Large Scale Wireless Indoor Localization by Clustering and Extreme Learning Machine

Size: px
Start display at page:

Download "Large Scale Wireless Indoor Localization by Clustering and Extreme Learning Machine"

Transcription

1 arge Scale Wireless Indoor ocalization by Clustering and Extreme earning Machine Wendong Xiao, Peidong iu 2, Wee-Seng Soh 2, Guang-Bin Huang 3 School of Automation and Electrical Engineering, University of Science and Technology Beijing, China 2 Department of Electrical & Computer Engineering, National University of Singapore, Singapore 3 School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore wendongxiao68@gmail.com, {u080428, elesohws}@nus.edu.sg, egbhuang@ntu.edu.sg Abstract Due to the widespread deployment and low cost, WAN has gained more attention for indoor localization recently. However, when we apply these WAN based localization algorithms to large-scale environments, such as a wireless city, they may encounter the scalability problem due to the huge RSS database. The huge database may cause long response time for the terminal clients if the localization algorithm needs to search the database for the real time localization phase. In this paper, we propose a novel clustering based localization algorithm for large scale area by utilizing Nearest Neighbor (NN) rule and Extreme earning Machine (EM). The proposed algorithm has shown competitive advantage in terms of the real time localization efficiency as well as the localization accuracy. Keywords- Scalability; WAN; Clustering; EM I. INTRODUCTION ocation Based Service (BS) is a key-enabling technology and widely exists in today s wireless communication networks from the short-range Bluetooth networks to the long-range telecommunication networks []. The accurate localization or positioning is a key research task for any location aware system. The Global Positioning System (GPS) is most widely used outdoors. However, due to the signal path loss and other technical limitations, GPS is unsuitable for the complex indoor environment. Many solutions utilizing the Angle of Arrival (AoA), the Time of Arrival (ToA) and the Time Difference of Arrival (TDoA) information have been proposed. Although these solutions provide high accuracy, they usually require advanced hardware, which will increase the cost and complexity of the systems. Due to the widespread deployment and low cost of Wireless ocal Area Network (WAN), WAN based indoor localization solutions have gained more attention, and the Received Signal Strength (RSS) based fingerprinting approach is recognized as the most popular one among them [2-4]. The fingerprinting localization procedure usually consists of two steps: offline phase and online phase. During the offline phase, an empirical database (or radio map) is built. Then they are utilized to do the real-time localizations. The methods can be grouped into three main categories: proximity based method, probability based method and Artificial Neural Network (ANN) based method. The proximity and probability based methods usually have large computation complexity during the online localization phase, which will cause a long response time if many clients are querying for the service at the same time. Meanwhile, the slow learning speed has been a major bottleneck for the traditional ANN in the past decades. The reason is that the hidden node parameters of the ANN need to be tuned recursively. In this paper, we utilize a new proposed machine learning algorithm: Extreme earning Machine (EM) proposed in [5]. As demonstrated in our previous work [6], EM based localization method can provide competitive fast real-time localization speed due to their ability to approximate the locations without searching the huge empirical database. This can also reduce the storage burden for the terminal clients. In the literature, several works have discussed how to apply these localization algorithms to large-scale environments, such as a wireless city (typically with a size about a few square kilometres) [7-0]. However, they may encounter the scalability problem due to the huge RSS database. We might need a very huge ANN architecture for the whole city if we do not scale it into small areas during the training and online localization phase. Even if we do not utilize ANN based method, the other two types of methods will bring long response time for the online phase due to the searching of the huge empirical database. The centralized approach also has many drawbacks for the database maintenance, e.g., Single point of failure, infrastructure cost etc. Several works have been done in the literature to address the scalability issue. Two clustering approaches were proposed in []: Explicit clustering approach and Implicit clustering approach. The Explicit clustering approach determines the clusters during the offline training phase as a separate step. The approach groups locations according to the Access Points (AP) that cover them. However, there are many parameters need to be calibrated for this approach. The Implicit clustering approach utilizes the property that each AP defines a subset of area that is covered by this AP. The method it used to locate these areas is to check the AP associated with the strongest mean RSS for each sample during the online phase. Then apply the probability based localization method to estimate the location by using the observation sequence from this access point alone. The localization method will give a location list; each location in the list is associated with a probability. If the largest probability is not significantly higher than the second largest one, the procedure will be repeated for the second AP which associated with the second largest mean RSS. This clustering method is time-consuming and the location might never be found since there might have no locations associated with a significantly probability. Another issue brought by this method is that there are many parameters need to be tuned for the real-time localization phase. A space partition scheme was introduced in [2] according to the locations of the reference points. This partition strategy gave little or no respect to the underlying 609

