Fast Methods for Kernel-based Text Analysis
|
|
- Verity Bishop
- 5 years ago
- Views:
Transcription
1 Proceedings of the 41st Annua Meeting of the Association for Computationa Linguistics, Juy 2003, pp Fast Methods for Kerne-based Text Anaysis Taku Kudo and Yuji Matsumoto Graduate Schoo of Information Science, Nara Institute of Science and Technoogy Abstract Kerne-based earning (e.g., Support Vector Machines has been successfuy appied to many hard probems in Natura Language Processing (NLP. In NLP, athough feature combinations are crucia to improving performance, they are heuristicay seected. Kerne methods change this situation. The merit of the kerne methods is that effective feature combination is impicity expanded without oss of generaity and increasing the computationa costs. Kerne-based text anaysis shows an exceent performance in terms in accuracy; however, these methods are usuay too sow to appy to arge-scae text anaysis. In this paper, we extend a Basket Mining agorithm to convert a kerne-based cassifier into a simpe and fast inear cassifier. Experimenta resuts on Engish BaseNP Chunking, Japanese Word Segmentation and Japanese Dependency Parsing show that our new cassifiers are about 30 to 300 times faster than the standard kerne-based cassifiers. 1 Introduction Kerne methods (e.g., Support Vector Machines (Vapnik, 1995 attract a great dea of attention recenty. In the fied of Natura Language Processing, many successes have been reported. Exampes incude Part-of-Speech tagging (Nakagawa et a., 2002 Text Chunking (Kudo and Matsumoto, 2001, Named Entity Recognition (Isozaki and Kazawa, 2002, and Japanese Dependency Parsing (Kudo and Matsumoto, 2000; Kudo and Matsumoto, It is known in NLP that combination of features contributes to a significant improvement in accuracy. For instance, in the task of dependency parsing, it woud be hard to confirm a correct dependency reation with ony a singe set of features from either a head or its modifier. Rather, dependency reations shoud be determined by at east information from both of two phrases. In previous research, feature combination has been seected manuay, and the performance significanty depended on these seections. This is not the case with kerne-based methodoogy. For instance, if we use a poynomia kerne, a feature combinations are impicity expanded without oss of generaity and increasing the computationa costs. Athough the mapped feature space is quite arge, the maxima margin strategy (Vapnik, 1995 of SVMs gives us a good generaization performance compared to the previous manua feature seection. This is the main reason why kerne-based earning has deivered great resuts to the fied of NLP. Kerne-based text anaysis shows an exceent performance in terms in accuracy; however, its inefficiency in actua anaysis imits practica appication. For exampe, an SVM-based NE-chunker runs at a rate of ony 85 byte/sec, whie previous ruebased system can process severa kiobytes per second (Isozaki and Kazawa, Such sow execution time is inadequate for Information Retrieva, Question Answering, or Text Mining, where fast
2 anaysis of arge quantities of text is indispensabe. This paper presents two nove methods that make the kerne-based text anayzers substantiay faster. These methods are appicabe not ony to the NLP tasks but aso to genera machine earning tasks where training and test exampes are represented in a binary vector. More specificay, we focus on a Poynomia Kerne of degree d, which can attain feature combinations that are crucia to improving the performance of tasks in NLP. Second, we introduce two fast cassification agorithms for this kerne. One is PKI (Poynomia Kerne Inverted, which is an extension of Inverted Index in Information Retrieva. The other is PKE (Poynomia Kerne Expanded, where a feature combinations are expicity expanded. By appying PKE, we can convert a kerne-based cassifier into a simpe and fast iner cassifier. In order to buid PKE, we extend the PrefixSpan (Pei et a., 2001, an efficient Basket Mining agorithm, to enumerate effective feature combinations from a set of support exampes. Experiments on Engish BaseNP Chunking, Japanese Word Segmentation and Japanese Dependency Parsing show that PKI and PKE perform respectivey 2 to 13 times and 30 to 300 times faster than standard kerne-based systems, without a discernibe change in accuracy. 