text stringlengths 0 4.09k |
|---|
Title: A Grey-Box Approach to Automated Mechanism Design |
Abstract: Auctions play an important role in electronic commerce, and have been used to solve problems in distributed computing. Automated approaches to designing effective auction mechanisms are helpful in reducing the burden of traditional game theoretic, analytic approaches and in searching through the large space o... |
Title: Face Recognition by Fusion of Local and Global Matching Scores using DS Theory: An Evaluation with Uni-classifier and Multi-classifier Paradigm |
Abstract: Faces are highly deformable objects which may easily change their appearance over time. Not all face areas are subject to the same variability. Therefore decoupling the information from independent areas of the face is of paramount importance to improve the robustness of any face recognition technique. This p... |
Title: Feature Level Clustering of Large Biometric Database |
Abstract: This paper proposes an efficient technique for partitioning large biometric database during identification. In this technique feature vector which comprises of global and local descriptors extracted from offline signature are used by fuzzy clustering technique to partition the database. As biometric features ... |
Title: Face Identification by SIFT-based Complete Graph Topology |
Abstract: This paper presents a new face identification system based on Graph Matching Technique on SIFT features extracted from face images. Although SIFT features have been successfully used for general object detection and recognition, only recently they were applied to face recognition. This paper further investiga... |
Title: SIFT-based Ear Recognition by Fusion of Detected Keypoints from Color Similarity Slice Regions |
Abstract: Ear biometric is considered as one of the most reliable and invariant biometrics characteristics in line with iris and fingerprint characteristics. In many cases, ear biometrics can be compared with face biometrics regarding many physiological and texture characteristics. In this paper, a robust and efficient... |
Title: Feature Level Fusion of Biometrics Cues: Human Identification with Doddingtons Caricature |
Abstract: This paper presents a multimodal biometric system of fingerprint and ear biometrics. Scale Invariant Feature Transform (SIFT) descriptor based feature sets extracted from fingerprint and ear are fused. The fused set is encoded by K-medoids partitioning approach with less number of feature points in the set. K... |
Title: Fusion of Multiple Matchers using SVM for Offline Signature Identification |
Abstract: This paper uses Support Vector Machines (SVM) to fuse multiple classifiers for an offline signature system. From the signature images, global and local features are extracted and the signatures are verified with the help of Gaussian empirical rule, Euclidean and Mahalanobis distance based classifiers. SVM is ... |
Title: Detecting Motifs in System Call Sequences |
Abstract: The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which repeat within time series data. The power of the algorithm ... |
Title: Some improved results on communication between information systems |
Abstract: To study the communication between information systems, Wang et al. [C. Wang, C. Wu, D. Chen, Q. Hu, and C. Wu, Communicating between information systems, Information Sciences 178 (2008) 3228-3239] proposed two concepts of type-1 and type-2 consistent functions. Some properties of such functions and induced r... |
Title: \'Etude et traitement automatique de l'anglais du XVIIe si\`ecle : outils morphosyntaxiques et dictionnaires |
Abstract: In this article, we record the main linguistic differences or singularities of 17th century English, analyse them morphologically and syntactically and propose equivalent forms in contemporary English. We show how 17th century texts may be transcribed into modern English, combining the use of electronic dicti... |
Title: "Mind your p's and q's": or the peregrinations of an apostrophe in 17th Century English |
Abstract: If the use of the apostrophe in contemporary English often marks the Saxon genitive, it may also indicate the omission of one or more let-ters. Some writers (wrongly?) use it to mark the plural in symbols or abbreviations, visual-ised thanks to the isolation of the morpheme "s". This punctuation mark was impo... |
Title: Recognition and translation Arabic-French of Named Entities: case of the Sport places |
Abstract: The recognition of Arabic Named Entities (NE) is a problem in different domains of Natural Language Processing (NLP) like automatic translation. Indeed, NE translation allows the access to multilingual in-formation. This translation doesn't always lead to expected result especially when NE contains a person n... |
Title: Morphological study of Albanian words, and processing with NooJ |
Abstract: We are developing electronic dictionaries and transducers for the automatic processing of the Albanian Language. We will analyze the words inside a linear segment of text. We will also study the relationship between units of sense and units of form. The composition of words takes different forms in Albanian. ... |
Title: A New Approximation to the Normal Distribution Quantile Function |
Abstract: We present a new approximation to the normal distribution quantile function. It has a similar form to the approximation of Beasley and Springer [3], providing a maximum absolute error of less than $2.5 \cdot 10^-5$. This is less accurate than [3], but still sufficient for many applications. However it is fast... |
Title: Dynamic shape analysis and comparison of leaf growth |
Abstract: In the statistical analysis of shape a goal beyond the analysis of static shapes lies in the quantification of `same' deformation of different shapes. Typically, shape spaces are modelled as Riemannian manifolds on which parallel transport along geodesics naturally qualifies as a measure for the `similarity' ... |
Title: Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems |
Abstract: In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, anti-virus software and intrusion dete... |
Title: Aggregating Algorithm competing with Banach lattices |
Abstract: The paper deals with on-line regression settings with signals belonging to a Banach lattice. Our algorithms work in a semi-online setting where all the inputs are known in advance and outcomes are unknown and given step by step. We apply the Aggregating Algorithm to construct a prediction method whose cumulat... |
