首页 > 最新文献

2010 Second International Conference on Machine Learning and Computing最新文献

英文 中文
Facial Gesture Identification Using Lip Contours 利用嘴唇轮廓识别面部手势
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.13
J. Raheja, Radhey Shyam, Jatin Gupta, Umesh Kumar, P. B. Prasad
This paper describes a robust technique to determine happy/sad/neutral facial gestures of humans by processing an image containing human face. It aims to do away with the cumbersome process of training the computer with images and thereby significantly reducing the processing time. In this technique human face is identified using skin color identification on various spaces like HSV and YCbCr. Segmented features of face like the lips are determined using unique face feature determination. Contour of lips formed for different human moods are analyzed to identify, facial gesture. Edge detection of lips, followed by morphological operation, gives lip structure. Pattern analysis of lips using the unique histogram algorithm and subsequent comparison with different facial gesture icons gives facial gesture of human being in an image. This technique when tested on a huge database of human images under varying lightning conditions gave acceptable accuracy rates and was found fast enough to be used in real time video-stream
本文描述了一种通过处理包含人脸的图像来确定人类快乐/悲伤/中性面部手势的鲁棒技术。它旨在消除用图像训练计算机的繁琐过程,从而大大减少处理时间。在该技术中,人脸识别是通过在HSV和YCbCr等不同空间上的肤色识别来实现的。利用独特的人脸特征判定方法,确定唇等人脸的分割特征。分析不同人的情绪所形成的嘴唇轮廓,以识别面部手势。唇的边缘检测,然后形态学操作,得到唇的结构。使用独特的直方图算法对嘴唇进行模式分析,然后与不同的面部手势图标进行比较,得出图像中人类的面部手势。在一个巨大的人类图像数据库中,在不同闪电条件下对该技术进行了测试,得出了可接受的准确率,并且发现其速度足够快,可以用于实时视频流
{"title":"Facial Gesture Identification Using Lip Contours","authors":"J. Raheja, Radhey Shyam, Jatin Gupta, Umesh Kumar, P. B. Prasad","doi":"10.1109/ICMLC.2010.13","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.13","url":null,"abstract":"This paper describes a robust technique to determine happy/sad/neutral facial gestures of humans by processing an image containing human face. It aims to do away with the cumbersome process of training the computer with images and thereby significantly reducing the processing time. In this technique human face is identified using skin color identification on various spaces like HSV and YCbCr. Segmented features of face like the lips are determined using unique face feature determination. Contour of lips formed for different human moods are analyzed to identify, facial gesture. Edge detection of lips, followed by morphological operation, gives lip structure. Pattern analysis of lips using the unique histogram algorithm and subsequent comparison with different facial gesture icons gives facial gesture of human being in an image. This technique when tested on a huge database of human images under varying lightning conditions gave acceptable accuracy rates and was found fast enough to be used in real time video-stream","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image Compression using Artificial Neural Networks 基于人工神经网络的图像压缩
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.33
P. V. Rao, S. Madhusudana, Nachiketh S.S., K. Keerthi
This paper explores the application of artificial neural networks to image compression. An image compressing algorithm based on Back Propagation (BP) network is developed after image pre-processing. By implementing the proposed scheme the influence of different transfer functions and compression ratios within the scheme is investigated. It has been demonstrated through several experiments that peak-signal-to-noise ratio (PSNR) almost remains same for all compression ratios while mean square error (MSE) varies.