2 Kerne Method and Support Vector Machines Suppose we have a set of training data for a binary cassification probem: (x 1, y 1,..., (x L, y L x j R N, y j {+1, 1}, where x j is a feature vector of the j-th training sampe, and y j is the cass abe associated with this training sampe. The decision function of SVMs is defined by y(x = sgn y j α j φ(x j φ(x + b, (1 where: (A φ is a non-iner mapping function from R N to R H (N H. (B α j, b R, α j 0. The mapping function φ shoud be designed such that a training exampes are ineary separabe in R H space. Since H is much arger than N, it requires heavy computation to evauate the dot products φ(x i φ(x in an expicit form. This probem can be overcome by noticing that both construction of optima parameter α i (we wi omit the detais of this construction here and the cacuation of the decision function ony require the evauation of dot products φ(x i φ(x. This is critica, since, in some cases, the dot products can be evauated by a simpe Kerne Function: K(x 1, x 2 = φ(x 1 φ(x 2. Substituting kerne function into (1, we have the foowing decision function. y(x = sgn y j α j K(x j, x + b (2 One of the advantages of kernes is that they are not imited to vectoria object x, but that they are appicabe to any kind of object representation, just given the dot products. 3 Poynomia Kerne of degree d For many tasks in NLP, the training and test exampes are represented in binary vectors; or sets, since exampes in NLP are usuay represented in socaed Feature Structures. Here, we focus on such cases 1. Suppose a feature set F = {1, 2,..., N} and training exampes X j (j = 1, 2,..., L, a of which are subsets of F (i.e., X j F. In this case, X j can be regarded as a binary vector x j = (x j1, x j2,..., x jn where x ji = 1 if i X j, x ji = 0 otherwise. The dot product of x 1 and x 2 is given by x 1 x 2 = X 1 X 2. Definition 1 Poynomia Kerne of degree d Given sets X and Y, corresponding to binary feature vectors x and y, Poynomia Kerne of degree d K d (X, Y is given by K d (x, y = K d (X, Y = (1 + X Y d, (3 where d = 1, 2, 3,.... In this paper, (3 wi be referred to as an impicit form of the Poynomia Kerne. 1 In the Maximum Entropy mode widey appied in NLP, we usuay suppose binary feature functions f i (X j {0, 1}. This formaization is exacty same as representing an exampe X j in a set {k f k (X j = 1}.
3 It is known in NLP that a combination of features, a subset of feature set F in genera, contributes to overa accuracy. In previous research, feature combination has been seected manuay. The use of a poynomia kerne aows such feature expansion without oss of generaity or an increase in computationa costs, since the Poynomia Kerne of degree d impicity maps the origina feature space F into F d space. (i.e., φ : F F d. This property is critica and some reports say that, in NLP, the poynomia kerne outperforms the simpe inear kerne (Kudo and Matsumoto, 2000; Isozaki and Kazawa, Here, we wi give an expicit form of the Poynomia Kerne to show the mapping function φ(. Lemma 1 Expicit form of Poynomia Kerne. The Poynomia Kerne of degree d can be rewritten as K d (X, Y = c d (r P r (X Y, (4 r=0 where P r (X is a set of a subsets of X with exacty r eements in it, c d (r = d ( d rm=0 =r ( 1 r m m ( r m. Proof See Appendix A. c d (r wi be referred as a subset weight of the Poynomia Kerne of degree d. This function gives a prior weight to the subset s, where s = r. Exampe 1 Quadratic and Cubic Kerne Given sets X = {a, b, c, d} and Y = {a, b, d, e}, the Quadratic Kerne K 2 (X, Y and the Cubic Kerne K 3 (X, Y can be cacuated in an impicit form as: K 2 (X, Y = (1 + X Y 2 = ( = 16, K 3 (X, Y = (1 + X Y 3 = ( = 64. Using Lemma 1, the subset weights of the Quadratic Kerne and the Cubic Kerne can be cacuated as c 2 (0 = 1, c 2 (1 = 3, c 2 (2 = 2 and c 3 (0=1, c 3 (1=7, c 3 (2=12, c 3 (3=6. In addition, subsets P r (X Y (r = 0, 1, 2, 3 are given as foows: P 0 (X Y = {φ}, P 1 (X Y = {{a}, {b}, {d}}, P 2 (X Y = {{a, b}, {a, d}, {b, d}}, P 3 (X Y = {{a, b, d}}. K 2 (X, Y and K 3 (X, Y can simiary be cacuated in an expicit form as: function PKI cassify (X r = 0 # an array, initiaized as 0 foreach i X foreach j h(i r j = r j + 1 end end resut = 0 foreach j SV resut = resut + y j α j (1 + r j d end return sgn(resut + b end Figure 1: Pseudo code for PKI K 2 (X, Y = = 16, K 3 (X, Y = = Fast Cassifiers for Poynomia Kerne In this section, we introduce two fast cassification agorithms for the Poynomia Kerne of degree d. Before describing them, we give the baseine cassifier (PKB: y(x = sgn y j α j (1 + X j X d + b. (5 The compexity of PKB is O( X SV, since it takes O( X to cacuate (1 + X j X d and there are a tota of SV support exampes. 