Title: Inference on 3D Procrustes means: tree bole growth, rank-deficient diffusion tensors and perturbation models |
Abstract: The Central Limit Theorem (CLT) for extrinsic and intrinsic means on manifolds is extended to a generalization of Fr\'echet means. Examples are the Procrustes mean for 3D Kendall shapes as well as a mean introduced by Ziezold. This allows for one-sample tests previously not possible, and to numerically assess... |
Title: Using CODEQ to Train Feed-forward Neural Networks |
Abstract: CODEQ is a new, population-based meta-heuristic algorithm that is a hybrid of concepts from chaotic search, opposition-based learning, differential evolution and quantum mechanics. CODEQ has successfully been used to solve different types of problems (e.g. constrained, integer-programming, engineering) with e... |
Title: Efficient Bayesian Learning in Social Networks with Gaussian Estimators |
Abstract: We consider a group of Bayesian agents who try to estimate a state of the world $\theta$ through interaction on a social network. Each agent $v$ initially receives a private measurement of $\theta$: a number $S_v$ picked from a Gaussian distribution with mean $\theta$ and standard deviation one. Then, in each... |
Title: Prequential Plug-In Codes that Achieve Optimal Redundancy Rates even if the Model is Wrong |
Abstract: We analyse the prequential plug-in codes relative to one-parameter exponential families M. We show that if data are sampled i.i.d. from some distribution outside M, then the redundancy of any plug-in prequential code grows at rate larger than 1/2 ln(n) in the worst case. This means that plug-in codes, such as... |
Title: Approximations to the MMI criterion and their effect on lattice-based MMI |
Abstract: Maximum mutual information (MMI) is a model selection criterion used for hidden Markov model (HMM) parameter estimation that was developed more than twenty years ago as a discriminative alternative to the maximum likelihood criterion for HMM-based speech recognition. It has been shown in the speech recognitio... |
Title: On the meaning of mean shape |
Abstract: Various concepts of mean shape previously unrelated in the literature are brought into relation. In particular for non-manifolds such as Kendall's 3D shape space, this paper answers the question, for which means one may apply a two-sample test. The answer is positive if intrinsic or Ziezold means are used. Th... |
Title: K-Dimensional Coding Schemes in Hilbert Spaces |
Abstract: This paper presents a general coding method where data in a Hilbert space are represented by finite dimensional coding vectors. The method is based on empirical risk minimization within a certain class of linear operators, which map the set of coding vectors to the Hilbert space. Two results bounding the expe... |
Title: On Event Structure in the Torn Dress |
Abstract: Using Pustejovsky's "The Syntax of Event Structure" and Fong's "On Mending a Torn Dress" we give a glimpse of a Pustejovsky-like analysis to some example sentences in Fong. We attempt to give a framework for semantics to the noun phrases and adverbs as appropriate as well as the lexical entries for all words ... |
Title: Homomorphisms between fuzzy information systems revisited |
Abstract: Recently, Wang et al. discussed the properties of fuzzy information systems under homomorphisms in the paper [C. Wang, D. Chen, L. Zhu, Homomorphisms between fuzzy information systems, Applied Mathematics Letters 22 (2009) 1045-1050], where homomorphisms are based upon the concepts of consistent functions and... |
Title: Enhancing hyperspectral image unmixing with spatial correlations |
Abstract: This paper describes a new algorithm for hyperspectral image unmixing. Most of the unmixing algorithms proposed in the literature do not take into account the possible spatial correlations between the pixels. In this work, a Bayesian model is introduced to exploit these correlations. The image to be unmixed i... |
Title: Towards a Heuristic Categorization of Prepositional Phrases in English with WordNet |
Abstract: This document discusses an approach and its rudimentary realization towards automatic classification of PPs; the topic, that has not received as much attention in NLP as NPs and VPs. The approach is a rule-based heuristics outlined in several levels of our research. There are 7 semantic categories of PPs cons... |
Title: A CHAID Based Performance Prediction Model in Educational Data Mining |
Abstract: The performance in higher secondary school education in India is a turning point in the academic lives of all students. As this academic performance is influenced by many factors, it is essential to develop predictive data mining model for students' performance so as to identify the slow learners and study th... |
Title: A Comparative Study of Removal Noise from Remote Sensing Image |
Abstract: This paper attempts to undertake the study of three types of noise such as Salt and Pepper (SPN), Random variation Impulse Noise (RVIN), Speckle (SPKN). Different noise densities have been removed between 10% to 60% by using five types of filters as Mean Filter (MF), Adaptive Wiener Filter (AWF), Gaussian Fil... |
Title: Dimensionality Reduction: An Empirical Study on the Usability of IFE-CF (Independent Feature Elimination- by C-Correlation and F-Correlation) Measures |
Abstract: The recent increase in dimensionality of data has thrown a great challenge to the existing dimensionality reduction methods in terms of their effectiveness. Dimensionality reduction has emerged as one of the significant preprocessing steps in machine learning applications and has been effective in removing in... |
Title: Establishment of Relationships between Material Design and Product Design Domains by Hybrid FEM-ANN Technique |
Abstract: In this paper, research on AI based modeling technique to optimize development of new alloys with necessitated improvements in properties and chemical mixture over existing alloys as per functional requirements of product is done. The current research work novels AI in lieu of predictions to establish associa... |
Title: Detecting Bots Based on Keylogging Activities |
Abstract: A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled remotely by the attacker under a Command and Control structure. Recent statistics show that bots represent one of the fastest growing threats to our network by performing malicious a... |
Title: Manifold-Based Signal Recovery and Parameter Estimation from Compressive Measurements |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.