The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aerosol optical depth (AOD), one of the key factors affecting the atmosphere visibility, has great influence on the prediction of radiation intensity and photovoltaic power generation. Considering the problem that AOD is difficult to obtain real-timely and conveniently with high accuracy, in this paper, PM2.5 concentration, PM10 concentration and temperature, wind speed grade and relative humidity...
Embedded computer vision applications have been incorporated in industrial automation, improving quality and safety of processes. Such systems involve pattern classifiers for specific functions that, many times, demand high memory footprint and processing time. This work suggests a strategy to choose GLCM (Gray Level Co-occurrence Matrix) features for an SVM classifier that can reduce computer resources...
A Brain-Computer Interface (BCI) speller system based on the Steady-State Visually Evoked Potentials (SSVEP) paradigm is presented. The potentials are elicited through the gaze fixation at one out of the four checkerboards shown on screen, which are flickering at 5, 12, 15 and 20 Hz. After the feature extraction, two dimensionality reduction algorithms, Principal Components Analysis (PCA) and Linear...
Image classification is a method that distinguishes the different categories of targets based on the different features of image. The current problem usually is that the feature modeling of target has a great influence on recognition robustness. In order to solve this problem, a correlation-based method is presented to optimize the bag-of-visual-word (BOVW) model by reducing the dictionary size. The...
It is difficult to establish accurate mathematical models to describe the range extender electric vehicles due to the non-stationary, non-linear and interconnection of the monitoring signal sources resulted from the massive moving parts and complex architecture in range-extender. And the support vector machine (SVM) and other algorithms would lead to the destruction of the natural structure and the...
In the distillation process, many important process variables are often difficult to be measured online. For example, the aviation kerosene is an important index of operation quality, but current methods cannot obtain the real-time value of the aviation kerosene efficiently. To solve this problem, a method of selecting the input variable based on partial least squares regression (PLS) is proposed...
The electroencephalography (EEG) data records vast amounts of human cerebral activity yet is still reviewed primarily by human readers. Most of the times, the data is contaminated with non-cerebral originated signals, called artifacts, which could be very difficult to visually detect and, undiscovered, could damage the neural information analysis. The purpose of our work is to detect the artifacts...
This paper describes a new approach to building the query based relevance sets (qrels) or relevance judgments for a test collection automatically without using any human intervention. The methods we describe use supervised machine learning algorithms, namely the Naïve Bayes classifier and the Support Vector Machine (SVM). We achieve better Kendall's tau and Spearman correlation results between the...
Most existing weakly supervised localization (WSL) approaches learn detectors by finding positive bounding boxes based on features learned with image-level supervision. However, those features do not contain spatial location related information and usually provide poor-quality positive samples for training a detector. To overcome this issue, we propose a deep self-taught learning approach, which makes...
We propose a novel and principled hybrid CNN+CRF model for stereo estimation. Our model allows to exploit the advantages of both, convolutional neural networks (CNNs) and conditional random fields (CRFs) in an unified approach. The CNNs compute expressive features for matching and distinctive color edges, which in turn are used to compute the unary and binary costs of the CRF. For inference, we apply...
At present, it is a great challenge that solving high-dimension and text sparsity problems in short text classification. To resolve these problems, this paper proposes a method which takes the correlation between lexical items and tags before completing Latent Dirichlet Allocation(LDA) topic model. Meanwhile, this paper adjusts parameters of Support Vector Machine(SVM) to find the optimal values by...
Sparse representation based classification (SRC) has been introduced as a new algorithm for face recognition classification instead of the classical gradient-based algorithms. However, there are some limitations that influence the robustness properties in SRC. One of the most effective parameters that impacts the SRC performance is the directory of training samples. It should contain enough samples...
In order to fully utilize the local geometric information of the given training set consisting of the normal data, locality correlation preserving (LCP) is introduced into the traditional one-class support vector machine (OCSVM). The proposed method, named as locality correlation preserving based one-class support vector machine (LCP-OCSVM), inherits the merits of LCP and OCSVM. It can keep locality...
The performance of a defect classification modeldepends on the features that are used to train it. Feature redundancy, correlation, and irrelevance can hinder the performance of a classification model. To mitigate this risk, researchers often use feature selection techniques, which transform or select a subset of the features in order to improve the performance of a classification model. Recent studies...
With the development of smart phones, more and more mobile phone malwares have came out in the market especially on the popular platforms such as Android, which can potentially cause harm to users' information. But how to effectively detect the new malwares and malicious software variants has been a difficult problem. In view of the traditional feature extraction method based on binary program, this...
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System (IDS), it proposes a new hybrid method based on the relationship of feature and spatial correlation for IDS. The proposed IDS reduces the dimension of network data flow by spatial correlation-based dimension reduction method (SCDR). It improves the effectiveness of intrusion...
The biggest concern of Network is security. Intro find the tricks and tools of the Attackers. Data Mining techniques automatically learn the pattern of the tuples and Intelligent decision are made. Supervised learning methods finds the attack based on previous knowledge and unknown attacks are detected by using Unsupervised learning. Dos, Probe and Normal data are correctly detected by maximum Data...
Kernel fusion is a popular and effective approach for combining multiple features that characterize different aspects of data. Traditional approaches for Multiple Kernel Learning (MKL) attempt to learn the parameters for combining the kernels through sophisticated optimization procedures. In this paper, we propose an alternative approach that creates dense embeddings for data using the kernel similarities...
Zero-shot Learning (ZSL) can leverage attributes to recognise unseen instances. However, the training data is limited and cannot adequately discriminate fine-grained classes with similar attributes. In this paper, we propose a complementary procedure that inversely makes use of attributes to infer discriminative visual features for unseen classes. In this way, ZSL is fully converted into conventional...
This paper proposes an object verification method by using sparse representation (SR) which has been applied for object representation and recognition. However, SR dictionary does not show sufficient compactness. Our method comprises three major modules. First, we train the sparse matrix by using boost K-Singular Value Decomposition (boost K-SVD) to obtain a sparse vector set. Second, we combine two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.