2 environment radio propagation properties. Another partition method called Intersection of APs was proposed in [3]. This method can only be applied to proximity based method and probability based method. Real-time localization still needs to search the empirical database. This still increases the response time of the query, although it can reduce the storage burden of the terminal devices. In this paper, we adopt a hybrid approach for large scale localization, similar to []. We determine the clusters in the offline phase and utilize the property that each AP defines a subset of locations covered by this AP. However, the procedure to do clustering is quite different from the methods in []. Nearest Neighbour (NN) rule are utilized in this paper. A location might not fall into the cluster defined by an AP, even the location is covered by this AP. The main contribution of this paper is that the proposed algorithm can give competitive clustering performance, the localization accuracy and efficiency given by the clustering method can also be improved compared to the method of no clustering. The rest of the paper is organized as follows. In section II, the background knowledge for this paper is provided. In section III, the detailed algorithm procedures are described. In section IV, the details of the experiment setup are given. Experimental results and evaluation of the proposed algorithm are given reported in Section V. Finally, the conclusion and future work are given in section VI. II. BACKGROUND KNOWEDGE A. NN rule Given a set of n pairs,,,,,,, where representation takes values in a metric space X, and category takes value in the set,2,,. Each is considered to be the index of the category to which the individual belongs, and each is the outcome of the set of measurements made upon that individual. For convenience, we shall say belongs to when we mean precisely that the individual, upon which measurements have been observed, belongs to category. A distance metric d is defined on space X. When a new pair of observation, is given, we need to determine the value of by using the observation. can take value from set,,,, and we say,,,, where associates with, is the value for if d( x, x) = min d( x, x), i =,2,, n. () NN i The distance function, can be Euclidean function or any other user defined distance functions. The NN rule determines an observation belongs to which category. A mistake is made if, and we call this a misclassification. NN rule utilizes only the classification of its nearest neighbor. The remaining neighbors are ignored [4]. B. EM EM is a kind of machine learning algorithm based on Single-hidden ayer Feedforward neural Networks (SFNs) architecture. It has been proved to provide good generalization performance at extremely fast learning speed [5]. Following is the brief description about EM given by Huang [5]. For SFNs, the outputs with hidden nodes can be represented as y ( x ) = β g ( x ) = β G( a, b, x ), (2) N i i i i i i= i= Where, are the weights and bias connecting the input nodes and the hidden node, are the output weights connecting the hidden node and the output nodes, and,, is the activation function which gives the output of the hidden node with respect to the input vector. Hornik [5] proved that if the activation function is continuous, bounded and non-constant, then neural networks can approximate the continuous functions over compact input sets. eshno [6] further proved that the feedforward networks with a non-polynomial activation function can approximate continuous mappings. However, in real applications, the training input sets are always finite. In order to be more applicable, Huang and Babri [7] shows that a SFN with at most N hidden nodes and with almost any nonlinear activation function can exactly learn N distinct observations. Suppose we have N arbitrary distinct training samples,,,2,,, we can represent the SFN for each sample as equation: N j i i i j i= y ( x ) = β G( a, b, x ), j =,2, N. (3) Now the above N equations can be written compactly as: Hβ = T, (4) where G( a, b, x) G( a, b, x) H =, (5) G( a, b, xn) G( a, b, xn) N T T β t β = and T =. (6) T T β m t N N m is called the hidden layer output matrix of EM; the column of is the hidden node s output vector with respect to inputs,,,, and the row of is the output vector of the hidden layer respect to the input vector of. Unlike the traditional training algorithms for neural network, which needs to adjust the input weights and hidden layer biases, Huang in [5] has proved that these parameters of SFN can be randomly assigned if only the activation function is infinitely differentiable. Thus, the hidden layer output matrix remains to be fixed once these parameters are randomly initialized. To train a SFN is simply equivalent to find a least solution of equation 4, which gives: norm( Hβ T) = min norm( Hβ T ). (7) S If the number of hidden nodes is equivalent to the number of samples N, is thus square and invertible according to [8]. The SFN can thus approximate these training samples with β 60

3 zero error. However, in most cases, the number of hidden nodes is much smaller than the number of training samples: <<N. is thus a non-square matrix and there may not exist,,, where i=,2,,, such that 0. In [9], it has been proved that the smallest norm least-square solution of Equation 4 is, where is the Moor- Penrose generalized inverse of H. III. AGORITHM FORMUATION The proposed algorithm can be divided into three main parts as shown in Figure : Selection of andmarks, Clustering based on NN rules, and ocalization by EM. A set of landmarks,,,, where is an observation/fingerprinting sample, will be selected based on the training data. For each landmark,,2,,, there will have only one cluster associated with it. Then for a new pair,, we need to find,,,, according to the NN rule. Since one fingerprinting sample is associated to one particular location l, thus we can further determine location l belongs to which cluster. Since there are more than one observations/fingerprinting samples for each location l, thus one location l might belong to several clusters due to the signal noise. Once all the locations have been clustered, the training data can be further divided into several subsets of training data according to their belonging clusters. Thus, the EMs associated with each cluster can be trained by utilizing the training data for that particular cluster. In order to simulate the real situation, the testing samples from testing data set will be fed into the trained EM one by one. For each testing sample, respective belonging cluster will be determined by the NN rule. Then respective trained EM for that cluster will be responsible for giving the estimated location associated with the observation. The testing procedure will be repeated for each observation until all the observations have been tested. Figure : Flow chart of the algorithm A. Selection of andmarks An Access Point (AP) can only be responsible for the data communication of a small area. For a large area, say a library, the data communication infrastructure consists of many APs deployed evenly across the whole area. For a small area dominated by one particular AP, the position of the strongest RSS for that AP should be the position or near the position of the AP. According to this property, we develop an algorithm to select these locations from the whole chunk of training data. The selection of the landmarks is based on the fingerprinting samples. We do not need to know where the APs are, since they are hidden sometimes. For each training location, there should have a dominated AP, which gives the largest mean RSS. Thus, there is a largest mean RSS of the dominated AP associating with each location, it can be represented as _,. Since the training locations are evenly distributed across the whole area. We can take a window operation to determine whether the centred location of the window has the largest among all the locations covered by the window. If yes, then the location will be determined as a landmark for further clustering. The RSS samples of the dominated AP for these landmarks will be recorded to the landmark database for further clustering. The outcomes for the selection of landmarks depend on the size of the window. It will be further discussed later. B. Clustering Based on NN rules Since the landmarks normally locate near the APs, thus they usually have large RSS for that particular AP. Therefore, the AP which dominates a landmark will be easily figured out by checking the RSSs of each AP. One AP will in charge of several channels in the data communication infrastructure. For each channel, there will have an allocated MAC address. Since we are using MAC address to identify different APs, we might measure similar RSS for several MAC addresses. The associated information with each landmark is thus these RSSs and MAC addresses of the dominated AP. They can be represented in mathematical form as,,,,,,, where,,, normally have similar values, since they are measured for different channels of the same AP. The Euclidean signal distance between each training sample and each landmark only in terms of the dominated AP will be calculated. Then we can use NN rule to determine its nearest landmark (or NN) for that sample. Thus, the samples are being clustered. The process for testing samples is the same. Thus, the locations associated with each sample are also being classified into different clusters. It should be noticed that one location may belong to several clusters. C. ocalization by EM The proposed localization algorithm by using EM is actually a regression method. The algorithm consists of offline and online phases. During the offline phase, an empirical database is built for each cluster. For each location, as long as it has one sample being classified into a cluster, all the samples associated with that location will be incorporated into that database for future EM training. Each entry of the database can be represented as,,,2,,, (n is the number of samples) in mathematical form. The vector are the inputs of the EM and the corresponding location vector are the outputs of EM. Thus, the EM can be trained as mentioned in Section II. The detailed steps are illustrated below: Step: Randomly assign values to hidden node parameters. 6