本文探讨了人工神经网络在图像压缩中的应用。在对图像进行预处理后,提出了一种基于BP网络的图像压缩算法。通过实施该方案,研究了方案内不同传递函数和压缩比的影响。通过几个实验已经证明,峰值信噪比(PSNR)几乎保持相同的所有压缩比,而均方误差(MSE)变化。
{"title":"Image Compression using Artificial Neural Networks","authors":"P. V. Rao, S. Madhusudana, Nachiketh S.S., K. Keerthi","doi":"10.1109/ICMLC.2010.33","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.33","url":null,"abstract":"This paper explores the application of artificial neural networks to image compression. An image compressing algorithm based on Back Propagation (BP) network is developed after image pre-processing. By implementing the proposed scheme the influence of different transfer functions and compression ratios within the scheme is investigated. It has been demonstrated through several experiments that peak-signal-to-noise ratio (PSNR) almost remains same for all compression ratios while mean square error (MSE) varies.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"134 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks 无线传感器网络中有效密钥分发的移动节点自适应移动性和可用性
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.30
S. K, Vidya Yeri, Arjun A.V., Venugopal K.R., L. Patnaik
Wireless Sensor Networks(WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The analysis and simulation results showed that the performance of the proposed scheme is better than the existing scheme.
无线传感器网络(WSN)由联网的传感器节点组成,并部署在无人值守的区域,这些区域的安全性非常重要。在传感器网络领域,安全性是一个重要的问题。这项工作提出了一个有效的方案,该方案处理移动节点的可用性,并引入了一个安全密钥保持有效的会话时间。分析和仿真结果表明,该方案的性能优于现有方案。
{"title":"Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks","authors":"S. K, Vidya Yeri, Arjun A.V., Venugopal K.R., L. Patnaik","doi":"10.1109/ICMLC.2010.30","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.30","url":null,"abstract":"Wireless Sensor Networks(WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The analysis and simulation results showed that the performance of the proposed scheme is better than the existing scheme.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Semantic Model for Building the Vietnamese Language Query Processing Framework in e-Library Searching Application 电子图书馆查询应用中越南语查询处理框架的语义模型
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.17
Dang Tuan Nguyen, Tuan Ngoc Pham, Quoc Tan Phan
This paper aims to establish a semantic model which is the most important and central component of our Vietnamese Language Query Processing (VLQP) framework. The VLQP framework is architecture of 2-tiers. This framework includes a restricted parser for analyzing Vietnamese query from users based on a class of the pre-defined syntactic rules and a transformer for transforming syntactic structure of query to its semantic representation. In this framework, the semantic model is an original feature we have addressed. This semantic model contributes to the syntax analysis and representation of Vietnamese query forms involving to application domain. We also propose transforming rules to transform syntactic structures to their semantic representation.
本文旨在建立一个语义模型,该模型是我们的越南语查询处理(VLQP)框架中最重要和最核心的组成部分。VLQP框架是两层架构。该框架包括一个受限解析器,用于基于一类预定义的语法规则分析来自用户的越南语查询,以及一个转换器,用于将查询的语法结构转换为其语义表示。在这个框架中,语义模型是我们解决的一个原始特性。该语义模型有助于对涉及到应用程序域的越南语查询表单进行语法分析和表示。我们还提出了转换规则,将句法结构转换为它们的语义表示。
{"title":"A Semantic Model for Building the Vietnamese Language Query Processing Framework in e-Library Searching Application","authors":"Dang Tuan Nguyen, Tuan Ngoc Pham, Quoc Tan Phan","doi":"10.1109/ICMLC.2010.17","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.17","url":null,"abstract":"This paper aims to establish a semantic model which is the most important and central component of our Vietnamese Language Query Processing (VLQP) framework. The VLQP framework is architecture of 2-tiers. This framework includes a restricted parser for analyzing Vietnamese query from users based on a class of the pre-defined syntactic rules and a transformer for transforming syntactic structure of query to its semantic representation. In this framework, the semantic model is an original feature we have addressed. This semantic model contributes to the syntax analysis and representation of Vietnamese query forms involving to application domain. We also propose transforming rules to transform syntactic structures to their semantic representation.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modified Ant Miner for Intrusion Detection 改进的Ant Miner入侵检测
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.52
Deven Agravat, Urmi Vaishnav, P. Swadas
This paper proposes Modified Ant Miner algorithm for intrusion detection. Ant Miner and its descendant have produced good result on many classification problems. Data mining technique is still relatively unexplored area for intrusion detection. In this paper, modification has been suggested in basic ant miner algorithm to improve accuracy and training time of algorithm. The KDD Cup 99 intrusion data set is used to evaluate our proposed algorithm and the result obtained from this experiment is compared with that of Support Vector Machine. It has been found that our proposed algorithm is more effective in case of DOS, U2R, and R2L type of attacks.
提出了一种改进的蚂蚁挖掘算法用于入侵检测。蚁矿机及其后续算法在许多分类问题上都取得了很好的结果。数据挖掘技术在入侵检测中仍然是一个相对未开发的领域。本文对基本蚂蚁挖掘算法进行了改进,提高了算法的准确率和训练时间。利用KDD Cup 99入侵数据集对该算法进行了验证,并将实验结果与支持向量机的结果进行了比较。实验结果表明,本文提出的算法在DOS、U2R和R2L类型的攻击中更为有效。
{"title":"Modified Ant Miner for Intrusion Detection","authors":"Deven Agravat, Urmi Vaishnav, P. Swadas","doi":"10.1109/ICMLC.2010.52","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.52","url":null,"abstract":"This paper proposes Modified Ant Miner algorithm for intrusion detection. Ant Miner and its descendant have produced good result on many classification problems. Data mining technique is still relatively unexplored area for intrusion detection. In this paper, modification has been suggested in basic ant miner algorithm to improve accuracy and training time of algorithm. The KDD Cup 99 intrusion data set is used to evaluate our proposed algorithm and the result obtained from this experiment is compared with that of Support Vector Machine. It has been found that our proposed algorithm is more effective in case of DOS, U2R, and R2L type of attacks.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hybrid Machine Learning Approach in Data Mining 数据挖掘中的混合机器学习方法
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.57
Jyothi Bellary, Bhargavi Peyakunta, Sekhar Konetigari
In this paper we discuss various machine learning approaches used in mining of data. Further we distinguish between symbolic and sub-symbolic data mining methods. We also attempt to propose a hybrid method with the combination of Artificial Neural Network (ANN) and Cased Based Reasoning (CBR) in mining of data.
在本文中,我们讨论了用于数据挖掘的各种机器学习方法。我们进一步区分了符号和子符号数据挖掘方法。我们还尝试提出一种将人工神经网络(ANN)和基于案例推理(CBR)相结合的数据挖掘混合方法。
{"title":"Hybrid Machine Learning Approach in Data Mining","authors":"Jyothi Bellary, Bhargavi Peyakunta, Sekhar Konetigari","doi":"10.1109/ICMLC.2010.57","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.57","url":null,"abstract":"In this paper we discuss various machine learning approaches used in mining of data. Further we distinguish between symbolic and sub-symbolic data mining methods. We also attempt to propose a hybrid method with the combination of Artificial Neural Network (ANN) and Cased Based Reasoning (CBR) in mining of data.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Study of the Gas Emission Prediction Model Based on Fuzzy-rough Set Neural Network 基于模糊-粗糙集神经网络的瓦斯涌出预测模型研究
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.16
Jing Hong, Yi Zhao
Precise and timely predicting the amount of gas emitted from the coal is of great importance for coal mine safety. A novel artificial network model based on fuzzy-rough set for gas emission forecasting of coal mine is proposed in this paper. Some practices prove that this model can perform better than the tradition neural network.