4.1 PKI (Inverted Representation Given an item i F, if we know in advance the set of support exampes which contain item i F, we do not need to cacuate X j X for a support exampes. This is a naive extension of Inverted Indexing in Information Retrieva. Figure 1 shows the pseudo code of the agorithm PKI. The function h(i is a pre-compied tabe and returns a set of support exampes which contain item i. The compexity of the PKI is O( X B + SV, where B is an average of h(i over a item i F. The PKI can make the cassification speed drasticay faster when B is sma, in other words, when feature space is reativey sparse (i.e., B SV. The feature space is often sparse in many tasks in NLP, since exica entries are used as features. The agorithm PKI does not change the fina accuracy of the cassification.
4 4.2 PKE (Expanded Representation Basic Idea of PKE Using Lemma 1, we can represent the decision function (5 in an expicit form: y(x = sgn y j α j ( d r=0 If we, in advance, cacuate w(s = c d (r P r (X j X + b. (6 y j α j c d ( s I(s P s (X j (where I(t is an indicator function 2 for a subsets s d r=0 P r (F, (6 can be written as the foowing simpe inear form: y(x = sgn s Γ d (X w(s + b. (7 where Γ d (X = d r=0 P r (X. The cassification agorithm given by (7 wi be referred to as PKE. The compexity of PKE is O( Γ d (X = O( X d, independent on the number of support exampes SV Mining Approach to PKE To appy the PKE, we first cacuate Γ d (F degree of vectors w = (w(s 1, w(s 2,..., w(s Γd (F. This cacuation is trivia ony when we use a Quadratic Kerne, since we just project the origina feature space F into F F space, which is sma enough to be cacuated by a naive exhaustive method. However, if we, for instance, use a poynomia kerne of degree 3 or higher, this cacuation becomes not trivia, since the size of feature space exponentiay increases. Here we take the foowing strategy: 1. Instead of using the origina vector w, we use w, an approximation of w. 2. We appy the Subset Mining agorithm to cacuate w efficienty. 2 I(t returns 1 if t is true,returns 0 otherwise. Definition 2 w : An approximation of w An approximation of w is given by w = (w (s 1, w (s 2,..., w (s Γd (F, where w (s is set to 0 if w(s is triviay cose to 0. (i.e., σ neg < w(s < σ pos (σ neg < 0, σ pos > 0, where σ pos and σ neg are predefined threshods. The agorithm PKE is an approximation of the PKB, and changes the fina accuracy according to the seection of threshods σ pos and σ neg. The cacuation of w is formuated as the foowing mining probem: Definition 3 Feature Combination Mining Given a set of support exampes and subset weight c d (r, extract a subsets s and their weights w(s if w(s hods w(s σ pos or w(s σ neg. In this paper, we appy a Sub-Structure Mining agorithm to the feature combination mining probem. Generay speaking, sub-structures mining agorithms efficienty extract frequent sub-structures (e.g., subsets, sub-sequences, sub-trees, or subgraphs from a arge database (set of transactions. In this context, frequent means that there are no ess than ξ transactions which contain a sub-structure. The parameter ξ is usuay referred to as the Minimum Support. Since we must enumerate a subsets of F, we can appy subset mining agorithm, in some times caed as Basket Mining agorithm, to our task. There are many subset mining agorithms proposed, however, we wi focus on the PrefixSpan agorithm, which is an efficient agorithm for sequentia pattern mining, originay proposed by (Pei et a., The PrefixSpan was originay designed to extract frequent sub-sequence (not subset patterns, however, it is a trivia difference since a set can be seen as a specia case of sequences (i.e., by sorting items in a set by exicographic order, the set becomes a sequence. The basic idea of the PrefixSpan is to divide the database by frequent sub-patterns (prefix and to grow the prefix-spanning pattern in a depth-first search fashion. We now modify the PrefixSpan to suit to our feature combination mining. size constraint We ony enumerate up to subsets of size d. when we pan to appy the Poynomia Kerne of degree d.