4 Step2: Calculate the hidden layer output matrix H. Step3: Calculate the output weight by: β = H, (8) where is the Moor-Penrose generalized inverse of H. For online localization, we only need to feed new measured RSS samples into the trained EM. The output given by EM is the estimated location. Figure 3: Selected andmarks with Window size=6m Figure 2: ayout and Distribution of Reference Points IV. EXPERIMENT The data used to evaluate the performance were collected at evel 6 of the Central ibrary of National University of Singapore. The size of the test-bed is approximately 59m 28m. The distance between adjacent points is normally.2m. Some may be larger than.2m, due to the skip of the table areas, which is not convenient for measurements. The layout of the area and the distribution of the reference points are shown in Figure 2. For each reference points, 60 samples were collected in total and 5 samples per direction. The data were further being divided into training data and testing data. For training data, the minimum distance of adjacent points is 2.4m. All the simulations are carried out in the MATAB 7. environment, which was running in an Intel Core i5, 2.4GHz CPU. V. RESUTS AND EVAUATIONS A. Result of andmark Selection Three different sizes of the window have been used to explore the relationship between the number of selected landmark and the window s size. It can be seen from Figure 3 to Figure 5 that the smaller the window size, the more landmarks will be chosen. There are two types of changes for RSS as shown in Figure 6, one is due to the multipath effect and noise, the RSS will fluctuate, although the samples are taken at the same location. Another kind of change is due to the path loss. Figure 4: Selected andmarks with Window size=0m Figure 5: Selected andmarks with Window size=0m For two samples of the same AP measured at two different locations, the sample which is measured nearer the AP will have larger RSS normally. If the distance between two reference locations is small, then the first kind of change will dominate the change of RSS, since the path loss is small 62

5 compared to the amplitude of the fluctuation of RSS. However, if the distance between two reference points is relatively large, the change caused by path loss will dominate the change of RSS as shown in Figure 6. Now it is easy to explain the above performance for different window size. When the window s size is 3m, the first kind of change will dominate the change of RSS instead of the path loss. Thus, unexpected landmarks will be selected. If the window s size is increased to 5m, more neighbor reference points for a location will be covered by the window, thus the path loss will dominate the change of RSS. It can give us suitable landmarks which are the real locations of each AP as shown in Figure 4. However, if the window s size keeps increasing, 2 potential correct landmarks (one landmark is centered in the window) might be covered by the same window at the same time. Unexpected loss of landmarks might occur in this case. testing locations. It is reasonable since they are treated by the same clustering procedure. Although there are some exceptions (as shown in Figure 7, some testing locations are a bit further away from the cluster), there are very few samples for these locations. This is due to the multipath effect and noise. If the amplitude of the fluctuation of RSS increases, the clustering performance will become worse. However, if the fluctuation is too large, there will also no other better solutions to provide acceptable localization service. C. Selection of the inputs for each EM The input variables for EM should be fixed so that the EM can be trained and used for localization. The input variables of the EM utilized in this paper are the original RSS samples. The performance of EM is explored by choosing different number of input variables experimentally. It can be seen from the Figure 8 that as we have more inputs, the better mean testing localization accuracy we will have. EM can also give more stable performance. However, if we analyse the performance of EM theoretically, we will find that there should be an upper bound for the number of input variables. The reason is that unnecessary input variables may bring unnecessary hidden nodes parameters. This will cause EM to be unstable and be easily over-fitted. This effect did not occur in our experiment. This might due to the number of our input variables is still smaller than this upper bound. For simulations, we choose the number of input variables experimentally. Figure 6: Two Types of RSS Change Figure 8: Testing Accuracy regards Number of input and hidden nodes Figure 7: One of the clusters, cluster 2. B. Result of Clustering Figure 7 demonstrates the performance of the clustering method by choosing an example cluster, e.g., cluster 2. It can be seen from Figure 7 that the area covered by the clustered training location matches the area covered by the clustered D. Final ocalization Accuracy and Comparison In order to evaluate the performance of our clustering method, the performance of no clustering method is also being explored. In this experiment, the parameters (e.g., the number of hidden nodes of EMs) of the clustering method are being adjusted to give the best localization accuracy regardless the time consumption. The parameters of the no clustering method are chosen to give two different kinds of performance. One kind of parameters selection is such that the method can consume the same time as the clustering method. Then the corresponding localization accuracies of the two different methods are being compared as shown in Figure 9. Another kind of parameters selection is such that the no clustering 63

