Search results for "HIDDEN"

showing 10 items of 210 documents

Spectral adaptation of hyperspectral flight lines using VHR contextual information

2014

Abstract: Due to technological constraints, hyperspectral earth observation imagery are often a mosaic of overlapping flight lines collected in different passes over the area of interest. This causes variations in aqcuisition conditions such that the reflected spectrum can vary significantly between these flight lines. Partly, this problem is solved by atmospherical correction, but residual spectral differences often remain. A probabilistic domain adaptation framework based on graph matching using Hidden Markov Random Fields was recently proposed for transforming hyperspectral data from one image to better correspond to the other. This paper investigates the use of scale and angle invariant…

VHR imageryHyperspectral imaginggraph matchingComputer sciencebusiness.industrydomain adaptationPhysicsHyperspectral imagingPattern recognitionFilter (signal processing)Rendering (computer graphics)Computer Science::Computer Vision and Pattern RecognitionFull spectral imagingtextural featuresComputer visionArtificial intelligenceHidden Markov random fieldHidden Markov modelbusiness
researchProduct

Joint Alignment and Modeling of Correlated Behavior Streams

2013

The Variable Time-Shift Hidden Markov Model (VTS- HMM) is proposed for learning and modeling pairs of cor- related streams. Unlike previous coupled models for time series, the VTS-HMM accounts for varying time shifts be- tween correlated events in pairs of streams having different properties. The VTS-HMM is learned on a set of pairs of unaligned streams and, thus, learning entails simultaneous estimation of the varying time shifts and of the parameters of the model. The formulation is demonstrated in the analysis of videos of dyadic social interactions between children and adults in the Multimodal Dyadic Behavior Dataset (MMDB). In dyadic social interactions, an agent starts an interaction …

Variable (computer science)Series (mathematics)Computer scienceMulti-agent systemSpeech recognitionDyadic interactionBehavior Modeling Autism Dyadic InteractionSTREAMSSet (psychology)Hidden Markov modelVisualization
researchProduct

Experimental studies on continuous speech recognition using neural architectures with “adaptive” hidden activation functions

2010

The choice of hidden non-linearity in a feed-forward multi-layer perceptron (MLP) architecture is crucial to obtain good generalization capability and better performance. Nonetheless, little attention has been paid to this aspect in the ASR field. In this work, we present some initial, yet promising, studies toward improving ASR performance by adopting hidden activation functions that can be automatically learned from the data and change shape during training. This adaptive capability is achieved through the use of orthonormal Hermite polynomials. The “adaptive” MLP is used in two neural architectures that generate phone posterior estimates, namely, a standalone configuration and a hierarch…

VocabularyArtificial neural networkbusiness.industryGeneralizationComputer sciencemedia_common.quotation_subjectSpeech recognitionPattern recognitionTIMITPerceptronField (computer science)Orthonormal basisArtificial intelligencebusinessHidden Markov modelmedia_common2010 IEEE International Conference on Acoustics, Speech and Signal Processing
researchProduct

Post-search query modeling in federated web scenario

2014

As opposed to query reformulation oriented towards changes made by a user to specify the information need more precisely, a post-search query modeling is a technique of exploiting syntax variation of gradually extended query which depending on some other factors like e.g. the resource, database or the key word alignment, facilitates the searching process. The study into modeling query submitted to some search engines that utilize different translation semantic paradigms is motivated by a real-world's challenges to retrieve heterogeneous textual documents from the web. For a couple of language pairs, we develop a user-centered framework for imposing the Hidden Web traffic optimization. In li…

Web search queryInformation retrievalComputer scienceQuery languageQuery optimizationRanking (information retrieval)Human-Computer InteractionQuery expansionWeb query classificationcomponentSearch StrategyHidden WebSargableQuery ModelingTrans-lingual Information RetrievalcomputerRDF query languagecomputer.programming_languageThe Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)
researchProduct

Analysis and modeling of wind directions time series

2013

This work aims at studying some aspects of wind directions in Italy and supplying appropriate models. A comparison is presented between independent mixture and Hidden Markov models, which seem to be appropriate as far as the series we studied.

Wind powerSeries (mathematics)business.industryComputer scienceVariable-order Markov modelWind directionMixture modelMarkov modelIndustrial engineeringdirectional data; wind direction time seriesVariable-order Bayesian networkSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Settore FIS/03 - Fisica Della Materiadirectional dataEconometricswind direction time seriesHidden Markov modelbusiness
researchProduct

Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks

2013

Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …

Wireless mesh networkHidden node problembusiness.industryComputer scienceWireless networkSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOrder One Network ProtocolShared meshKey distribution in wireless sensor networkswireless mesh networks synchronization pseudo-TDMA random accessbusinessComputer networkIEEE 802.11sWireless distribution system
researchProduct

Exploiting Semantic Trajectories Using HMMs and BIM for Worker Safety in Dynamic Environments

2020

International audience; Understanding dynamic behaviors of moving objects using positioning technologies for construction safety monitoring is still an open research issue. One task; that is a small subset in the widespread field of objects dynamics is the enrichment of the location data of users with the semantic information for studying their mobility patterns in the context of the environment. However, incorporating the semantics related to the environment gets complex in case of the dynamic construction sites where the site spaces are kept evolving with time. For instance, new walls and infrastructure supports are added often on sites, while others are detached. Similar situations open …

business.industryComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologySemanticsmobilityField (computer science)Task (project management)Semantic trajectoriesBuilding information modelingHuman–computer interactionBuilding Information Modeling (BIM)021105 building & construction0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]020201 artificial intelligence & image processingHealth and Safety (H&S)businessHidden Markov model2018 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

An adaptive probabilistic approach to goal-level imitation learning

2010

Imitation learning has been recognized as a promising technique to teach robots advanced skills. It is based on the idea that robots could learn new behaviors by observing and imitating the behaviors of other skilled actors. We propose an adaptive probabilistic graphical model which copes with three core issues of any imitative behavior: observation, representation and reproduction of skills. Our model, Growing Hierarchical Dynamic Bayesian Network (GHDBN), is hierarchical (i.e. able to characterize structured behaviors at different levels of abstraction), and growing (i.e. skills are learned or updated incrementally - and at each level of abstraction - every time a new observation sequence…

business.industryComputer scienceProbabilistic logicMachine learningcomputer.software_genreRobotArtificial intelligenceGraphical modelRobotics Imitation Learning Machine Learning Bayesian ModelsbusinessRepresentation (mathematics)Hidden Markov modelcomputerDynamic Bayesian networkHumanoid robotAbstraction (linguistics)2010 IEEE/RSJ International Conference on Intelligent Robots and Systems
researchProduct

An adaptive probabilistic graphical model for representing skills in PbD settings

2010

business.industryComputer scienceProgramming by demonstrationBayesian probabilityProbabilistic logicMachine learningcomputer.software_genreUnsupervised learningArtificial intelligenceGraphical modelMachine Learning Imitation Learning Incremental Learning Dynamic Bayesian Network Growing Hierarchical Dynamic Bayesian NetworkAutomatic programmingbusinessHidden Markov modelcomputerDynamic Bayesian network
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct