Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Recently, deep learning has enjoyed a great deal of success for computer vision problems due to its capability to model highly complex tasks, such as image classification, object detection, face recognition, among many others. Although these neural networks are nowadays very powerful, there is a huge amount of parameters (i.e. the model) that need to be learned and require considerable storage space...
Thanks to recent advances in the field of genomics, it is now possible to create a comprehensive atlas of the basic units of life—cells. In this paper, we present a frame work for single cell genomics research which employs several new machine learning models such as convolutional neural networks, deep auto-encoder, recurrent neural networks etc. With these effective learning models on multi-source...
Given an undirected network where some of the nodes are labeled, how can we classify the unlabeled nodes with high accuracy? Loopy Belief Propagation (LBP) is an inference algorithm widely used for this purpose with various applications including fraud detection, malware detection, web classification, and recommendation. However, previous methods based on LBP have problems in modeling complex structures...
In this paper, we propose the Computational Thinking concept, which is obtained by enhancing by merging the values of Computational Thinking and Agile. We analyze four existing teaching models for training Cooperative Thinkers, supported by experimental data, and propose an educational path that can promote the early development of this complex skill.
Fault tree analysis (FTA) is a prominent reliability analysis method widely used in safety-critical industries. Computing minimal cut sets (MCSs), i.e., finding all the smallest combination of basic events that result in the top level event, plays a fundamental role in FTA. Classical methods have been proposed based on manipulation of boolean expressions of fault trees and Binary Decision Diagrams...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
R-λ rate control scheme is recommended in the High Efficiency Video Coding (HEVC) standard, which shows high accuracy of bit rate control but lower rate distortion performance. In order to minimize the distortion subject to a target bit rate, a λ domain frame-level rate control scheme for low delay coding of HEVC was proposed. Firstly, an improved parameter updating method is presented for the frame...
Current light field compression techniques lack robustness to handle both rate-distortion optimized motion compensation as well as latency during the encoding and decoding process. This paper focuses on a contribution approach that uses advanced frame prediction with affine and translational motion models and optimized view prediction structures. This method allows a significant compression performance...
Continuous correction of train absolute position in local area is accomplished by connecting distance detect sensor group to on-board Automatic Train Protection (ATP) system and installing the height difference positioning matrix on the wayside. The on-board ATP system can detect every unit height of the height difference positioning matrix row element, and transfer the heights into a unique position...
The handwritten signature is perhaps the most accustomed way for the acknowledgement of the consent of an individual or the authentication of the identity of a person in numerous transactions. In addition, the authenticity of a questioned offline or static handwritten signature still poses a case of interest, especially in forensic related applications. A common approach in offline signature verification...
Texture classification has been extensively studied in computer vision. Recent research shows that the combination of Fisher vector (FV) encoding and convolutional neural network (CNN) provides significant improvement in texture classification over the previous feature representation methods. However, by truncating the CNN model at the last convolutional layer, the CNN-based FV descriptors would not...
This paper is on a new approach to mathematics of the notion of algorithm. We extend the higher-order, type-theory of acyclic recursion, i.e., of typed, state-dependent algorithms, which was originally introduced by Moschovakis in [1]. We introduce the concept of recursive λ-binding of argument slots across a sequence of mutually recursive assignments. The primary applications of the extended theory...
This qualitative study describes and models reputation motivation of Knowledge Sharing (KS) among academicians at a Malaysian public academic institution. A single case study approach was adopted to gather more meaningful insights on factors involved in building reputation motivation for KS. Data were collected from fifteen professors and associate professors through face-to-face interviews over a...
The paper specifies the value of evaluation of accuracy necessary for correct operation of number conversion algorithm from residue number system in weighted number system with use of the approximate method. On the basis of the approximate method the method of computation of residue number system bases extension is offered. Simulation shows that when checking large prime numbers the check algorithm...
The so-called Ring Road approach has been identified as interesting application area of DTN protocols. It leverages low-cost low-earth orbit satellites in order to inter-connect isolated networks with the Internet. Network coding may be used to introduce redundancy to address e.g. lossy links. In this paper, a simulator setup for network coding in Ring Road networks is presented and discussed. The...
DNA computing is a method of applying interactions among biological macromolecules to realize parallel computation, which has the extensive foreground of application. However, it is usually time consuming and expensive to validate the accuracy of DNA computing algorithms experimentally. Therefore, to reduce the cost of experiments, it is necessary to develop mathematical models for computer simulations...
Generative models of 3D human motion are often restricted to a small number of activities and can therefore not generalize well to novel movements or applications. In this work we propose a deep learning framework for human motion capture data that learns a generic representation from a large corpus of motion capture data and generalizes well to new, unseen, motions. Using an encoding-decoding network...
The CNN-encoding of features from entire videos for the representation of human actions has rarely been addressed. Instead, CNN work has focused on approaches to fuse spatial and temporal networks, but these were typically limited to processing shorter sequences. We present a new video representation, called temporal linear encoding (TLE) and embedded inside of CNNs as a new layer, which captures...
We propose local binary convolution (LBC), an efficient alternative to convolutional layers in standard convolutional neural networks (CNN). The design principles of LBC are motivated by local binary patterns (LBP). The LBC layer comprises of a set of fixed sparse pre-defined binary convolutional filters that are not updated during the training process, a non-linear activation function and a set of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.