Design patterns add more reliability, flexibility and reusability to a software system. Taking advantage of design patterns is usually beneficial to software design and makes software development relatively easier. Th...
详细信息
Discriminant neighborhood embedding (DNE) algorithm is one of supervised linear dimensionality reduction methods. Its nonlinear version kernel discriminant neighborhood embedding (KDNE) is expected to behave well on c...
详细信息
Discriminant neighborhood embedding (DNE) algorithm is one of supervised linear dimensionality reduction methods. Its nonlinear version kernel discriminant neighborhood embedding (KDNE) is expected to behave well on classification tasks. However, since KDNE constructs an adjacent graph in the original space, the adjacency graph could not represent the adjacent information in the kernel mapping space. By introducing hidden space, this paper proposes a novel nonlinear method for DNE, called hidden space discriminant neighborhood embedding (HDNE). This algorithm first maps the data in the original space into a high dimensional hidden space by a set of nonlinear hidden functions, and then builds an adjacent graph incorporating neighborhood information of the dataset in the hidden space. Finally, DNE is used to find a transformation matrix which would map the data in the hidden space to a low-dimensional subspace. The proposed method is applied to ORL face and MNIST handwritten digit databases. Experimental results show that the proposed method is efficiency for classification tasks.
In this paper, a chunk-based multi-strategy machine translation method is proposed. Firstly, an English-Chinese bilingual tree-bank is constructed. Then, a translation strategy based on the chunk that combines statist...
详细信息
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m...
详细信息
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other meta-heuristics. A general discussion about four types of termination criteria has been firstly discussed in this article. Then some measures of convergence based on pheromone have been introduced. And a new termination criterion based on Bayesian approach is presented. Finally a new convergence proof for a class of ACO algorithms is presented.
Privacy preservation is a crucial problem in resource sharing and collab.rating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided th...
详细信息
Aimed at the deficiency of the resampling algorithm in PF, diversity measures ESS (effective sample size) and PDF (population diversity factor) are evaluated respectively. Combined with the estimation result, diversit...
详细信息
It is very important to find diversity measure when to perform a resampling step in particle filter. By analyzing the inherent deficiency in resampling algorithm of particle filter, some diversity measures including e...
详细信息
Image segmentation evaluation is still a hotspot problem. Various methods of image segmentation evaluation have been proposed. Amongst all the evaluation approaches, Segmentation Entropy Quantitative Assessment (SEQA)...
详细信息
Image segmentation evaluation is still a hotspot problem. Various methods of image segmentation evaluation have been proposed. Amongst all the evaluation approaches, Segmentation Entropy Quantitative Assessment (SEQA) is one of the most popular methods. In this paper, segmentation entropy is proposed. In experiments, some standard images which are segmented by multi-level thresholds are tested and used to conclude the characteristics of SEQA, including its application conditions, advantages and disadvantages in image segmentation evaluation.
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu...
详细信息
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
详细信息
暂无评论