6 method can give its best localization accuracy regardless the time consumption. Then the time consumption (Efficiency) is being compared with that of the clustering method as shown in Figure 0. Figure 9: Comparison of ocalization Accuracy Regards same time consumption Figure 0: Comparison of Time Consumption for the Best Accuracy It can be seen from Figure 9 that the clustering method can give an approximately m s better mean localization accuracy than that without clustering for the same time consumption. In terms of the best localization accuracy, it can be seen from Figure 0 that the mean localization accuracy can only reach approximately 4m at its best performance (The clustering method can give mean localization accuracy at m). However, the time consumption (or efficiency) is already approximately four times longer than the time consumed by the clustering method. It can be seen that the clustering method can give a better performance in terms of both of the efficiency and the localization accuracy. VI. CONCUSION AND FUTURE WORK More and more researchers are paying attention to the indoor localization solutions due to their wide applications in many areas recently. However, most existing works on indoor localization are proposed for small scale networks without the scalability consideration, which is an essential requirement in the real applications. In this paper, we have proposed a novel joint clustering and EM machine learning method to solve the scalability problem for indoor localization. It can be seen that the proposed method gives a better performance in terms of both the efficiency and the localization accuracy. In the future, the feature extraction of input variables may be explored, since it is an important part for the modelling of EM. REFERENCES [] Y. H. iu, Y. zheng, ocation, localization, and localizability: locationawareness technology for wireless networks, Springer, New York, 20. [2] P. Bahl and V. N. Padmanabhan, Radar: An in-building RF based user location and tracking system, In proceedings of IEEE Infocom, [3] W. Xiao, W. Ni, Y. K. Toh, Integrated Wi-Fi Fingerprinting and Inertial Sensing for Indoor Positioning, International Conference on Indoor Positioning and Indoor Navigation (IPIN), 20. [4] W. Meng, W. Xiao, W. Ni, and. Xie, Secure and Robust Wi-Fi Fingerprinting Indoor ocalization, 20 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 20. [5] G.-B. Huang, Q.-Y. Zhu, C.-K. Siew, Extreme learning machine: theory and applications, Neurocomputing 70 ( 3) (2006) [6] W. Xiao, P. iu, W. Soh, Y. Jin, Extreme learning machine for wireless indoor localization, th Internation Conference on Information Processing and Sensor Networs, IPSN 202. [7] J. etchner, D. Fox, and A. amarca. arge-scale lcalization from Wireless Signal Strength. In Proc. of the Nat'l Conf on Artificial Intelligence (AAAI), pages 5-20, [8] Y.-C. Cheng, Y. Chawathe, A. amarca, and J. Krumm. Accuracy Characterization for Metropolitan-scale WiFi ocalization. In ACM MOBISYS, volume 5, pages , [9] A. amarca, J. Hightower, I. Smith, and S. Consolvo. Self-Mapping in 802. ocation Systems. In Proc. 7th Int'l Conff on Ubiquitous Computing (UBICOMP), pages Springer, [0] A. Haeberlen, E. Flannery, A. M. add, A. Rudys, D. S. Wallach, and. E. Kavraki. Practical Robust ocal ization over arge-scale 802. Wireless Networks. In IEEE ACM MOBI COM, pages 70-84, [] M. Youssef, A. Agrawala, ocation-clustering techniques for WAN location determination systems (2006), International Journal of Computers and Applications, 28 (3), pp [2] M. Borenović, A. Nešković, D. Budimir, Space partitioning strategies for indoor WAN positioning with cascade-connected ANN structures, International Journal of Neural Systems, 2 (), pp. -5, 20. doi: 0.42/S [3] T. King, T. Haenselmann, W. Effelsberg, On-demand fingerprint selection for 802.-based positioning systems, IEEE International symposium on a world of wireless, mobile and multimedia networks (WoWMoM 2008), 2008 [4] T. M. Cover, P. E. Hart, Nearest neighbour pattern classification, IEEE Transction on Information Theory, Vol. IT-3, No., pages 2-27, 967. [5] K. Hornik, Approximation capabilities of multilayer feedforward networks, Neural Networks 4 (99) [6] M. eshno, V.Y. in, A. Pinkus, S. Schocken, Multilayer feedforward networks with a nonpolynomial activation function can approximate any function, Neural Networks 6 (993) [7] G.-B. Huang, H.A. Babri, Upper bounds on the number of hidden neurons in feedforward networks with arbitrary bounded nonlinear activation functions, IEEE Trans. Neural Networks 9 () (998) [8] G.-B. Huang, D. Wang,. Yuan, Extreme learning machine: a survey, Int. J. Mach. earn. & Cyber,Vol 2, page 07-22, 20 [9] D. Serre, Matrices: Theory and Applications, Springer, New York,

An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao1, a, Hu Jianming2, b, Zhang Yi3 and Wang Zhenyu4

An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao1, a, Hu Jianming2, b, Zhang Yi3 and Wang Zhenyu4 6th International Conference on Information Engineering for Mechanics and Materials (ICIMM 206) An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao, a, Hu Jianming2,

More information

Extreme Learning Machine: A New Learning Scheme of Feedforward Neural Networks

Extreme Learning Machine: A New Learning Scheme of Feedforward Neural Networks Extreme Learning Machine: A New Learning Scheme of Feedforward Neural Networks Guang-Bin Huang, Qin-Yu Zhu, and Chee-Kheong Siew School of Electrical and Electronic Engineering Nanyang Technological University

