The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The long-tail phenomenon tells us that there are many items in the tail. However, not all tail items are the same. Each item acquires different kinds of users. Some items are loved by the general public, while some items are consumed by eccentric fans. In this paper, we propose a novel metric, item eccentricity, to incorporate this difference between consumers of the items. Eccentric items are defined...
Software often requires frequent updates to improve performance and reliability. Typically, a general update process is performed after terminating a program although this is not applicable to applications that require non-disruptive services such as networks and satellites. In order to address this issue, network service providers often provide a technology termed as an in-service software upgrade...
GPU-based clusters are widely chosen for accelerating a variety of scientific applications in high-end cloud environments. With their growing popularity, there is a necessity for improving the system throughput and decreasing the turnaround time for co-executing applications on the same GPU device. However, resource contention among multiple applications on a multi-tasked GPU leads to the performance...
Predicting an approval rate of politicians is a popular task. While a type of prediction is using a text mining from news articles, we introduce a text augmented Gaussian process to perform the prediction with contexts. We test our model with 2017 South Korea Presidential Election in 1) a quantitative evaluation, and 2) a qualitative analysis. The performance of the model with text input is better...
Matrix factorization is a popular low dimensional representation approach that plays an important role in many pattern recognition and computer vision domains. Among them, convex and semi-nonnegative matrix factorizations have attracted considerable interest, owing to its clustering interpretation. On the other hand, the generalized correlation function (correntropy) as the error measure does not...
With the growing number of automated welding systems present throughout manufacturing, achieving high precision is naturally a key objective. The alignment of weld tip to weld seam, particularly in very long welds (such as in pipes), is a technical challenge in which computer vision has much to offer. This paper introduces a real-time methodology for weld-seam tracking. The key challenge associated...
The random Fourier Features method has been found very effective in approximating the kernel functions. Our former studies show that through a mixing mechanism of the feature space formed by random Fourier features and certain linear algorithms, the fuzzy clustering results in the approximated feature space are comparable to or even exceed the classical kernel-based algorithms. To increase the robustness...
Brain-computer interface (BCI) is an emerging area of research that aims to improve the quality of human-computer applications. It has enormous scope in biomedical applications, neural rehabilitation, biometric authentication, educational programmes, and entertainment applications. A BCI system has four major components: signal acquisition, signal preprocessing, feature extraction, and classification...
There are quite a few high dimensional time-series data co-ocurring each other such as lip motions, voices, and face appearances and so on. When capturing the correspondent relationships among those time-series data with different dimensionality, we need to make the dimensionality all the same size so that they can be compared each other. To achieve this, Gaussian Process Latent Variable Models (GPLVM)...
This paper proposes a novel method for fire and smoke detection using video images. The ViBe method is used to extract a background from the whole video and to update the exact motion areas using frame-by-frame differences. Dynamic and static features extraction are combined to recognize the fire and smoke areas. For static features, we use deep learning to detect most of fire and smoke areas based...
This paper considers a problem of reconstructing a typeface of Chinese characters. First, Chinese characters are generated by using the so-called dynamic font method as a basic tool. Then, we develop a scheme for reconstructing characters to cursive characters with natural "Renmen" which can depict continuity of the adjacent strokes. For realizing the natural Renmen, we propose a method...
Adaptive dynamic programming (ADP) is a prevalent way to solve the coupled Hamilton-Jacobi-Bellman (HJB) equations of the optimal consensus control for multi-agent systems (MAS). Neural networks (NNs) are normally used to approximate the value functions in ADP. However, NNs with manually designed features may influence the approximation ability. In this study, kernel-based methods which do not need...
This study proposes a system-on-a-chip, field-programmable gate array (FPGA)-based real-time video processing platform for human action recognition. We provide the details of a hardware implementation for real-time human activity recognition in 3D scenes, including capture, processing, and display. The proposed platform is implemented by adding a two-stage preprocessing step to improve the results...
State-of-the-art storage devices that have parallel capability have significantly reduced the performance gap between processor and storage I/O. However, the internal parallelism makes it difficult to measure utilization that can be used as a basis of load balancing, which is a critical feature of performance improvement of parallel systems. When utilization of storage reaches to one hundred percent,...
In the paper, we propose an effective long-term real-time tracking method to address the problem of robustness and tracking failure in visual tracking with UAVs. Most existing trackers only consider short-term tracking, therefore are unable to cope with partial and complete occlusion, which finally leads to object drifting or loss. Our method still follows the tracking-by-detection framework. However,...
In this paper, we propose a novel point set matching algorithm to improve the matching precision in the presence of non-Gaussian noises and outliers. In our method, a non-second order similarity measure known as Kernel Mean p-Power Error (KMPE) loss is employed as the matching cost function. We introduce a local optimal solution for computing the rigid transform by repeating the correspondence estimation...
We propose a method that uses kernel method-based algorithms to implement an autoencoder. Deep learning-based algorithms have two characteristics, one is the high level data abstraction, the other is the multiple level data transformations and representations. The kernel method is one of the approaches that can be used in linear and non-linear transformations. It should be one of the implementations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.