5 1 Subset weight c d (r In the origina PrefixSpan, the frequency of each subset does not change by its size. However, in our mining task, it changes (i.e., the frequency of subset s is weighted by c d ( s. Here, we process the mining agorithm by assuming that each transaction (support exampe X j has its frequency C d y j α j, where C d = max(c d (1, c d (2,..., c d (d. The weight w(s is cacuated by w(s = ω(s c d ( s /C d, where ω(s is a frequency of s, given by the origina PrefixSpan. Positive/Negative support exampes We first divide the support exampes into positive (y i > 0 and negative (y i < 0 exampes, and process mining independenty. The resut can be obtained by merging these two resuts. Minimum Supports σ pos, σ neg In the origina PrefixSpan, minimum support is an integer. In our mining task, we can give a rea number to minimum support, since each transaction (support exampe X j has possiby non-integer frequency C d y j α j. Minimum supports σ pos and σ neg contro the rate of approximation. For the sake of convenience, we just give one parameter σ, and cacuate σ pos and σ neg as foows ( #of positive exampes σ pos = σ, σ neg = σ #of support exampes ( #of negative exampes #of support exampes After the process of mining, a set of tupes Ω = { s, w(s } is obtained, where s is a frequent subset and w(s is its weight. We use a TRIE to efficienty store the set Ω. The exampe of such TRIE compression is shown in Figure 2. Athough there are many impementations for TRIE, we use a Doube-Array (Aoe, 1989 in our task. The actua cassification of PKE can be examined by traversing the TRIE for a subsets s Γ d (X. 5 Experiments To demonstrate performances of PKI and PKE, we examined three NLP tasks: Engish BaseNP Chunking (EBC, Japanese Word Segmentation (JWS and. s!#"$"&% '(#* '+,'-+. '-+. '0 Figure 2: Ω in TRIE representation Japanese Dependency Parsing (JDP. A more detaied description of each task, training and test data, the system parameters, and feature sets are presented in the foowing subsections. Tabe 1 summarizes the detai information of support exampes (e.g., size of SVs, size of feature set etc.. Our preiminary experiments show that a Quadratic Kerne performs the best in EBC, and a Cubic Kerne performs the best in JWS and JDP. The experiments using a Cubic Kerne are suitabe to evauate the effectiveness of the basket mining approach appied in the PKE, since a Cubic Kerne projects the origina feature space F into F 3 space, which is too arge to be handed ony using a naive exhaustive method. A experiments were conducted under Linux using XEON 2.4 Ghz dua processors and 3.5 Gbyte of main memory. A systems are impemented in C Engish BaseNP Chunking (EBC Text Chunking is a fundamenta task in NLP dividing sentences into non-overapping phrases. BaseNP chunking deas with a part of this task and recognizes the chunks that form noun phrases. Here is an exampe sentence: [He] reckons [the current account deficit] wi narrow to [ony $ 1.8 biion]. A BaseNP chunk is represented as sequence of words between square brackets. BaseNP chunking task is usuay formuated as a simpe tagging task, where we represent chunks with three types of tags: B: beginning of a chunk. I: non-initia word. O: outside of the chunk. In our experiments, we used the same settings as (Kudo and Matsumoto, We use a standard data set (Ramshaw and Marcus, 1995 consisting of sections of the WSJ corpus as training and section 20 as testing.. '-+. +-/. '-(#*
