The proposed off-line handwritten Chinese character recognition system composed of a feature extraction module and a recognition module. In the feature extraction module, the orthogonal Zernike moments and the elastic...
详细信息
The proposed off-line handwritten Chinese character recognition system composed of a feature extraction module and a recognition module. In the feature extraction module, the orthogonal Zernike moments and the elastic mesh technique were combined to get fusion features, which present the global and local features of handwritten Chinese characters and have great discriminative capability. As for the classification module, one approach that is very similar to the neural network classification strategy was used with the least square vector machine (LS-SVM), which not only has the excellent performance of generalization and recognition accuracy, but also can solve the multi-classification issue effectively. Experimental results indicated that the proposed method could get good recognition results.
In this paper, a framework for replacing missing values in a database is proposed since a real-world database is seldom complete. Good data quality in a database can directly improve the performance of any data mining...
详细信息
The aim of this study is to develop a feature subset selection (FSS) method based on the margin of support vector machines (SVM). The problem of directly using the SVM margin is that it does not always provide clear r...
详细信息
The aim of this study is to develop a feature subset selection (FSS) method based on the margin of support vector machines (SVM). The problem of directly using the SVM margin is that it does not always provide clear relationship between its value and the performance of SVM, and the best obtained subset is not guaranteed to be the best possible one. In this paper, a new solution is describe by the introduction of the confident margin (CM) in the subset criterion, which permits to get near the best recognition rate by monitoring the peak of CM curve without directly calculating the recognition rate, in order to save computational time. The performance of the proposed method was evaluated in artificial and real-world data experiments.
A new Electrolyte-CNTs-Insulator-Semiconductor capacitor is proposed to achieve the compatibility with the CMOS technology. Wafer bonding technique is adopted to attach the AAO template with CNTs to semiconductor surf...
详细信息
ISBN:
(纸本)0976798506
A new Electrolyte-CNTs-Insulator-Semiconductor capacitor is proposed to achieve the compatibility with the CMOS technology. Wafer bonding technique is adopted to attach the AAO template with CNTs to semiconductor surface (the CNTs array grown in AAO template to SiO2/Si wafer). The CNTs are expected to enhance the sensitivity of the conventional EIS system and to offer the many chemical or biological active sites. The platinum reference electrode and 3.3M KCl solution are proved to act well as the functional liquid gate. From the capacitance-voltage measurements of the fabricated samples, the modulation of the semiconductor surface has been found to show the feasibility of the new structures for use in the high sensitive chemical and biological sensors.
Two improvements are introduced into vicinal-risk-minimization based support vector (SV) algorithm. Since the misclassified samples must be support vectors, a scheme for pruning hard-to-learn samples from the training...
详细信息
Two improvements are introduced into vicinal-risk-minimization based support vector (SV) algorithm. Since the misclassified samples must be support vectors, a scheme for pruning hard-to-learn samples from the training set based on support vectors is presented. The parameter's determination of Gaussian vicinal function is proposed to be modified, based on the maximum likelihood criterion. Preliminary experimental results show that the pruning scheme and improvement of the parameter's determination of vicinal function much improved vicinal SV algorithm's generality, and can outperform support vector machine (SVM) by about 0.5% in test accuracy.
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel servi...
详细信息
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel services, which respect our activities, can be possible. In this paper, we propose human activity recognition system, which infers the next human action by taking account of the past human behaviors observed so far. We also developed cooking support robot, which suggests what the human should do next by voice and gesture. Experimental results confirmed the feasibility of the inference system and the quality of support.
The concept of partial reconfiguration offers the possibility to dynamically place and remove hardware tasks on reconfigurable architectures, like FPGAs. Common placement algorithms, e.g. Best Fit, are designed for ho...
详细信息
The concept of partial reconfiguration offers the possibility to dynamically place and remove hardware tasks on reconfigurable architectures, like FPGAs. Common placement algorithms, e.g. Best Fit, are designed for homogeneous architectures, since they do not consider any placement constraints of the hardware tasks. Due to the integration of, e.g., dedicated memory, current FPGAs are heterogeneous reconfigurable architectures. In this paper we introduce two heterogeneous placement algorithms, which are able to deal with the constraints of the hardware tasks. Both algorithms are compared to the Best Fit algorithm by using a simulation framework for partially configurable architectures. We propose concepts of an efficient hardware realization of our placement approach with Xilinx Virtex-II FPGAs. Moreover, we present a task placement mechanism to change the position of a hardware task on the FPGA by manipulating the configuration data of the task
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel servi...
详细信息
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel services, which respect our activities, can be possible. In this paper, we propose human activity recognition system, which infers the next human action by taking account of the past human behaviors observed so far. We also developed cooking support robot, which suggests what the human should do next by voice and gesture. Experimental results confirmed the feasibility of the inference system and the quality of support.
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel servi...
详细信息
Recent development of information technology is making electric household appliances computerized and networked. If the environments surrounding us could recognize our activities indirectly by sensors, the novel services, which respect our activities, can be possible. In this paper, we propose human activity recognition system, which infers the next human action by taking account of the past human behaviors observed so far. We also developed cooking support system by using an LCD touch panel on the kitchen counter and a mobile robot on the floor, which suggest what the human should do next by voice and gestures. Experimental results confirmed the feasibility of the inference system and the quality of support.
We propose heuristic algorithms to compute optimized tunnel paths between single source and multiple destinations in a multicast VPN scenario. This is achieved by first building up a CPE based layout for the minimal c...
详细信息
We propose heuristic algorithms to compute optimized tunnel paths between single source and multiple destinations in a multicast VPN scenario. This is achieved by first building up a CPE based layout for the minimal cost (MC) multicast VPN problem and then selecting few core routers strategically. These we call active paths. We also compute backup paths for every active path for the sake of restorability, allowing sharing of backup bandwidth. This is also a type of online routing problem. For comparison purposes, we also formulate a mathematical model of the MC-multicast VPN problem using integer linear programming and solve it using the CPLEX tool.
暂无评论