准确、及时地预测煤矿瓦斯涌出量对煤矿安全具有重要意义。提出了一种基于模糊粗糙集的煤矿瓦斯涌出预测人工网络模型。实践证明,该模型比传统的神经网络具有更好的性能。
{"title":"The Study of the Gas Emission Prediction Model Based on Fuzzy-rough Set Neural Network","authors":"Jing Hong, Yi Zhao","doi":"10.1109/ICMLC.2010.16","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.16","url":null,"abstract":"Precise and timely predicting the amount of gas emitted from the coal is of great importance for coal mine safety. A novel artificial network model based on fuzzy-rough set for gas emission forecasting of coal mine is proposed in this paper. Some practices prove that this model can perform better than the tradition neural network.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure Group Key Distribution Using Hybrid Cryptosystem 使用混合密码系统的安全组密钥分发
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.41
V. Kumari, D. Nagaraju, K. Soumya, K. Raju
In group-oriented applications like conferencing, chat groups and interactive gaming myriad messages are sent from one or more sources to multiple users. Multicasting is the optimum technique for such group oriented applications with effective network resource utilization. But maintaining security is a critical issue in group oriented protocols with frequent membership changes. Confidentiality can be achieved through changing the key material, known as rekeying every time a new member joins the group or existing member leaves from the group. Many techniques have been proposed earlier for this purpose. In centralized approach, a single key server is responsible to generate and distribute keys. In decentralized approach, a hierarchy of key managers distributes the keys. In distributed key-agreement protocol, the group members collectively generate and distribute a group key. This paper uses combination of both de-centralized and key agreement approaches to prevent a single point of failures and to improve the reliability as well as the performance of the system. This paper proposes new a technique(SGKP-1), using hybrid key trees, has certain advantages like secure channel establishment for the distribution of the key material, reducing the storage requirements and burden at each member, minimization of time requirement to become a new member of a group. The computational complexity further reduced using both the combination of public and private key crypto systems.
在面向群组的应用程序中,如会议、聊天组和交互式游戏,无数消息从一个或多个来源发送给多个用户。组播是这种面向群的应用的最佳技术,可以有效地利用网络资源。但是,在成员频繁变化的面向组协议中,安全维护是一个关键问题。可以通过更改密钥材料来实现机密性,即在每次新成员加入组或现有成员离开组时进行密钥更新。为了这个目的,前面已经提出了许多技术。在集中式方法中,单个密钥服务器负责生成和分发密钥。在分散式方法中,密钥管理器的层次结构分发密钥。在分布式密钥协议中,组成员共同生成并分发组密钥。本文采用去中心化和密钥协议相结合的方法来防止单点故障,提高系统的可靠性和性能。本文提出了一种基于混合密钥树的新技术(SGKP-1),该技术具有为密钥材料的分发建立安全通道,减少了每个成员的存储需求和负担,使成为一个新成员所需的时间最小化等优点。使用公钥和私钥加密系统的组合进一步降低了计算复杂度。
{"title":"Secure Group Key Distribution Using Hybrid Cryptosystem","authors":"V. Kumari, D. Nagaraju, K. Soumya, K. Raju","doi":"10.1109/ICMLC.2010.41","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.41","url":null,"abstract":"In group-oriented applications like conferencing, chat groups and interactive gaming myriad messages are sent from one or more sources to multiple users. Multicasting is the optimum technique for such group oriented applications with effective network resource utilization. But maintaining security is a critical issue in group oriented protocols with frequent membership changes. Confidentiality can be achieved through changing the key material, known as rekeying every time a new member joins the group or existing member leaves from the group. Many techniques have been proposed earlier for this purpose. In centralized approach, a single key server is responsible to generate and distribute keys. In decentralized approach, a hierarchy of key managers distributes the keys. In distributed key-agreement protocol, the group members collectively generate and distribute a group key. This paper uses combination of both de-centralized and key agreement approaches to prevent a single point of failures and to improve the reliability as well as the performance of the system. This paper proposes new a technique(SGKP-1), using hybrid key trees, has certain advantages like secure channel establishment for the distribution of the key material, reducing the storage requirements and burden at each member, minimization of time requirement to become a new member of a group. The computational complexity further reduced using both the combination of public and private key crypto systems.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Color Image Restoration Based on Split Bregman Iteration Algorithm 基于分裂Bregman迭代算法的彩色图像恢复
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.22
Yi Li-ya, Xiaolei Lu, Furong Wang
In this paper, we modify the Split Bregman algorithm for color image restoration with the edge-preserving color image total variation model. The observed blurred images are assumed to be degraded by within channel and cross channel blurs. Our proposed algorithm is based on the Split Bregman process and simply requires Fast Fourier Transform in each iteration. Experimental comparisons using various types of blurs are reported, and the results show that, the proposed method significantly outperforms existing methods, such as the variable splitting alternative minimization algorithm and that adopted by MATLAB deblurring function, in terms of both objective signal to noise ratio and subjective vision quality. This demonstrates the efficiency of our proposed algorithms.
