The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper evaluates three variants of the Gated Recurrent Unit (GRU) in recurrent neural networks (RNNs) by retaining the structure and systematically reducing parameters in the update and reset gates. We evaluate the three variant GRU models on MNIST and IMDB datasets and show that these GRU-RNN variant models perform as well as the original GRU RNN model while reducing the computational expense...
In most Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, channel estimation is required for equalization and symbol detection. It often exploits the specified pilot symbols consuming not only a large part of the throughput but also significant power resources. This paper quantifies the theoretical maximum power reduction of the transmitted pilots when...
This paper presents an artificial neural network (ANN) model based design for Hénon chaotic systems, and its equivalent hardware model for hardware co-simulation using Field Programmable Gate Arrays (FPGA). Chaotic generators can be used for the study of chaotic behaviors of brain activities captured by Electroencephalogram (EEG). The ANN model is designed with different fixed-point data format and...
Color is one of the attributes that play a role in identifying specific objects, color processing including the extraction of information about the spectral properties of the object's surface and look for the best similarity of a set of descriptions which have been known to do an introduction. Therefore, the classification is needed right fuji apples to obtain good quality fruit. Fuzzy model is one...
Point Process Models (PPM) have been widely used for keyword spotting applications. Training these models typically requires a considerable number of keyword examples. In this work, we consider a scenario where very few keyword examples are available for training. The availability of a limited number of training examples results in a PPM with poorly learnt parameters. We propose an unsupervised online...
With the wide spread of SNS (including Twitter, Facebook, and Flickr), there is a great demand for analyzing the associated Web contents consisting of a vast amount of opinions posted from anonymous users. Such opinions usually have explicit or implicit polarities. The polarity determination for short texts like Twitter is, however, very difficult. In this paper, we propose a method for sentiment...
Customer reviews, a.k.a. word-of-mouth reviews, have been important resources of information for text mining. They naturally include both positive and negative opinions on the products or services, as well as neutral observations helpful for everyone who is about to purchase the products or about to decide what to do with the product or the service. Among many customer reviews, we focus on cosmetic...
The introduction of data analytics into medicine has changed the nature of patient treatment. In this, patients are asked to disclose personal information such as genetic markers, lifestyle habits, and clinical history. This data is then used by statistical models to predict personalized treatments. However, due to privacy concerns, patients often desire to withhold sensitive information. This self-censorship...
In advanced wireless communication systems that require spectrally efficient modulation schemes, the modulated signal with a high peak-to-average power ratio (PAPR) drives the power amplifier (PA) to operate near the saturation region and introduces serious nonlinearity of the PA. Digital predistortion (DPD) is one of the most promising techniques for PA linearization. In this paper, we propose a...
The problems arising in loop electrical network system is a relay setting that follows changes in the system such as power source operation, regular maintenance and damage to powers source. To obtain an adaptive relay which is capable of following the changes in the network system, this paper is proposes the modeling of the coordination of the power system network with the cascade forward neural network...
Distributed representations have become the de facto standard by which many modern neural network architectures deal with natural language processing tasks. In particular, the word2vec algorithm introduced by Mikolov, et al. popularized the use of distributed representations by demonstrating that learned embeddings capture semantic relationships geometrically. Though word2vec addresses some of the...
with the popularity of the Internet and increasingly diversiform commodity, the recommendation system as a common approach came into our daily life, which supports an assistant decision-making when we purchase something on the internet. The traditional recommendation system is based on the user's collaborative filtering algorithm, and Amazon proposed a collaborative filtering algorithm to achieve...
Recently, kernelized correlation Filter-based trackers have aroused the interest of many researchers and achieved good results in the field of tracking. However, the current tracking model based on kernelized correlation filters can not deal with the changes of the target appearance and scale effectively. Therefore, in this paper, we intend to solve these two problems and improve the robustness of...
The unconstrained rise in water usage as a result of population growth, rapid urbanization and climate change has become an issue of paramount concern for policy makers across the globe. Consequently, fresh water as a renewable but finite resource must be managed efficiently to sustain domestic and productive activities. Efficient water management strategies must be developed to address the challenges...
This work proposes a method that allows the entry of text in smartwatches using gestures based on geometric forms. For this it is proposed the development of a prototype capable of inserting a letter with no more than two user interactions. Gesture recognition is performed using the incremental recognition algorithm. A set of gestures with lines and curves were created to be recognized by the incremental...
Twin support vector regression and its extensions have been widely applied in machine learning and data mining. However, most of them can not achieve the satisfactory performances when the noise is involved. To this end, this paper presents a weighted least squares twin support vector regression (WLSTSVR) which can reduce the influence of the noise on prediction accuracy by using the information of...
Least squares support vector machines (LSSVM) has a good performance in small data samples, but can't solve the large-scale sample problems. In this paper, large data set sparse least squares support vector machines model based on stochastic entropy is proposed, and it can be applied to large-scale data samples. Firstly, the large-scale data set is divided into several subsets. Then the entropy method...
Neural network is a kind of machine learning algorithm, applied in many ways. The traditional predictive guidance of aerocraft is hard to resolve the contradiction among robustness, real-time and the guidance of precision. The paper provides a predictive guidance algorithm for aerocraft, by combining neural network with predictive guidance to solve this problem. This research about the new style guidance...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
This paper proposes a method for generative learning of hierarchical random field models. The resulting model, which we call the hierarchical sparse FRAME (Filters, Random field, And Maximum Entropy) model, is a generalization of the original sparse FRAME model by decomposing it into multiple parts that are allowed to shift their locations, scales and rotations, so that the resulting model becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.