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Sequence-Type Fingerprinting for Indoor Localization

Sequence-Type Fingerprinting for Indoor Localization Sequence-Type Fingerprinting for Indoor Localization Wei Hu, Yongcai Wang and Lei Song Institute for Interdisciplinary Information Sciences Tsinghua University Beijing, China Email: huw2@mails.tsinghua.edu.cn,

More information

Extreme Learning Machines. Tony Oakden ANU AI Masters Project (early Presentation) 4/8/2014

Extreme Learning Machines. Tony Oakden ANU AI Masters Project (early Presentation) 4/8/2014 Extreme Learning Machines Tony Oakden ANU AI Masters Project (early Presentation) 4/8/2014 This presentation covers: Revision of Neural Network theory Introduction to Extreme Learning Machines ELM Early

More information

SURF Kick-Off Meeting: Review of Indoor Localisation Based on Wi-Fi Fingerprinting with Deep Neural Networks

SURF Kick-Off Meeting: Review of Indoor Localisation Based on Wi-Fi Fingerprinting with Deep Neural Networks SURF-201830 Kick-Off Meeting: Review of Indoor Localisation Based on Wi-Fi Fingerprinting with Deep Neural Networks Kyeong Soo (Joseph) Kim Department of Electrical and Electronic Engineering Centre of

More information

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

Channel Performance Improvement through FF and RBF Neural Network based Equalization

Channel Performance Improvement through FF and RBF Neural Network based Equalization Channel Performance Improvement through FF and RBF Neural Network based Equalization Manish Mahajan 1, Deepak Pancholi 2, A.C. Tiwari 3 Research Scholar 1, Asst. Professor 2, Professor 3 Lakshmi Narain

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

Artificial Neural Network-Based Prediction of Human Posture

Artificial Neural Network-Based Prediction of Human Posture Artificial Neural Network-Based Prediction of Human Posture Abstract The use of an artificial neural network (ANN) in many practical complicated problems encourages its implementation in the digital human

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

Neuro-adaptive Formation Maintenance and Control of Nonholonomic Mobile Robots

Neuro-adaptive Formation Maintenance and Control of Nonholonomic Mobile Robots Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 2014 Paper No. 50 Neuro-adaptive Formation Maintenance and Control of Nonholonomic

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

COMPUTATIONAL INTELLIGENCE SEW (INTRODUCTION TO MACHINE LEARNING) SS18. Lecture 6: k-nn Cross-validation Regularization

COMPUTATIONAL INTELLIGENCE SEW (INTRODUCTION TO MACHINE LEARNING) SS18. Lecture 6: k-nn Cross-validation Regularization COMPUTATIONAL INTELLIGENCE SEW (INTRODUCTION TO MACHINE LEARNING) SS18 Lecture 6: k-nn Cross-validation Regularization LEARNING METHODS Lazy vs eager learning Eager learning generalizes training data before

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Indoor Localisation Based on Wi-Fi Fingerprinting with Fuzzy Sets

Indoor Localisation Based on Wi-Fi Fingerprinting with Fuzzy Sets Indoor Localisation Based on Wi-Fi Fingerprinting with Fuzzy Sets Kyeong Soo (Joseph) Kim Department of Electrical and Electronic Engineering Centre of Smart Grid and Information Convergence Xi an Jiaotong-Liverpool

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Solving Large Regression Problems using an Ensemble of GPU-accelerated ELMs

Solving Large Regression Problems using an Ensemble of GPU-accelerated ELMs Solving Large Regression Problems using an Ensemble of GPU-accelerated ELMs Mark van Heeswijk 1 and Yoan Miche 2 and Erkki Oja 1 and Amaury Lendasse 1 1 Helsinki University of Technology - Dept. of Information

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

A Fast Multivariate Nearest Neighbour Imputation Algorithm

A Fast Multivariate Nearest Neighbour Imputation Algorithm A Fast Multivariate Nearest Neighbour Imputation Algorithm Norman Solomon, Giles Oatley and Ken McGarry Abstract Imputation of missing data is important in many areas, such as reducing non-response bias

More information

Supervised Learning (contd) Linear Separation. Mausam (based on slides by UW-AI faculty)

Supervised Learning (contd) Linear Separation. Mausam (based on slides by UW-AI faculty) Supervised Learning (contd) Linear Separation Mausam (based on slides by UW-AI faculty) Images as Vectors Binary handwritten characters Treat an image as a highdimensional vector (e.g., by reading pixel

More information

Research Directions in Low-Power Wireless Networks

Research Directions in Low-Power Wireless Networks Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,

More information

An RSSI Gradient-based AP Localization Algorithm

An RSSI Gradient-based AP Localization Algorithm An RSSI Gradient-based AP Localization Algorithm Presenter: Cheng-Xuan, Wu Year: 2014, Volume: 11, Issue: 2 Pages: 100-108, DOI: 10.1109/CC.2014.6821742 Cited by: Papers (2) IEEE Journals & Magazines Outline

More information

A Fuzzy C-means Clustering Algorithm Based on Pseudo-nearest-neighbor Intervals for Incomplete Data

A Fuzzy C-means Clustering Algorithm Based on Pseudo-nearest-neighbor Intervals for Incomplete Data Journal of Computational Information Systems 11: 6 (2015) 2139 2146 Available at http://www.jofcis.com A Fuzzy C-means Clustering Algorithm Based on Pseudo-nearest-neighbor Intervals for Incomplete Data

More information

Research on Evaluation Method of Product Style Semantics Based on Neural Network

Research on Evaluation Method of Product Style Semantics Based on Neural Network Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Nelder-Mead Enhanced Extreme Learning Machine