本文采用保持边缘的彩色图像总变分模型,对分割Bregman彩色图像恢复算法进行改进。假设观察到的模糊图像被信道内模糊和跨信道模糊所退化。我们提出的算法是基于分裂Bregman过程,只需在每次迭代中进行快速傅立叶变换。实验结果表明,本文提出的方法在客观信噪比和主观视觉质量方面都明显优于现有方法,如变量分割替代最小化算法和MATLAB去模糊函数所采用的去模糊算法。这证明了我们提出的算法的有效性。
{"title":"Color Image Restoration Based on Split Bregman Iteration Algorithm","authors":"Yi Li-ya, Xiaolei Lu, Furong Wang","doi":"10.1109/ICMLC.2010.22","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.22","url":null,"abstract":"In this paper, we modify the Split Bregman algorithm for color image restoration with the edge-preserving color image total variation model. The observed blurred images are assumed to be degraded by within channel and cross channel blurs. Our proposed algorithm is based on the Split Bregman process and simply requires Fast Fourier Transform in each iteration. Experimental comparisons using various types of blurs are reported, and the results show that, the proposed method significantly outperforms existing methods, such as the variable splitting alternative minimization algorithm and that adopted by MATLAB deblurring function, in terms of both objective signal to noise ratio and subjective vision quality. This demonstrates the efficiency of our proposed algorithms.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Preliminary Evaluation of New Machine Learning Algorithms for Feasibility 新机器学习算法可行性的快速初步评估
Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.31
Dustin Baumgartner, G. Serpen
Traditionally, researchers compare the performance of new machine learning algorithms against those of locally executed simulations that serve as benchmarks. This process requires considerable time, computation resources, and expertise. In this paper, we present a method to quickly evaluate the performance feasibility of new algorithms – offering a preliminary study that either supports or opposes the need to conduct a full-scale traditional evaluation, and possibly saving valuable resources for researchers. The proposed method uses performance benchmarks obtained from results reported in the literature rather than local simulations. Furthermore, an alternate statistical technique is suggested for comparative performance analysis, since traditional statistical significance tests do not fit the problem well. We highlight the use of the proposed evaluation method in a study that compared a new algorithm against 47 other algorithms across 46 datasets.
传统上,研究人员将新机器学习算法的性能与作为基准的本地执行模拟的性能进行比较。这个过程需要大量的时间、计算资源和专业知识。在本文中,我们提出了一种快速评估新算法性能可行性的方法,提供了一项初步研究,支持或反对进行全面的传统评估,并可能为研究人员节省宝贵的资源。所提出的方法使用从文献报告的结果中获得的性能基准,而不是局部模拟。此外,由于传统的统计显著性检验不能很好地适应问题,因此建议采用另一种统计技术进行比较性能分析。我们在一项研究中强调了所提出的评估方法的使用,该研究将一种新算法与46个数据集中的47种其他算法进行了比较。
{"title":"Fast Preliminary Evaluation of New Machine Learning Algorithms for Feasibility","authors":"Dustin Baumgartner, G. Serpen","doi":"10.1109/ICMLC.2010.31","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.31","url":null,"abstract":"Traditionally, researchers compare the performance of new machine learning algorithms against those of locally executed simulations that serve as benchmarks. This process requires considerable time, computation resources, and expertise. In this paper, we present a method to quickly evaluate the performance feasibility of new algorithms – offering a preliminary study that either supports or opposes the need to conduct a full-scale traditional evaluation, and possibly saving valuable resources for researchers. The proposed method uses performance benchmarks obtained from results reported in the literature rather than local simulations. Furthermore, an alternate statistical technique is suggested for comparative performance analysis, since traditional statistical significance tests do not fit the problem well. We highlight the use of the proposed evaluation method in a study that compared a new algorithm against 47 other algorithms across 46 datasets.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2010 Second International Conference on Machine Learning and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1