Search results for "HIDDEN"
showing 10 items of 210 documents
Spectral adaptation of hyperspectral flight lines using VHR contextual information
2014
Abstract: Due to technological constraints, hyperspectral earth observation imagery are often a mosaic of overlapping flight lines collected in different passes over the area of interest. This causes variations in aqcuisition conditions such that the reflected spectrum can vary significantly between these flight lines. Partly, this problem is solved by atmospherical correction, but residual spectral differences often remain. A probabilistic domain adaptation framework based on graph matching using Hidden Markov Random Fields was recently proposed for transforming hyperspectral data from one image to better correspond to the other. This paper investigates the use of scale and angle invariant…
Joint Alignment and Modeling of Correlated Behavior Streams
2013
The Variable Time-Shift Hidden Markov Model (VTS- HMM) is proposed for learning and modeling pairs of cor- related streams. Unlike previous coupled models for time series, the VTS-HMM accounts for varying time shifts be- tween correlated events in pairs of streams having different properties. The VTS-HMM is learned on a set of pairs of unaligned streams and, thus, learning entails simultaneous estimation of the varying time shifts and of the parameters of the model. The formulation is demonstrated in the analysis of videos of dyadic social interactions between children and adults in the Multimodal Dyadic Behavior Dataset (MMDB). In dyadic social interactions, an agent starts an interaction …
Experimental studies on continuous speech recognition using neural architectures with “adaptive” hidden activation functions
2010
The choice of hidden non-linearity in a feed-forward multi-layer perceptron (MLP) architecture is crucial to obtain good generalization capability and better performance. Nonetheless, little attention has been paid to this aspect in the ASR field. In this work, we present some initial, yet promising, studies toward improving ASR performance by adopting hidden activation functions that can be automatically learned from the data and change shape during training. This adaptive capability is achieved through the use of orthonormal Hermite polynomials. The “adaptive” MLP is used in two neural architectures that generate phone posterior estimates, namely, a standalone configuration and a hierarch…
Post-search query modeling in federated web scenario
2014
As opposed to query reformulation oriented towards changes made by a user to specify the information need more precisely, a post-search query modeling is a technique of exploiting syntax variation of gradually extended query which depending on some other factors like e.g. the resource, database or the key word alignment, facilitates the searching process. The study into modeling query submitted to some search engines that utilize different translation semantic paradigms is motivated by a real-world's challenges to retrieve heterogeneous textual documents from the web. For a couple of language pairs, we develop a user-centered framework for imposing the Hidden Web traffic optimization. In li…
Analysis and modeling of wind directions time series
2013
This work aims at studying some aspects of wind directions in Italy and supplying appropriate models. A comparison is presented between independent mixture and Hidden Markov models, which seem to be appropriate as far as the series we studied.
Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks
2013
Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …
Exploiting Semantic Trajectories Using HMMs and BIM for Worker Safety in Dynamic Environments
2020
International audience; Understanding dynamic behaviors of moving objects using positioning technologies for construction safety monitoring is still an open research issue. One task; that is a small subset in the widespread field of objects dynamics is the enrichment of the location data of users with the semantic information for studying their mobility patterns in the context of the environment. However, incorporating the semantics related to the environment gets complex in case of the dynamic construction sites where the site spaces are kept evolving with time. For instance, new walls and infrastructure supports are added often on sites, while others are detached. Similar situations open …
An adaptive probabilistic approach to goal-level imitation learning
2010
Imitation learning has been recognized as a promising technique to teach robots advanced skills. It is based on the idea that robots could learn new behaviors by observing and imitating the behaviors of other skilled actors. We propose an adaptive probabilistic graphical model which copes with three core issues of any imitative behavior: observation, representation and reproduction of skills. Our model, Growing Hierarchical Dynamic Bayesian Network (GHDBN), is hierarchical (i.e. able to characterize structured behaviors at different levels of abstraction), and growing (i.e. skills are learned or updated incrementally - and at each level of abstraction - every time a new observation sequence…
An adaptive probabilistic graphical model for representing skills in PbD settings
2010
Learning from Errors: Detecting ZigBee Interference in WiFi Networks
2014
In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…