Nelder-Mead Enhanced Extreme Learning Machine Philip Reiner, Bogdan M. Wilamowski, "Nelder-Mead Enhanced Extreme Learning Machine", 7-th IEEE Intelligent Engineering Systems Conference, INES 23, Costa Rica, June 9-2., 29, pp. 225-23 Nelder-Mead Enhanced

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Notes on Multilayer, Feedforward Neural Networks

Notes on Multilayer, Feedforward Neural Networks Notes on Multilayer, Feedforward Neural Networks CS425/528: Machine Learning Fall 2012 Prepared by: Lynne E. Parker [Material in these notes was gleaned from various sources, including E. Alpaydin s book

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Textural Features for Image Database Retrieval

Textural Features for Image Database Retrieval Textural Features for Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington Seattle, WA 98195-2500 {aksoy,haralick}@@isl.ee.washington.edu

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used. 1 4.12 Generalization In back-propagation learning, as many training examples as possible are typically used. It is hoped that the network so designed generalizes well. A network generalizes well when

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Evaluating Indoor Positioning Errors

Evaluating Indoor Positioning Errors Evaluating Indoor Positioning Errors Teemu Pulkkinen, Johannes Verwijnen, Ekahau Oy ICTC 2015, Oct 28, Jeju Island Copyright 2013 Ekahau, Inc. All rights reserved. Outline Ekahau & WiFi Positioning Positioning

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

An Improved KNN Classification Algorithm based on Sampling

An Improved KNN Classification Algorithm based on Sampling International Conference on Advances in Materials, Machinery, Electrical Engineering (AMMEE 017) An Improved KNN Classification Algorithm based on Sampling Zhiwei Cheng1, a, Caisen Chen1, b, Xuehuan Qiu1,

More information

An Efficient Learning Scheme for Extreme Learning Machine and Its Application

An Efficient Learning Scheme for Extreme Learning Machine and Its Application An Efficient Learning Scheme for Extreme Learning Machine and Its Application Kheon-Hee Lee, Miso Jang, Keun Park, Dong-Chul Park, Yong-Mu Jeong and Soo-Young Min Abstract An efficient learning scheme

More information

A Recommender System Based on Improvised K- Means Clustering Algorithm

A Recommender System Based on Improvised K- Means Clustering Algorithm A Recommender System Based on Improvised K- Means Clustering Algorithm Shivani Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra Shivanigaur83@yahoo.com Abstract:

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya

More information

Color Image Segmentation

Color Image Segmentation Color Image Segmentation Yining Deng, B. S. Manjunath and Hyundoo Shin* Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 93106-9560 *Samsung Electronics Inc.

More information

A Lazy Approach for Machine Learning Algorithms

A Lazy Approach for Machine Learning Algorithms A Lazy Approach for Machine Learning Algorithms Inés M. Galván, José M. Valls, Nicolas Lecomte and Pedro Isasi Abstract Most machine learning algorithms are eager methods in the sense that a model is generated

More information

Portable GPU-Based Artificial Neural Networks For Data-Driven Modeling

Portable GPU-Based Artificial Neural Networks For Data-Driven Modeling City University of New York (CUNY) CUNY Academic Works International Conference on Hydroinformatics 8-1-2014 Portable GPU-Based Artificial Neural Networks For Data-Driven Modeling Zheng Yi Wu Follow this

More information

Fully complex extreme learning machine

Fully complex extreme learning machine Neurocomputing 68 () 36 3 wwwelseviercom/locate/neucom Letters Fully complex extreme learning machine Ming-Bin Li, Guang-Bin Huang, P Saratchandran, N Sundararajan School of Electrical and Electronic Engineering,

More information

Encoding Words into String Vectors for Word Categorization

Encoding Words into String Vectors for Word Categorization Int'l Conf. Artificial Intelligence ICAI'16 271 Encoding Words into String Vectors for Word Categorization Taeho Jo Department of Computer and Information Communication Engineering, Hongik University,

More information

PARALLEL TRAINING OF NEURAL NETWORKS FOR SPEECH RECOGNITION

PARALLEL TRAINING OF NEURAL NETWORKS FOR SPEECH RECOGNITION PARALLEL TRAINING OF NEURAL NETWORKS FOR SPEECH RECOGNITION Stanislav Kontár Speech@FIT, Dept. of Computer Graphics and Multimedia, FIT, BUT, Brno, Czech Republic E-mail: xkonta00@stud.fit.vutbr.cz In

More information

A Comparative Study of SVM Kernel Functions Based on Polynomial Coefficients and V-Transform Coefficients

A Comparative Study of SVM Kernel Functions Based on Polynomial Coefficients and V-Transform Coefficients www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20765-20769 Index Copernicus value (2015): 58.10 DOI: 18535/ijecs/v6i3.65 A Comparative

More information

Spatial Index Keyword Search in Multi- Dimensional Database

Spatial Index Keyword Search in Multi- Dimensional Database Spatial Index Keyword Search in Multi- Dimensional Database Sushma Ahirrao M. E Student, Department of Computer Engineering, GHRIEM, Jalgaon, India ABSTRACT: Nearest neighbor search in multimedia databases

More information

Optimization on TEEN routing protocol in cognitive wireless sensor network

Optimization on TEEN routing protocol in cognitive wireless sensor network Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong

More information

Some questions of consensus building using co-association

Some questions of consensus building using co-association Some questions of consensus building using co-association VITALIY TAYANOV Polish-Japanese High School of Computer Technics Aleja Legionow, 4190, Bytom POLAND vtayanov@yahoo.com Abstract: In this paper

