Active mental exploration of unseen patterns
نویسندگان
چکیده
منابع مشابه
Active 3D Segmentation through Fixation of Previously Unseen Objects
We present a method for active object segmentation based on integration of several cues; image point positions, binocular disparities and pixel colours. It serves as a framework for generation of object hypotheses of previously unseen objects in natural indoor scenes. The appearance, 3D shape and size of objects are modelled in an iterative manner using an approximate Expectation-Maximisation (...
متن کاملActive visual scene exploration
This thesis addresses information theoretic methods for control of one or several active cameras in the context of visual surveillance. This approach has two advantages. Firstly, any system dealing with real inputs must take into account noise in the measurements and the underlying system model. Secondly, the control of cameras in surveillance often has different, potentially conflicting object...
متن کاملExploration in Active Learning
In the passive learning paradigm, a learner learns purely through observing its environment. The environment is assumed to generate a stream of training data according to some unknown probability distribution. Passive learning techniques di er in the type of results they seek to produce, as well as in the way they generalize from observations. Common learning tasks are the clustering, classi ca...
متن کاملDetecting previously unseen outbreaks with novel symptom patterns
Introduction Commonly used syndromic surveillance methods based on the spatial scan statistic (1) first classify disease cases into broad, preexisting symptom categories (prodromes) such as respiratory or fever, then detect spatial clusters where the recent case count of some prodrome is unexpectedly high. Novel emerging infections may have very specific and anomalous symptoms, which should be ...
متن کاملIdentifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis
Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Japanese Psychological Research
سال: 1982
ISSN: 0021-5368,1468-5884
DOI: 10.4992/psycholres1954.24.200