Research of Classification based on Deep Neural Network
|
|
- Michael Hicks
- 5 years ago
- Views:
Transcription
1 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi an Technoogica University Xi an, , China e-mai: Yu Fan a, Wei Yanxi b Schoo of Computer Science and Engineering Xi an Technoogica University Xi an, , China e-mai: a @qq.com b @qq.com Abstract The effective distinction between norma emai and spam, so as to maximize the possibe of fitering spam has become a research hotspot currenty. Naive bayes agorithm is a kind of frequenty-used emai cassification and it is a statistica-based cassification agorithm. It assumes that the attributes are independent of each other when given the target vaue. This hypothesis is apparenty impossibe in the emai cassification, so the accuracy of emai cassification based on naive bayes agorithm is ow. In ausion to the probem of poor accuracy of emai cassification based on naive bayes agorithm, schoars have proposed some new emai cassification agorithms. The emai cassification agorithm based on deep neura network is one kind of them. The deep neura network is an artificia neura network with fu connection between ayer and ayer. The agorithm extracted the emai feature from the training emai sampes and constructed a DNN with mutipe hidden ayers, the DNN cassifier was generated by training sampes, and finay the testing emais were cassified, and they were marked whether they were spam or not. In order to verify the effect of the emai cassification agorithm based on DNN, in this paper we constructed a DNN with 2 hidden ayers. The number of nodes in each hidden ayer was 30. When the training set was trained, we set up 2000 batches, and each batch has 3 trained data. We used the famous Spam Base dataset as the data set. The experiment resut showed that DNN was higher than naive Bayes in the accuracy of emai cassification when the proportion of the training set was 10%, 20%, 30%, 40% and 50% respectivey, and DNN showed a good cassification effect. With the deveopment of science and technoogy, spam manifests in many forms and the damage of it is more serious, this puts forward higher requirements for the accuracy of spam recognition. The focus of next research wi be combining various agorithms to further improve the effect of emai cassification. Keywords-Deep Neura Networks; Spam Emai; Cassification; Naive Bayes; SpamBase Data Set I. INTRODUCTION Emai has become a major way of communication for peope at present, but the probem of spam comes behind. The harm of spam is mainy manifested as the foowing aspects: occupying bandwidth, eading to the congestion of the emai server and reducing the efficiency of the network; consuming the time of the user and affecting the work efficiency. Therefore, the effective distinction between norma emai and spam, so as to maximize the possibe of fitering spam has become a research hotspot currenty. Naive bayes agorithm is a kind of frequenty-used emai cassification and it is a statistica-based cassification agorithm[1-3], which has the characteristics of simpe reaization and fast cassification. However, it assumes that the attributes are independent of each other when given the target vaue[4].this hypothesis is apparenty impossibe in the emai cassification, so the accuracy of emai cassification based on naive bayes agorithm is ow. In ausion to the probem of poor accuracy of emai cassification based on naive bayes agorithm, schoars have proposed some new emai cassification agorithms. The 17
2 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) emai cassification agorithm based on deep neura network (DNN) is one kind of them. ayer, a is the activation vaue of the ayer, z is the II. THEORETICAL BASIS The basic concept of artificia neura network is based on the hypothesis and mode construction of how the human brain responds to compex probems[4-6]. The deep neura network is an artificia neura network with fu connection between ayer and ayer, and its structure is shown in figure 1.The fu connection between ayer and ayer means that any neuron in the neurons in the ayer must be connected to any of the ayer.athough the deep neura network ooks compex, it is sti the same as the perceptron from a sma oca mode. Input ayer ayer1 ayer2 ayern Output ayer weighted input of a neurons in the w ayer, Then the weight coefficient of row j, coumn k. The reationship between the activation vaue of the activation vaue of the foowing matrix reationship: jk is ayer and the ayer can be expressed by the Here respresents the non-inear activation function of the nodes on the hidden ayers, and the traditiona DNN uses sigmoid function usuay, as shown in expression (3).Because the sigmoid function has properties such as monotone increasing and its inverse function has the property of monotone increasing, it is often used as a threshod function of neura networks, It maps the variabes between 0 and 1.The sigmoid function curve is shown in figure 2: Figure 1. Structure diagram of deep neura network We use w jk to respresent the weight coefficient between the neuron in the ayer and the neuron in the ayer, b j to represent the bias of the neuron in the ayer, to represent the activation vaue of the neuron in the ayer. We can get the foowing reationship between the activation vaue of the neuron in the ayerand the activation vaue of a neuron sin the ayer: Figure 2. The sigmoid function curve III. ALGORITHM DESCRIPTION Impementation process of mai cassification agorithm based on deep neura network was shown in Figure 3. We assume that w is the weight coefficient matrix of a the neurons in the ayer, b is the bias matrix of the 18
3 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Begin Read the contents of the emai for training and extract the emai features for training Construct a DNN containing mutipe hidden ayers, set the number of hidden ayers,set the number of nodes on each ayer, set training batches and the number of training data for each batch Train DNN to generate DNN cassifier Read the contents of the emai for testing and extract the emai features for testing Use the DNN cassifier to cassify the testing emai and mark whether they are spam Compare the cassification resut of the emai with the actua tag, verify the correctness of the agorithm Figure 3. End Agorithm execution process Step 1: Read the contents of the emai for training from the Spam Base dataset and extract the emai features for training such as word_freq_, char_freq_, capita_run_ength_average, capita_run_ength_tota, and so on. capita_run_ength_ongest, Step 2: Construct a DNN containing mutipe hidden ayers, set the number of hidden ayers(n_casses),set the number of nodes on each ayer (hidden_units),set training batches( steps) and the number of training data for each batch (batch_size). Step 3: Train DNN to generate DNN cassifier. Step 4: Read the contents of the emai for testing from the SpamBase data set and extract the emai features for testing such as word_freq_, char_freq_, capita_run_ength_average, capita_run_ength_ongest, capita_run_ength_tota, and so on. Step 5: Use the DNN cassifier to cassify the testing emai and mark whether they are spam(1 or 0). Step 6: Compare the cassification resut of the emai (y_predict) with the actua tag(y_test), cacuate the accuracy of the agorithm in the emai cassification(accuracy_score) and verify the correctness of the agorithm. IV. EXPERIMENTAL RESULTS AND ANALYSIS In order to verify the effect of the emai cassification agorithm based on DNN, in this paper we constructeda DNN with 2 hidden ayers. The number of nodes in each hidden ayer was 30. When the training set was trained, we set up 2000 batches, and each batch has 3 trained data. We used the famous SpamBase dataset as the data set, which was from the UCI machine earning ibrary at the University of Caifornia, USA. The specific situation is shown in tabe I. We compared the two kinds of emai fitering agorithms of DNN and naive Bayes with accuracy, which is the main evauation standard of emai fitering technoogy. The accuracy is defined as foows: Number of correcty identified emai Accuracy Tota number of emais We did five groups of experiments in this paper.the seection case of training set and testing set in each experiment is shown in tabe II. 19
4 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) TABLE I. SPAMBASE DATA SET Index Vaue Index Vaue Tota number of the emai 4601 Number of attributes 57 Number of emai category abes 2 Emai category Vaidemai,spam emai Number of the spam emai 1813 The proportion of spam emai 39.4% Number of the vaid mai 2788 The proportion of vaidemai 60.6% TABLE II. THE SELECTION CASE OF TRAINING SET AND TESTING SET group number The proportion of the training set in a data The number of emai in training set The proportion of the testing set in a data The number of emai in testing set 1 90% % % % % % % % % % 2301 The experimenta resuts were shown in Figure 4. V. CONCLUSION Figure 4. The comparison of accuracy of the two agorithms The appication of emai cassification agorithm based on deep neura network is studied in this paper. The agorithm constructed mutipe hidden ayers and generated DNN cassifiers through training. The experiment resuts showed that the accuracy of the agorithm is obviousy higher than the naive Bayes agorithm. With the deveopment of science and technoogy, spam manifests in many forms and the damage of it is more serious, this puts forward higher requirements for the accuracy of spam recognition. The focus of next research wi becombining various agorithms to further improve the effect of emai cassification. The experiment resut showed that DNN was higher than naive Bayes in the accuracy of emai cassification when the proportion of the training set was 10%, 20%, 30%, 40% and 50% respectivey, and DNN showed a good cassification effect. ACKNOWLEDGMENTS New network and detection contro nationa joint engineering aboratory fund program (GSYSJ ). Xi an Technoogica University Principa Scientific Research Fund Project: XAGDXJJ
5 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) REFERENCE [1] Cao Cuiing, Wang Yuanyuan and Yuan Ye, Research of a spam fiter based on improved naive Bayes agorithm, Chinese Journa of Network and Information Security, Vo.3No.3, pp , March [2] Wang Zhiyong and Liu Hongmei, DESIGN AND IMPLEMENTATION OF BAYESIAN SPAM FILTE R ING SYSTEM, Journa of Inner Mongoia Agricutura University(Natura Science Edition), Vo.38 No.3, pp.82-86, May [3] Wang QingSong and Wei Ruyu, Bayesian Chinese Spam Fitering Method Based on Phrases, Computer Science, Vo. 43 No. 4, pp , Apr [4] Neura Networks and Deep Learning [EB/OL]. [5] Li Kun, CHai Yumei and Zhao Honging, Estimation of Feta Weight Based on Deep Neura Network, Computer Science, Vo. 43 No. 11A, pp , Nov [6] Cao Meng, Li Hongyan and Zhao Rongrong, A Pitch Detection Method Based on Deep NeuraNetwork, Microeectronics & Computer, Vo1.33 No.6, pp , June [7] Ren Rongrong, Zhou Mingquan and Geng Guohua, The muti-scae features extraction method based on deep neura network, Journa of Northwest University(Natura Science Edition), Vo. 47No.2, pp , Apr2017. [8] S.L.Zhang Research on Deep Neura Networks based Modes for Speech Recognition(Ph.D., University of Science and Technoogy of China, China 2017), p.35 21
Nearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationDigital Image Watermarking Algorithm Based on Fast Curvelet Transform
J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationThe Classification of Stored Grain Pests based on Convolutional Neural Network
2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationA Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals
A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationGPU Implementation of Parallel SVM as Applied to Intrusion Detection System
GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationA HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM
Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION
More informationFREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES
FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent
More informationClassification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems
Cassification of EEG Signa by STFT-CNN Framework: Identification of Right-/eft-hand Motor Imagination in BCI Systems 12 Brain Cognitive Computing Lab, Schoo of Information Engineering, Minzu University
More informationResearch on UAV Fixed Area Inspection based on Image Reconstruction
Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,
More informationIJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India
Internationa Journa of Advancements in Research & Technoogy, Voume, Issue 6, June-04 ISSN 78-7763 89 Pattern assification for andwritten Marathi haracters using Gradient Descent of Distributed error with
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationA probabilistic fuzzy method for emitter identification based on genetic algorithm
A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More informationContourlet Tranform Based Human Emotion Recognition System
Internationa Journa of Signa Processing Systems Vo. 2, No. 1 June 2014 Contouret Tranform Based Human Emotion Recognition System R. Suresh and S. Audithan Department of computer science and Engineering,
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationForgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.
Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and
More informationFACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn
FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationSubgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis
499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association
More informationModification of Support Vector Machine for Microarray Data Analysis
Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)
More informationResearch on the overall optimization method of well pattern in water drive reservoirs
J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang
More informationA VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION
6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long
More informationDiagnosing Breast Cancer with a Neural Network
Undergraduate Journa of Mathematica Modeing: One + Two Voume 7 017 Spring 017 Issue Artice 4 Diagnosing Breast Cancer with a Neura Network John Cuen University of South Forida Advisors: Arcadii Grinshpan,
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationComplex Human Activity Searching in a Video Employing Negative Space Analysis
Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798
More informationCrossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters
Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:
More informationGrating cell operator features for oriented texture segmentation
Appeared in in: Proc. of the 14th Int. Conf. on Pattern Recognition, Brisbane, Austraia, August 16-20, 1998, pp.1010-1014. Grating ce operator features for oriented texture segmentation P. Kruizinga and
More informationApplication of Image Fusion Techniques on Medical Images
Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion
More informationAutomated Segmentation of Whole Cardiac CT Images based on Deep Learning
Vo. 9, No., 08 Automated Segmentation of Whoe Cardiac CT Images based on Deep Learning Rajpar Suhai Ahmed, Dr. Jie Liu* Schoo of Computer & Information Technoogy Beijing Jiaotong University, Beijing, China
More informationA Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition
Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationReference trajectory tracking for a multi-dof robot arm
Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationUtility-based Camera Assignment in a Video Network: A Game Theoretic Framework
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationAgent architectures. Francesco Amigoni
Francesco Amigoni Designing inteigent agents An agent is defined by its agent function f() that maps a sequence of perceptions to an action p(0), p(1),..., p(t) f() a(t) AGENT perceptions actions ENVIRONMENT
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationRelative Positioning from Model Indexing
Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine
More informationFuzzy Perceptual Watermarking For Ownership Verification
Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive
More informationM-BAND DUAL TREE COMPLEX WAVELET TRANSFORM
Internationa Journa of Advances in Engineering & Technoogy, Juy 22. M-BAND DUAL TREE COMPLEX WAVELET TRANSFORM FOR TEXTURE IMAGE INDEXING AND RETRIEVAL K. N. Prakash and K. Satya Prasad 2 Research Schoar,
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationQuality Assessment using Tone Mapping Algorithm
Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationNeural Networks. Aarti Singh. Machine Learning Nov 3, Slides Courtesy: Tom Mitchell
Neura Networks Aarti Singh Machine Learning 10-601 Nov 3, 2011 Sides Courtesy: Tom Mitche 1 Logis0c Regression Assumes the foowing func1ona form for P(Y X): Logis1c func1on appied to a inear func1on of
More informationNeural Networks. Aarti Singh & Barnabas Poczos. Machine Learning / Apr 24, Slides Courtesy: Tom Mitchell
Neura Networks Aarti Singh & Barnabas Poczos Machine Learning 10-701/15-781 Apr 24, 2014 Sides Courtesy: Tom Mitche 1 Logis0c Regression Assumes the foowing func1ona form for P(Y X): Logis1c func1on appied
More informationPneumo-Mechanical Simulation of a 2 Dof Planar Manipulator
Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT
More informationA VLSI Architecture of JPEG2000 Encoder
A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationMULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa
MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage
More informationMassively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.
assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN
More informationVehicle Detection in Satellite Images by Parallel Deep convolutional Neural Networks
2013 Second IAPR Asian Conference on Pattern Recognition Vehice Detection in Sateite Images by Parae Deep convoutiona Neura Networs Xueyun Chen, Shiming Xiang, Cheng-Lin Liu, and Chun-Hong Pan. Nationa
More informationA HIERARCHICAL OBJECT-ORIENTED APPROACH FOR EXTRACTING RESIDENTIAL AREAS FROM HIGH RESOLUTION IMAGERY
A HIERARCHICAL OBJECT-ORIENTED APPROACH FOR EXTRACTING RESIDENTIAL AREAS FROM HIGH RESOLUTION IMAGERY Juan Gu a, b, *, Jun Chen b and Qiming Zhou c a Facuty of Resource Science and Technoogy, Beijing Norma
More informationImprovement of Nearest-Neighbor Classifiers via Support Vector Machines
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department
More informationCLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING
CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:
More informationComparative Analysis of Relevance for SVM-Based Interactive Document Retrieval
Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra
More informationModel-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection
Mode-driven Coaboration and Information Integration for Enhancing Video Semantic Concept Detection Tao Meng, Mei-Ling Shyu Department of Eectrica and Computer Engineering University of Miami Cora Gabes,
More information(0,l) (0,0) (l,0) (l,l)
Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001
More informationJOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM
JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,
More informationCOMPRESSIVE sensing (CS), which aims at recovering
D-Net: Deep Learning pproach for Compressive Sensing RI Yan Yang, Jian Sun, Huibin Li, and Zongben u ariv:705.06869v [cs.cv] 9 ay 07 bstract Compressive sensing (CS) is an effective approach for fast agnetic
More informationDETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM
DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica
More informationDiscrete elastica model for shape design of grid shells
Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a
More informationTiming-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer
Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima
More informationA Column Generation Approach for Support Vector Machines
A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes
More informationFast Methods for Kernel-based Text Analysis
Proceedings of the 41st Annua Meeting of the Association for Computationa Linguistics, Juy 2003, pp. 24-31. Fast Methods for Kerne-based Text Anaysis Taku Kudo and Yuji Matsumoto Graduate Schoo of Information
More informationPath-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks
Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationBinarized support vector machines
Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationA Robust Method for Shape-based 3D Model Retrieval
A Robust Method for Shape-based 3D Mode Retrieva Yi Liu, Jiantao Pu, Guyu Xin, Hongbin Zha Weibin Liu 1, Yusue Uehara ationa Laboratory on Machine Perception Internet Appication Lab, Fujitsu R&D Center
More informationAUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationIEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE
This artice has been accepted for incusion in a future issue of this journa. Content is fina as presented, with the exception of pagination. IEEE TRANSACTIONS ON CYBERNETICS 1 Therma Augmented Expression
More informationQuaternion Support Vector Classifier
Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx
More informationFormulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations
Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE
More informationNestedNet: Learning Nested Sparse Structures in Deep Neural Networks
NestedNet: Learning Nested Sparse Structures in Deep Neura Networks Eunwoo Kim Chanho Ahn Songhwai Oh Department of ECE and ASRI, Seou Nationa University, South Korea {kewoo15, mychahn, songhwai}@snu.ac.kr
More informationConstellation Models for Recognition of Generic Objects
1 Consteation Modes for Recognition of Generic Objects Wei Zhang Schoo of Eectrica Engineering and Computer Science Oregon State University zhangwe@eecs.oregonstate.edu Abstract Recognition of generic
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationPAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks
2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating
More informationInterpreting Individual Classifications of Hierarchical Networks
Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More information