subsequences satisfying gap constraints, which are called positive seq...
详细信息
Empirical likelihood has been found very useful in many different occasions. It usually runs into serious computational difficulties while jackknife empirical likelihood (JEL) is shown to be effective when applied t...
详细信息
Empirical likelihood has been found very useful in many different occasions. It usually runs into serious computational difficulties while jackknife empirical likelihood (JEL) is shown to be effective when applied to some complicated statistics. In this paper, to test the difference between coefficients of two linear regression models, the authors apply JEL to construct the confidence regions. Based on the 3EL ratio test, a version of Wilks' theorem is developed. Furthermore, to improve the coverage accuracy of confidence regions, a Bartlett correction is applied. Simulation studies are carried out to show the effectiveness of the proposed method in aspects of coverage accuracy. A real data set is analyzed with the proposed method as an example.
In the context of weakly supervised learning, partial label learning (PLL) addresses situations where each training instance is associated with a set of partial labels, with only one being accurate. However, in comple...
详细信息
This paper considers tests for regression coefficients in high dimensional partially linear *** authors first use the B-spline method to estimate the unknown smooth function so that it could be linearly ***,the author...
详细信息
This paper considers tests for regression coefficients in high dimensional partially linear *** authors first use the B-spline method to estimate the unknown smooth function so that it could be linearly ***,the authors propose an empirical likelihood method to test regression *** authors derive the asymptotic chi-squared distribution with two degrees of freedom of the proposed test statistics under the null *** addition,the method is extended to test with nuisance *** show that the proposed method have a good performance in control of type-I error rate and *** proposed method is also employed to analyze a data of Skin Cutaneous Melanoma(SKCM).
Images and Videos are everywhere. They are being extensively used in numerous industrial, scientific and entertainment *** overabundance of data is propelled by the multimedia revolution. Image processing revolves aro...
详细信息
ISBN:
(纸本)9781538673362
Images and Videos are everywhere. They are being extensively used in numerous industrial, scientific and entertainment *** overabundance of data is propelled by the multimedia revolution. Image processing revolves around the ability of an algorithm to describe and manipulate images. However, video processing gives us the ability, to not only process individual frames of a video sequence but also to derive information from a collection of highly correlated frames over a time sequence. Visual Object Tracking is one of the most active research areas in Computer Vision. The objective of Visual Object Tracking is to monitor an object's spatial and temporal changes during a video sequence. It is used for analyzing sequential video frames and generating the movement of target between frames as output. In this paper, the problem of scale variance which is a challenge to visual object trackers is addressed. By making the object tracker scale invariant, a more precise scale adaptive bounding box can be drawn to predict the target location in a video sequence. Moreover this tracker adopts a Distractor-Aware tracking approach which considerably reduces the problem of drifting. This approach is highly suitable for time-critical and embedded-vision applications due to its low computational complexity and simplicity in *** proposed approach also allows for an efficient implementation of online tracking in real time.
Although bigdata has been one of most popular topics since last several years, how to effectively conduct bigdata analysis is a big challenge for every field. This paper tries to address some fundamental scientific ...
详细信息
Different from rough sets in Pawlak’s sense, which is a binary approximation operations based structure, in this paper, we propose a new rough equivalence relation based on triple approximation operations induced by ...
详细信息
In this paper the definition of domination is generalized to the case that the elements of the traffic matrices may have negative values. It is proved that D3 dominates D3 + λ(D2 - D1) for any λ ≥0 if D1 dominat...
详细信息
In this paper the definition of domination is generalized to the case that the elements of the traffic matrices may have negative values. It is proved that D3 dominates D3 + λ(D2 - D1) for any λ ≥0 if D1 dominates D2. Let u(D) be the set of all the traffic matrices that are dominated by the traffic matrix D. It is shown that u ( D∞) and u (D ∈) are isomorphic. Besides, similar results are obtained on multi-commodity flow problems. Fhrthermore, the results are the generalized to integral flows.
Stochastic gradient descent(SGD) is one of the most common optimization algorithms used in pattern recognition and machine *** algorithm and its variants are the preferred algorithm while optimizing parameters of deep...
详细信息
Stochastic gradient descent(SGD) is one of the most common optimization algorithms used in pattern recognition and machine *** algorithm and its variants are the preferred algorithm while optimizing parameters of deep neural network for their advantages of low storage space requirement and fast computation *** studies on convergence of these algorithms were based on some traditional assumptions in optimization ***,the deep neural network has its unique *** assumptions are inappropriate in the actual optimization process of this kind of *** this paper,we modify the assumptions to make them more consistent with the actual optimization process of deep neural *** on new assumptions,we studied the convergence and convergence rate of SGD and its two common variant *** addition,we carried out numerical experiments with LeNet-5,a common network framework,on the data set MNIST to verify the rationality of our assumptions.
There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the *** propose a pyramid scheme model which has the principal characters of many pyramid schemes that have app...
详细信息
There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the *** propose a pyramid scheme model which has the principal characters of many pyramid schemes that have appeared in recent years: promising high returns, rewarding the participants for recruiting the next generation of participants, and the organizer takes all of the money away when they find that the money from the new participants is not enough to pay the previous participants interest and *** assume that the pyramid scheme is carried out in the tree network, Erd?s–Réney(ER) random network, Strogatz–Watts(SW) small-world network, or Barabasi–Albert(BA) scale-free *** then give the analytical results of the generations that the pyramid scheme can last in these *** also use our model to analyze a pyramid scheme in the real world and we find that the connections between participants in the pyramid scheme may constitute a SW small-world network.
暂无评论