The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a multi-modal search engine for interior design that combines visual and textual queries. The goal of our engine is to retrieve interior objects, e.g. furniture or wall clocks, that share visual and aesthetic similarities with the query. Our search engine allows the user to take a photo of a room and retrieve with a high recall a list of items identical or visually similar...
This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. Whereas, the literatures have been reviewed to determine the algorithms developed. Some experiments have been conducted to analyze the model and system. The experiments are based on artificial neural network (ANN) algorithm that used back propagation and conjugate gradient...
Image resolution enhancement for shallow buried small targets is a meaningful step in holographic subsurface penetrating (HSR) imaging process, due to the fact that image results are easily affected by the complex underground environment and the follow-up high-level vision task is hindered. In this paper, we employ super-resolution convolutional neural network (SRCNN) in HSR image resolution enhancement...
In scenarios that are ambitious to protect sensitive data in compliance with privacy regulations, conventional score normalization utilizing large proportions of speaker cohort data is not feasible for existing technology, since the entire cohort data would need to be stored on each mobile device. Hence, in this work we motivate score normalization utilizing deep neural networks. Considering unconstrained...
Fraudulent activities (e.g., suspicious credit card transaction, financial reporting fraud, and money laundering) are critical concerns to various entities including bank, insurance companies, and public service organizations. Typically, these activities lead to detrimental effects on the victims such as a financial loss. Over the years, fraud analysis techniques underwent a rigorous development....
We present detection of various fdters using neural networks usable for our Long wave infrared (LWIR) hyperspectral detection system (HDES). Some reduction techniques are shown, for our aim of the small neural network with small computing requirements. In addition, the filter measurement is usable for calibration and verification of the HDES properties.
This work targets people identification in video based on the way they walk (i.e. gait) by using deep learning architectures. We explore the use of convolutional neural networks (CNN) for learning high-level descriptors from low-level motion features (i.e. optical flow components). The low number of training samples for each subject and the use of a test set containing subjects different from the...
Since their introduction over a year ago, Google's TensorFlow package for learning with multilayer neural networks and their Word2Vec representation of words have both gained a high degree of notoriety. This paper considers the application of TensorFlow-guided learning and Word2Vec-based representations to the problems of classification in requirements documents. In this paper, we compare three categories...
The GUINNESS is a tool flow for the deep neural network toward FPGA implementation [3,4,5] based on the GUI (Graphical User Interface) including both the binarized deep neural network training on GPUs and the inference on an FPGA. It generates the trained the Binarized deep neural network [2] on the desktop PC, then, it generates the bitstream by using standard the FPGA CAD tool flow. All the operation...
Person re-identification is a topic which has potential to be used for applications within forensics, flow analysis and queue monitoring. It is the process of matching persons across two or more camera views, most often by extracting colour and texture based hand-crafted features, to identify similar persons. Because of challenges regarding changes in lighting between views, occlusion or even privacy...
Increasingly, iris recognition towards more relaxed conditions has issued a new super-resolution field direction. In this work we evaluate the use of deep learning and transfer learning for single image super resolution applied to iris recognition. For this purpose, we explore if the nature of the images as well as if the pattern from the iris can influence the CNN transfer learning and, consequently,...
The concept of automated power system data analysis using Deep Neural Networks (as part of the routine tasks normally performed by Independent System Operators) is explored and developed in this paper. Specifically, we propose to use the widely-used Deep neural network architecture known as Convolutional Neural Networks (CNNs). To this end, a 2-D representation of power system data is developed and...
One of the important role for dc-dc converters is to regulate output voltage against the transient variation of input voltage. Recently, renewable energy becomes popular and renewable power generators are connected to the dc power grid directly, dc bus voltage is affected from them. Therefore, the improvement of the transient response against the variation of the dc bus voltage is required to control...
The paper presents a deep analysis of the literature on the problems of optimization of parameters and the structure of the neural networks and the basic disadvantages that are present in the observed algorithms and methods. As a result, there are suggested a new algorithm for neural network structure optimization, which is devoided of the major shortcomings of other algorithms. The paper includes...
The development of a deep (stacked) convolutional auto-encoder in the Caffe deep learning framework is presented in this paper. We describe simple principles which we used to create this model in Caffe. The proposed model of convolutional auto-encoder does not have pooling/unpooling layers yet. The results of our experimental research show comparable accuracy of dimensionality reduction in comparison...
Programmers produce code clones when developing software. By copying and pasting code with or without modification, developers reuse existing code to improve programming productivity. However, code clones present challenges to software maintenance: they may require consistent application of the same or similar bug fixes or program changes to multiple code locations. To simplify the maintenance process,...
Duplicate Bug Detection is the problem of identifying whether a newly reported bug is a duplicate of an existing bug in the system and retrieving the original or similar bugs from the past. This is required to avoid costly rediscovery and redundant work. In typical software projects, the number of duplicate bugs reported may run into the order of thousands, making it expensive in terms of cost and...
The article is devoted to designing of the control systems for weakly formalized objects using neural networks and fuzzy logic. An economical example is examined. The model of the predictive control system based on two neural fuzzy networks with the Sugeno interference is proposed. The first network is used for prediction of object's output, the second one for getting control signal. It's also proposed...
New trends in neural computation, now dealing with distributed learning on pervasive sensor networks and multiple sources of big data, make necessary the use of computationally efficient techniques to be implemented on simple and cheap hardware architectures. In this paper, a nonuniform quantization at the input layer of neural networks is introduced, in order to optimize their implementation on hardware...
The hyper-parameter optimization of machine learning model is not a completely solved problem. The exquisite combination of artificial tuning and grid search may be a good choice in the area where the dimension of hyper-parameters is very low. But for high-dimensional hyper-parameter optimization problems, artificial tuning and grid search are obviously helpless. In this paper, we propose a quantum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.