6 5.2 Japanese Word Segmentation (JWS Since there are no expicit spaces between words in Japanese sentences, we must first identify the word boundaries before anayzing deep structure of a sentence. Japanese word segmentation is formaized as a simpe cassification task. Let s = c 1 c 2 c m be a sequence of Japanese characters, t = t 1 t 2 t m be a sequence of Japanese character types 3 associated with each character, and y i {+1, 1}, (i = (1, 2,..., m 1 be a boundary marker. If there is a boundary between c i and c i+1, y i = 1, otherwise y i = 1. The feature set of exampe x i is given by a characters as we as character types in some constant window (e.g., 5: {c i 2, c i 1,, c i+2, c i+3, t i 2, t i 1,, t i+2, t i+3 }. Note that we distinguish the reative position of each character and character type. We use the Kyoto University Corpus (Kurohashi and Nagao, 1997, 7,958 sentences in the artices on January 1st to January 7th are used as training data, and 1,246 sentences in the artices on January 9th are used as the test data. 5.3 Japanese Dependency Parsing (JDP The task of Japanese dependency parsing is to identify a correct dependency of each Bunsetsu (base phrase in Japanese. In previous research, we presented a state-of-the-art SVMs-based Japanese dependency parser (Kudo and Matsumoto, We combined SVMs into an efficient parsing agorithm, Cascaded Chunking Mode, which parses a sentence deterministicay ony by deciding whether the current chunk modifies the chunk on its immediate right hand side. The input for this agorithm consists of a set of the inguistic features reated to the head and modifier (e.g., word, part-of-speech, and infections, and the output from the agorithm is either of the vaue +1 (dependent or -1 (independent. We use a standard data set, which is the same corpus described in the Japanese Word Segmentation. 3 Usuay, in Japanese, word boundaries are highy constrained by character types, such as hiragana and katakana (both are phonetic characters in Japanese, Chinese characters, Engish aphabets and numbers. 5.4 Resuts Tabes 2, 3 and 4 show the execution time, accuracy 4, and Ω (size of extracted subsets, by changing σ from 0.01 to The PKI eads to about 2 to 12 times improvements over the PKB. In JDP, the improvement is significant. This is because B, the average of h(i over a items i F, is reativey sma in JDP. The improvement significanty depends on the sparsity of the given support exampes. The improvements of the PKE are more significant than the PKI. The running time of the PKE is 30 to 300 times faster than the PKB, when we set an appropriate σ, (e.g., σ = for EBC and JWS, σ = for JDP. In these settings, we coud preserve the fina accuracies for test data. 5.5 Frequency-based Pruning The PKE with a Cubic Kerne tends to make Ω arge (e.g., Ω = 2.32 miion for JWS, Ω = 8.26 miion for JDP. To reduce the size of Ω, we examined simpe frequency-based pruning experiments. Our extension is to simpy give a prior threshod ξ(= 1, 2, 3, 4..., and erase a subsets which occur in ess than ξ support exampes. The cacuation of frequency can be simiary conducted by the PrefixSpan agorithm. Tabes 5 and 6 show the resuts of frequency-based pruning, when we fix σ=0.005 for JWS, and σ= for JDP. In JDP, we can make the size of set Ω about one third of the origina size. This reduction gives us not ony a sight speed increase but an improvement of accuracy (89.29% 89.34%. Frequency-based pruning aows us to remove subsets that have arge weight and sma frequency. Such subsets may be generated from errors or specia outiers in the training exampes, which sometimes cause an overfitting in training. In JWS, the frequency-based pruning does not work we. Athough we can reduce the size of Ω by haf, the accuracy is aso reduced (97.94% 97.83%. It impies that, in JWS, features even with frequency of one contribute to the fina decision hyperpane. 4 In EBC, accuracy is evauated using F measure, harmonic mean between precision and reca.
