The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Principle of support vector regression method is investigated. Genetic algorithm is adopted to search the optimal SVR parameters to improve the generalization performance of SVR. Then an improved SVR method based on intelligent computing is put forward. At last, the proposed method is used in the prediction of ecological tourism economy. Different kernel functions are used for training data, and the...
Device drivers often suffer from much more bugs than the kernel, so testing device drivers becomes more and more important and necessary. In software testing, runtime tracing is an important technique to monitor real executing procedures of the program. Meanwhile, runtime information can also assist the programmer to make more accurate analysis of the program, like verifying the correctness of code...
We propose three regularization techniques to overcome drawbacks of local winner-take-all methods used in deep convolutional networks. Channel-Max inherits the max activation unit from Maxout networks, but otherwise adopts complementary subsets of input and filters with different kernel sizes as better companions to the max function. To balance the training on different pathways, Channel-Drop is employed...
In this paper, we proposed a region-based approach for indoor localization based on the fingerprint of radio signal strength (RSS). Unlike conventional fingerprint-based methods that based on point information to infer user's location, we used region information for indoor localization. Our results show that the proposed system has better positioning accuracy and more robustness to signal noise and...
Action recognition is a challenging task due to intra-class motion variation caused by diverse style and duration in performed action videos. Previous works on action recognition task are more focused on hand-crafted features, treat different sources of information independently, and simply combine them before classification. In this paper we study action recognition from depth sequences captured...
A method based on Interval Type-2 Fuzzy Logic Systems (IT2FLSs) for combination of different Support Vector Machines (SVMs) in order to bearing fault detection is the main argument of this paper. For this purpose, an experimental setup has been provided to collect data samples of stator current phase a of the induction motor using healthy and defective bearing. The defective bearing has an inner race...
Given noisy samples of a signal, the problem of testing whether the signal belongs to a given parametric class of signals is considered. We examine the nonparametric situation as for a well-defined null hypothesis signal model we admit broad alternative signal classes that cannot be parametrized. For such a setup, we introduce testing procedures relying on nonparametric kernel-type sampling reconstruction...
High false alarm rates and execution times are among the key issues in host-based anomaly detection systems. In this paper, we investigate the use of trace abstraction techniques for reducing the execution time of anomaly detectors while keeping the same accuracy. The key idea is to represent system call traces as traces of kernel module interactions and use the resulting abstract traces as input...
Users and developers of software distributions are often confronted with installation problems due to conflicting packages. A prototypical example of this are the Linux distributions such as Debian. Conflicts between packages have been studied under different points of view in the literature, in particular for the Debian operating system, but little is known about how these package conflicts evolve...
Software Fault Injection (SFI) is an established technique for assessing the robustness of a software under test by exposing it to faults in its operational environment. Depending on the complexity of this operational environment, the complexity of the software under test, and the number and type of faults, a thorough SFI assessment can entail (a) numerous experiments and (b) long experiment run times,...
The unsupervised learning of Self Organizing Map (SOM) is an effective computational tool in data mining exploration processes. It provides topology preserved data mapping from high-dimensional input space into low-dimensional representation such as two-dimensional map. The visualization and classification of clustered data even with good topological preservation between input and output spaces however...
Build systems contain a lot of configuration knowledge about a software system, such as under which conditions specific files are compiled. Extracting such configuration knowledge is important for many tools analyzing highly-configurable systems, but very challenging due to the complex nature of build systems. We design an approach, based on SYMake, that symbolically evaluates Make files and extracts...
Fingerprint minutiae distribution plays a critical role in studies such as fingerprint individuality for strengthening the scientific validity of fingerprint evidence and generating synthetic fingerprints for large-scale system evaluations. Fingerprint minutiae are not uniformly distributed as once assumed. Spatial inhomogeneity has been found in minutiae distribution, yet it is not clear what underlies...
Diseased skeletal muscle expresses mononuclear cell infiltration in the regions of perimysium. Accurate annotation or segmentation of perimysium can help biologists and clinicians to determine individualized patient treatment and allow for reasonable prognostication. However, manual perimysium annotation is time consuming and prone to inter-observer variations. Meanwhile, the presence of ambiguous...
In this paper, we propose a general collaborative sparse representation framework for multi-sensor classification which exploits correlation as well as complementary information among homogeneous and heterogeneous sensors while simultaneously extracting the low-rank interference term. Specifically, we observe that incorporating the noise or interfered signal as a low-rank component is essential in...
Deep Convolutional Neural Networks (DCNN) have established a remarkable performance benchmark in the field of image classification, displacing classical approaches based on hand-tailored aggregations of local descriptors. Yet DCNNs impose high computational burdens both at training and at testing time, and training them requires collecting and annotating large amounts of training data. Supervised...
Tensor-variate regression approaches have been spotlighted over the past years, due to the fact that many challenging regression tasks in the real world involve in high-order tensorial data. However, these approaches are often computationally prohibitive, which limits the predictive performance for large data sets. In this paper, we propose a computationally-efficient tensor-variate regression approach...
In this paper we investigate the problem of automatic classification of structural MRI images, to distinguish between schizophrenia patients and healthy controls. Our methodology involves usage of a meta-cognitive neural network architecture that addresses classification issues inspired by learning strategies of cognition in the human brain. Due to heterogeneity in schizophrenia patient population...
A person's face provides a lot of information such as age, gender and identity. Faces allow humans to estimate/ classify the age of other persons just by looking at their face. Researchers who carried out work in studying the process of age classification by humans conclude that humans are not so accurate in age classification; hence the possibility of developing facial age classification methods...
Taking motivation from Twin Support Vector Machine (TWSVM), Peng (2009) attempted to propose Twin Support Vector Regression (TSVR) where regressor was obtained via solving pair of Quadratic Programming Problems(QPPs). However the discussed formulation was not on the lines of TWSVM and had some restrictions. In this paper we propose formulation termed as Twin Support Vector Machine based Regression(TWSVR)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.