More information

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan 5th International Conference on Civil Engineering and Transportation (ICCET 205) Traffic Flow Prediction Based on the location of Big Data Xijun Zhang, Zhanting Yuan Lanzhou Univ Technol, Coll Elect &

More information

FINGERPRINTING, one of the most used location estimation

FINGERPRINTING, one of the most used location estimation , June 29 - July 1, 2016, London, U.K. Using Propagation Models to Build Fingerprint Maps and Assess Location Estimation Algorithms Performance Pedro Mestre, Member, IAENG, Joao Cordeiro, Luis Reigoto,

More information

Fast Learning for Big Data Using Dynamic Function

Fast Learning for Big Data Using Dynamic Function IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Fast Learning for Big Data Using Dynamic Function To cite this article: T Alwajeeh et al 2017 IOP Conf. Ser.: Mater. Sci. Eng.

More information

Neural Network Weight Selection Using Genetic Algorithms

Neural Network Weight Selection Using Genetic Algorithms Neural Network Weight Selection Using Genetic Algorithms David Montana presented by: Carl Fink, Hongyi Chen, Jack Cheng, Xinglong Li, Bruce Lin, Chongjie Zhang April 12, 2005 1 Neural Networks Neural networks

More information

INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION

INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION http:// INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION 1 Rajat Pradhan, 2 Satish Kumar 1,2 Dept. of Electronics & Communication Engineering, A.S.E.T.,

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Clustering Algorithms for Data Stream

Clustering Algorithms for Data Stream Clustering Algorithms for Data Stream Karishma Nadhe 1, Prof. P. M. Chawan 2 1Student, Dept of CS & IT, VJTI Mumbai, Maharashtra, India 2Professor, Dept of CS & IT, VJTI Mumbai, Maharashtra, India Abstract:

More information

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real

More information

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Research on Relative Coordinate Localization of Nodes Based on Topology Control Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 2, March 2018 Research on Relative Coordinate Localization of Nodes Based

More information

Random Forest A. Fornaser

Random Forest A. Fornaser Random Forest A. Fornaser alberto.fornaser@unitn.it Sources Lecture 15: decision trees, information theory and random forests, Dr. Richard E. Turner Trees and Random Forests, Adele Cutler, Utah State University

More information

String Vector based KNN for Text Categorization

String Vector based KNN for Text Categorization 458 String Vector based KNN for Text Categorization Taeho Jo Department of Computer and Information Communication Engineering Hongik University Sejong, South Korea tjo018@hongik.ac.kr Abstract This research

More information

A Learning Algorithm for Piecewise Linear Regression

A Learning Algorithm for Piecewise Linear Regression A Learning Algorithm for Piecewise Linear Regression Giancarlo Ferrari-Trecate 1, arco uselli 2, Diego Liberati 3, anfred orari 1 1 nstitute für Automatik, ETHZ - ETL CH 8092 Zürich, Switzerland 2 stituto

More information

Extending reservoir computing with random static projections: a hybrid between extreme learning and RC

Extending reservoir computing with random static projections: a hybrid between extreme learning and RC Extending reservoir computing with random static projections: a hybrid between extreme learning and RC John Butcher 1, David Verstraeten 2, Benjamin Schrauwen 2,CharlesDay 1 and Peter Haycock 1 1- Institute

More information

IN recent years, neural networks have attracted considerable attention

IN recent years, neural networks have attracted considerable attention Multilayer Perceptron: Architecture Optimization and Training Hassan Ramchoun, Mohammed Amine Janati Idrissi, Youssef Ghanou, Mohamed Ettaouil Modeling and Scientific Computing Laboratory, Faculty of Science

More information

Online algorithms for clustering problems

Online algorithms for clustering problems University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Summary of the Ph.D. thesis by Gabriella Divéki Supervisor Dr. Csanád Imreh

More information

Feature selection in environmental data mining combining Simulated Annealing and Extreme Learning Machine

Feature selection in environmental data mining combining Simulated Annealing and Extreme Learning Machine Feature selection in environmental data mining combining Simulated Annealing and Extreme Learning Machine Michael Leuenberger and Mikhail Kanevski University of Lausanne - Institute of Earth Surface Dynamics

More information

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset. Glossary of data mining terms: Accuracy Accuracy is an important factor in assessing the success of data mining. When applied to data, accuracy refers to the rate of correct values in the data. When applied

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

Using Association Rules for Better Treatment of Missing Values

Using Association Rules for Better Treatment of Missing Values Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University

More information

The Application Research of Neural Network in Embedded Intelligent Detection

The Application Research of Neural Network in Embedded Intelligent Detection The Application Research of Neural Network in Embedded Intelligent Detection Xiaodong Liu 1, Dongzhou Ning 1, Hubin Deng 2, and Jinhua Wang 1 1 Compute Center of Nanchang University, 330039, Nanchang,

More information

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018 MIT 801 [Presented by Anna Bosman] 16 February 2018 Machine Learning What is machine learning? Artificial Intelligence? Yes as we know it. What is intelligence? The ability to acquire and apply knowledge

More information

A methodology for Building Regression Models using Extreme Learning Machine: OP-ELM

A methodology for Building Regression Models using Extreme Learning Machine: OP-ELM A methodology for Building Regression Models using Extreme Learning Machine: OP-ELM Yoan Miche 1,2, Patrick Bas 1,2, Christian Jutten 2, Olli Simula 1 and Amaury Lendasse 1 1- Helsinki University of Technology

More information

Neural Network based textural labeling of images in multimedia applications

Neural Network based textural labeling of images in multimedia applications Neural Network based textural labeling of images in multimedia applications S.A. Karkanis +, G.D. Magoulas +, and D.A. Karras ++ + University of Athens, Dept. of Informatics, Typa Build., Panepistimiopolis,

More information

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani Neural Networks CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Biological and artificial neural networks Feed-forward neural networks Single layer

More information

Visual object classification by sparse convolutional neural networks

Visual object classification by sparse convolutional neural networks Visual object classification by sparse convolutional neural networks Alexander Gepperth 1 1- Ruhr-Universität Bochum - Institute for Neural Dynamics Universitätsstraße 150, 44801 Bochum - Germany Abstract.

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Robot localization method based on visual features and their geometric relationship

Robot localization method based on visual features and their geometric relationship , pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department

More information

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Mohammad Mehrani, Ali Shaeidi, Mohammad Hasannejad, and Amir Afsheh Abstract Routing is one of the most important issues

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Model-based segmentation and recognition from range data

Model-based segmentation and recognition from range data Model-based segmentation and recognition from range data Jan Boehm Institute for Photogrammetry Universität Stuttgart Germany Keywords: range image, segmentation, object recognition, CAD ABSTRACT This

More information

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Zheng Yue-zhai and Chen Xiao-ying Abstract With the development of network and communication technology, this article

More information

Data Discretization Using the Extreme Learning Machine Neural Network

Data Discretization Using the Extreme Learning Machine Neural Network Data Discretization Using the Extreme Learning Machine Neural Network Juan Jesús Carneros, José M. Jerez, Iván Gómez, and Leonardo Franco Universidad de Málaga, Department of Computer Science, ETSI Informática,

More information

Gesture Recognition using Neural Networks

Gesture Recognition using Neural Networks Gesture Recognition using Neural Networks Jeremy Smith Department of Computer Science George Mason University Fairfax, VA Email: jsmitq@masonlive.gmu.edu ABSTRACT A gesture recognition method for body

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A faster model selection criterion for OP-ELM and OP-KNN: Hannan-Quinn criterion

A faster model selection criterion for OP-ELM and OP-KNN: Hannan-Quinn criterion A faster model selection criterion for OP-ELM and OP-KNN: Hannan-Quinn criterion Yoan Miche 1,2 and Amaury Lendasse 1 1- Helsinki University of Technology - ICS Lab. Konemiehentie 2, 02015 TKK - Finland

More information

Introduction to Artificial Intelligence

Introduction to Artificial Intelligence Introduction to Artificial Intelligence COMP307 Machine Learning 2: 3-K Techniques Yi Mei yi.mei@ecs.vuw.ac.nz 1 Outline K-Nearest Neighbour method Classification (Supervised learning) Basic NN (1-NN)

More information

Semi-Supervised Clustering with Partial Background Information

Semi-Supervised Clustering with Partial Background Information Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject

More information

CHAPTER VI BACK PROPAGATION ALGORITHM

CHAPTER VI BACK PROPAGATION ALGORITHM 6.1 Introduction CHAPTER VI BACK PROPAGATION ALGORITHM In the previous chapter, we analysed that multiple layer perceptrons are effectively applied to handle tricky problems if trained with a vastly accepted

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management A NOVEL HYBRID APPROACH FOR PREDICTION OF MISSING VALUES IN NUMERIC DATASET V.B.Kamble* 1, S.N.Deshmukh 2 * 1 Department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad.

More information

Concept Tree Based Clustering Visualization with Shaded Similarity Matrices

Concept Tree Based Clustering Visualization with Shaded Similarity Matrices Syracuse University SURFACE School of Information Studies: Faculty Scholarship School of Information Studies (ischool) 12-2002 Concept Tree Based Clustering Visualization with Shaded Similarity Matrices

More information

A New Online Clustering Approach for Data in Arbitrary Shaped Clusters

A New Online Clustering Approach for Data in Arbitrary Shaped Clusters A New Online Clustering Approach for Data in Arbitrary Shaped Clusters Richard Hyde, Plamen Angelov Data Science Group, School of Computing and Communications Lancaster University Lancaster, LA1 4WA, UK

More information

Knowledge Discovery and Data Mining. Neural Nets. A simple NN as a Mathematical Formula. Notes. Lecture 13 - Neural Nets. Tom Kelsey.

Knowledge Discovery and Data Mining. Neural Nets. A simple NN as a Mathematical Formula. Notes. Lecture 13 - Neural Nets. Tom Kelsey. Knowledge Discovery and Data Mining Lecture 13 - Neural Nets Tom Kelsey School of Computer Science University of St Andrews http://tom.home.cs.st-andrews.ac.uk twk@st-andrews.ac.uk Tom Kelsey ID5059-13-NN

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

Knowledge Discovery and Data Mining

Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Lecture 13 - Neural Nets Tom Kelsey School of Computer Science University of St Andrews http://tom.home.cs.st-andrews.ac.uk twk@st-andrews.ac.uk Tom Kelsey ID5059-13-NN

More information

Detection and Localization of Spoofing in Wireless and Sensor Networks

Detection and Localization of Spoofing in Wireless and Sensor Networks Detection and Localization of Spoofing in Wireless and Sensor Networks Prof. Chandrakant M. Jadhav #, Prof. Sharad S. Shinde* #Head of Department of Computer Science & Engineering, B.I.G.C.E., Solapur,

More information

Application Wireless Location Base Service in Binus Square

Application Wireless Location Base Service in Binus Square > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Application Wireless Location Base Service in Binus Square Johan Muliadi Kerta, Hendra Arifin, Andreas, Sofian

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information