7 Tabe 1: Detais of Data Set Data Set EBC JWS JDP # of exampes 135, , ,355 SV # of SVs 11,690 57,672 34,996 # of positive SVs 5,637 28,440 17,528 # of negative SVs 6,053 29,232 17,468 F (size of feature 17,470 11,643 28,157 Avg. of X j B (Avg. of h(i (Note: In EBC, to hande K-cass probems, we use a pairwise cassification; buiding K (K 1/2 cassifiers considering a pairs of casses, and fina cass decision was given by majority voting. The vaues in this coumn are averages over a pairwise cassifiers. 6 Discussion There have been severa studies for efficient cassification of SVMs. Isozaki et a. propose an XQK (expand the Quadratic Kerne which can make their Named-Entity recognizer drasticay fast (Isozaki and Kazawa, XQK can be subsumed into PKE. Both XQK and PKE share the basic idea; a feature combinations are expicity expanded and we convert the kerne-based cassifier into a simpe inear cassifier. The expicit difference between XQK and PKE is that XQK is designed ony for Quadratic Kerne. It impies that XQK can ony dea with feature combination of size up to two. On the other hand, PKE is more genera and can aso be appied not ony to the Quadratic Kerne but aso to the genera-stye of poynomia kernes (1 + X Y d. In PKE, there are no theoretica constrains to imit the size of combinations. In addition, Isozaki et a. did not mention how to expand the feature combinations. They seem to use a naive exhaustive method to expand them, which is not aways scaabe and efficient for extracting three or more feature combinations. PKE takes a basket mining approach to enumerating effective feature combinations more efficienty than their exhaustive method. 7 Concusion and Future Works We focused on a Poynomia Kerne of degree d, which has been widey appied in many tasks in NLP Tabe 2: Resuts of EBC PKE Time Speedup F1 Ω σ (sec./sent. Ratio ( PKI PKB Tabe 3: Resuts of JWS PKE Time Speedup Acc.(% Ω σ (sec./sent. Ratio ( , , , ,820 PKI PKB Tabe 4: Resuts of JDP PKE Time Speedup Acc.(% Ω σ (sec./sent. Ratio ( , , ,262 PKI PKB Tabe 5: Frequency-based pruning (JWS PKE time Speedup Acc.(% Ω ξ (sec./sent. Ratio ( , PKB Tabe 6: Frequency-based pruning (JDP PKE time Speedup Acc.(% Ω ξ (sec./sent. Ratio ( , , ,360 PKB
8 and can attain feature combination that is crucia to improving the performance of tasks in NLP. Then, we introduced two fast cassification agorithms for this kerne. One is PKI (Poynomia Kerne Inverted, which is an extension of Inverted Index. The other is PKE (Poynomia Kerne Expanded, where a feature combinations are expicity expanded. The concept in PKE can aso be appicabe to kernes for discrete data structures, such as String Kerne (Lodhi et a., 2002 and Tree Kerne (Kashima and Koyanagi, 2002; Coins and Duffy, For instance, Tree Kerne gives a dot product of an ordered-tree, and maps the origina ordered-tree onto its a sub-tree space. To appy the PKE, we must efficienty enumerate the effective sub-trees from a set of support exampes. We can simiary appy a sub-tree mining agorithm (Zaki, 2002 to this probem. Appendix A.: Lemma 1 and its proof c d (r = ( ( d r ( r ( 1 r m m. m =r m=0 Proof. Let X, Y be subsets of F = {1, 2,..., N}. In this case, X Y is same as the dot product of vector x, y, where x = {x 1, x 2,..., x N }, y = {y 1, y 2,..., y N } (x j, y j {0, 1} x j = 1 if j X, x j = 0 otherwise. (1 + X Y d = (1 + x y d can be expanded as foows where τ( = (1 + x y d = k k N = k n 0 = ( ( d N x j y j =0 =0 j=1 ( d τ(! k 1!... k N! (x1y1k 1... (x N y N k N. Note that x k j j is binary (i.e., x k j j {0, 1}, the number of r-size subsets can be given by a coefficient of (x 1 y 1 x 2 y 2... x r y r. Thus, c d (r = =r ( ( k k d r=! k 1!... k r! k n 1,n=1,2,...,r = = =r =r References ( ( d r m=0 ( r (r ( r (r ( ( d r ( ( 1 r m m r. m Junichi Aoe An efficient digita search agorithm by using a doube-array structure. IEEE Transactions on Software Engineering, 15(9. Michae Coins and Nige Duffy Convoution kernes for natura anguage. In Advances in Neura Information Processing Systems 14, Vo.1 (NIPS 2001, pages Hideki Isozaki and Hideto Kazawa Efficient support vector cassifiers for named entity recognition. In Proceedings of the COLING-2002, pages Hisashi Kashima and Teruo Koyanagi Svm kernes for semi-structured data. In Proceedings of the ICML-2002, pages Taku Kudo and Yuji Matsumoto Japanese Dependency Structure Anaysis based on Support Vector Machines. In Proceedings of the EMNLP/VLC-2000, pages Taku Kudo and Yuji Matsumoto Chunking with support vector machines. In Proceedings of the the NAACL, pages Taku Kudo and Yuji Matsumoto Japanese dependency anayisis using cascaded chunking. In Proceedings of the CoNLL-2002, pages Sadao Kurohashi and Makoto Nagao Kyoto University text corpus project. In Proceedings of the ANLP-1997, pages Huma Lodhi, Craig Saunders, John Shawe-Tayor, Neo Cristianini, and Chris Watkins Text cassification using string kernes. Journa of Machine Learning Research, 2. Tetsuji Nakagawa, Taku Kudo, and Yuji Matsumoto Revision earning and its appication to part-of-speech tagging. In Proceedings of the ACL 2002, pages Jian Pei, Jiawei Han, and et a Prefixspan: Mining sequentia patterns by prefix-projected growth. In Proc. of Internationa Conference of Data Engineering, pages Lance A. Ramshaw and Mitche P. Marcus Text chunking using transformation-based earning. In Proceedings of the VLC, pages Vadimir N. Vapnik The Nature of Statistica Learning Theory. Springer. Mohammed Zaki Efficienty mining frequent trees in a forest. In Proceedings of the 8th Internationa Conference on Knowedge Discovery and Data Mining KDD, pages
Language Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationA Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition
Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationGPU Implementation of Parallel SVM as Applied to Intrusion Detection System
GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationJOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM
JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationMassively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.
assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationBinarized support vector machines
Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationLayer-Specific Adaptive Learning Rates for Deep Networks
Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationExtracting semistructured data from the Web: An XQuery Based Approach
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,
More informationComparative Analysis of Relevance for SVM-Based Interactive Document Retrieval
Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationOF SCIENTIFIC DATABASES
CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose
More informationFACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn
FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,
More informationIndexed Block Coordinate Descent for Large-Scale Linear Classification with Limited Memory
Indexed Bock Coordinate Descent for Large-Scae Linear Cassification with Limited Memory Ian E.H. Yen Chun-Fu Chang Nationa Taiwan University Nationa Taiwan University r0092207@csie.ntu.edu.tw r99725033@ntu.edu.tw
More informationCrossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters
Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:
More informationImprovement of Nearest-Neighbor Classifiers via Support Vector Machines
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationModification of Support Vector Machine for Microarray Data Analysis
Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationInterpreting Individual Classifications of Hierarchical Networks
Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationA HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM
Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION
More informationLearning to Learn Second-Order Back-Propagation for CNNs Using LSTMs
Learning to Learn Second-Order Bac-Propagation for CNNs Using LSTMs Anirban Roy SRI Internationa Meno Par, USA anirban.roy@sri.com Sinisa Todorovic Oregon State University Corvais, USA sinisa@eecs.oregonstate.edu
More informationSemi-Supervised Learning with Sparse Distributed Representations
Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut
More informationPriority Queueing for Packets with Two Characteristics
1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.
More informationPrivacy Preserving Subgraph Matching on Large Graphs in Cloud
Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu
More informationCollinearity and Coplanarity Constraints for Structure from Motion
Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department
More informationA Column Generation Approach for Support Vector Machines
A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes
More informationRelative Positioning from Model Indexing
Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine
More informationAUTOMATIC gender classification based on facial images
SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationA Novel Method for Early Software Quality Prediction Based on Support Vector Machine
A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China
More informationSolutions to the Final Exam
CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a
More informationService Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network
Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,
More informationMULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY
MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven
More informationInterpreting Individual Classifications of Hierarchical Networks
Portand State University PDXSchoar Computer Science Facuty Pubications and Presentations Computer Science 2013 Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker Portand State University,
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationA Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals
A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation
More informationA probabilistic fuzzy method for emitter identification based on genetic algorithm
A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationHandling Outliers in Non-Blind Image Deconvolution
Handing Outiers in Non-Bind Image Deconvoution Sunghyun Cho 1 Jue Wang 2 Seungyong Lee 1,2 sodomau@postech.ac.kr juewang@adobe.com eesy@postech.ac.kr 1 POSTECH 2 Adobe Systems Abstract Non-bind deconvoution
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationTransformation Invariance in Pattern Recognition: Tangent Distance and Propagation
Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationSequential Approximate Multiobjective Optimization using Computational Intelligence
The Ninth Internationa Symposium on Operations Research and Its Appications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 1 12 Sequentia Approximate Mutiobjective
More informationModel-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection
Mode-driven Coaboration and Information Integration for Enhancing Video Semantic Concept Detection Tao Meng, Mei-Ling Shyu Department of Eectrica and Computer Engineering University of Miami Cora Gabes,
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationDigital Image Watermarking Algorithm Based on Fast Curvelet Transform
J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationQuaternion Support Vector Classifier
Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx
More informationThe Classification of Stored Grain Pests based on Convolutional Neural Network
2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo
More informationDynamic Symbolic Execution of Distributed Concurrent Objects
Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United
More informationSparse Representation based Face Recognition with Limited Labeled Samples
Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations
More informationResearch on UAV Fixed Area Inspection based on Image Reconstruction
Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,
More informationFREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES
FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent
More informationIEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE
This artice has been accepted for incusion in a future issue of this journa. Content is fina as presented, with the exception of pagination. IEEE TRANSACTIONS ON CYBERNETICS 1 Therma Augmented Expression
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationOn Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models
On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit
More informationArithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University
Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationA Discriminative Global Training Algorithm for Statistical MT
Discriminative Goba Training gorithm for Statistica MT Christoph Timann IBM T.J. Watson Research Center Yorktown Heights, N.Y. 10598 cti@us.ibm.com Tong Zhang Yahoo! Research New York Cit, N.Y. 10011 tzhang@ahoo-inc.com
More informationLarge-Scale Modeling of Parametric Surfaces using Spherical Harmonics
Large-Scae Modeing of Parametric Surfaces using Spherica Harmonics Li Shen Dept of Computer and Info Science University of Massachusetts Dartmouth N Dartmouth, MA 2747 shen@umassdedu Moo K Chung Department
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More information1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation
1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation
More informationAutomatic Program Inversion using Symbolic Transducers
Automatic Program Inversion using Symboic Transducers Qinheping Hu University of Wisconsin-Madison qhu8@wisc.edu Loris D Antoni University of Wisconsin-Madison oris@cs.wisc.edu Abstract We propose a fuy-automated
More informationPHASE retrieval has been an active research topic for decades [1], [2]. The underlying goal is to estimate an unknown
DOLPHIn Dictionary Learning for Phase Retrieva Andreas M. Timann, Yonina C. Edar, Feow, IEEE, and Juien Maira, Member, IEEE arxiv:60.063v [math.oc] 3 Aug 06 Abstract We propose a new agorithm to earn a
More information