Search results for "VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422"

showing 10 items of 14 documents

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

A new paradigm for pattern classification: Nearest Border Techniques

2013

Published version of a chapter in the book: AI 2013: Advances in Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-03680-9_44 There are many paradigms for pattern classification. As opposed to these, this paper introduces a paradigm that has not been reported in the literature earlier, which we shall refer to as the Nearest Border (NB) paradigm. The philosophy for developing such a NB strategy is as follows: Given the training data set for each class, we shall first attempt to create borders for each individual class. After that, we advocate that testing is accomplished by assigning the test sample to the class whose border it lies closest to…

Class (set theory)Training setPattern ClassificationComputer sciencebusiness.industrySVMVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Centroid02 engineering and technology01 natural sciencesVDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411Support vector machine010104 statistics & probabilityExperimental testingOutlier0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligence0101 mathematics10. No inequalitySet (psychology)businessTest sampleBorder Identification
researchProduct

A Framework for Assessing the Condition of Crowds Exposed to a Fire Hazard Using a Probabilistic Model

2014

Published version of an article in the journal: International Journal of Machine Learning and Computing. Also available from the publisher at: http://dx.doi.org/10.7763/IJMLC.2014.V4.379 open Access Allocating limited resources in an optimal manner when rescuing victims from a hazard is a complex and error prone task, because the involved hazards are typically evolving over time; stagnating, building up or diminishing. Typical error sources are: miscalculation of resource availability and the victims’ condition. Thus, there is a need for decision support when it comes to rapidly predicting where the human fatalities are likely to occur to ensure timely rescue. This paper proposes a probabil…

Information Systems and ManagementOperations researchemergency evacuationComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Bayesian networkVDP::Technology: 500::Information and communication technology: 550Statistical modelComputer Science ApplicationsFire hazardBayesian networksCrowdsArtificial IntelligenceDiagnostic modelEmergency evacuationdiagnostic modelhuman response in fireInternational Journal of Machine Learning and Computing
researchProduct

Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

2012

Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…

Internet Protocol Control Protocolcomputer.internet_protocolComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Distributed computingAutomatic repeat requestGeneral Inter-ORB ProtocolData_CODINGANDINFORMATIONTHEORYInternet protocol suitefinite model-checkingComputer Science::Networking and Internet ArchitecturePROMELAComputer Science::Information Theorybusiness.industryNode (networking)Link Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScooperative communicationsCooperative diversityprotocol verificationHardware and ArchitecturebusinessLawcomputerSoftwareReverse Address Resolution ProtocolComputer networkComputer Standards & Interfaces
researchProduct

On Using the Theory of Regular Functions to Prove the ε-Optimality of the Continuous Pursuit Learning Automaton

2013

Published version of a chapter in the book: Recent Trends in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-38577-3_27 There are various families of Learning Automata (LA) such as Fixed Structure, Variable Structure, Discretized etc. Informally, if the environment is stationary, their ε-optimality is defined as their ability to converge to the optimal action with an arbitrarily large probability, if the learning parameter is sufficiently small/large. Of these LA families, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. The…

Property (philosophy)Learning automataComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Structure (category theory)Monotonic functionMathematical proofAutomatonArbitrarily largeε-optimalityContinuous Pursuit AlgorithmCalculuspursuit algorithmsAlgorithmVariable (mathematics)
researchProduct

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

A mutual GrabCut method to solve co-segmentation

2013

Publised version of an article from the journal:Eurasip Journal on Image and Video Processing. Also available on SpringerLink:http://dx.doi.org/10.1186/1687-5281-2013-20. Open Access Co-segmentation aims at segmenting common objects from a group of images. Markov random field (MRF) has been widely used to solve co-segmentation, which introduces a global constraint to make the foreground similar to each other. However, it is difficult to minimize the new model. In this paper, we propose a new Markov random field-based co-segmentation model to solve co-segmentation problem without minimization problem. In our model, foreground similarity constraint is added into the unary term of MRF model ra…

Similarity (geometry)Markov random fieldComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVDP::Technology: 500::Information and communication technology: 550Pattern recognitionFunction (mathematics)Term (time)Constraint (information theory)GrabCutComputer Science::Computer Vision and Pattern RecognitionCutSignal ProcessingSegmentationArtificial intelligenceElectrical and Electronic EngineeringbusinessInformation SystemsEURASIP Journal on Image and Video Processing
researchProduct

Ultimate Order Statistics-Based Prototype Reduction Schemes

2013

Published version of a chapter in the book: AI 2013: Advances in Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-03680-9_42 The objective of Prototype Reduction Schemes (PRSs) and Border Identification (BI) algorithms is to reduce the number of training vectors, while simultaneously attempting to guarantee that the classifier built on the reduced design set performs as well, or nearly as well, as the classifier built on the original design set. In this paper, we shall push the limit on the field of PRSs to see if we can obtain a classification accuracy comparable to the optimal, by condensing the information in the data set into a single tr…

Training setComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Order statisticcomputer.software_genreSupport vector machineData setBayes' theoremclassification using Order Statistics (OS)CMOSPrototype Reduction SchemesData miningmoments of OSClassifier (UML)computerParametric statistics
researchProduct

Peptide classification using optimal and information theoretic syntactic modeling

2010

Accepted version of an article published in the journal: Pattern Recognition. Published version available on Sciverse: http://dx.doi.org/10.1016/j.patcog.2010.05.022 We consider the problem of classifying peptides using the information residing in their syntactic representations. This problem, which has been studied for more than a decade, has typically been investigated using distance-based metrics that involve the edit operations required in the peptide comparisons. In this paper, we shall demonstrate that the Optimal and Information Theoretic (OIT) model of Oommen and Kashyap [22] applicable for syntactic pattern recognition can be used to tackle peptide classification problem. We advoca…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220206 medical engineeringSequence alignment02 engineering and technologySyntactic pattern recognitionInformation theorySubstitution matrix03 medical and health sciencesArtificial IntelligenceVDP::Medical disciplines: 700::Basic medical dental and veterinary science disciplines: 710::Medical molecular biology: 711030304 developmental biologyMathematicsProbability measure0303 health sciencesbusiness.industryPattern recognitionSimilitudeSupport vector machineSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessClassifier (UML)Algorithm020602 bioinformaticsSoftware
researchProduct

Imposing tree-based topologies onto self organizing maps

2011

Accepted version of an article from the journal Information Sciences. Definitive published version available on Elsevier Science Direct: http://dx.doi.org/10.1016/j.ins.2011.04.038 The beauty of the Kohonen map is that it has the property of organizing the codebook vectors, which represent the data points, both with respect to the underlying distribution and topologically. This topology is traditionally linear, even though the underlying lattice could be a grid, and this has been used in a variety of applications [23,35,40]. The most prominent efforts to render the topology to be structured involves the Evolving Tree (ET) due to Pakkanen et al. [36], and the Self-Organizing Tree Maps (SOTM)…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422VDP::Mathematics and natural science: 400::Mathematics: 410::Topology/geometry: 415
researchProduct