نتایج جستجو برای: generalized embedding

تعداد نتایج: 237611  

Journal: :EURASIP J. Adv. Sig. Proc. 2014
Yulin Huang Jifang Pei Jianyu Yang Tao Wang Haiguang Yang Bing Wang

In this paper, we propose a new supervised feature extraction algorithm in synthetic aperture radar automatic target recognition (SAR ATR), called generalized neighbor discriminant embedding (GNDE). Based on manifold learning, GNDE integrates class and neighborhood information to enhance discriminative power of extracted feature. Besides, the kernelized counterpart of this algorithm is also pro...

2006
Michael Kunzinger Roland Steinbauer James A. Vickers

This paper is part of an ongoing program to develop a theory of generalized differential geometry. We consider the space G[X, Y ] of Colombeau generalized functions defined on a manifold X and taking values in a manifold Y . This space is essential in order to study concepts such as flows of generalized vector fields or geodesics of generalized metrics. We introduce an embedding of the space of...

2016
Jianfeng Wen Jianxin Li Yongyi Mao Shini Chen Richong Zhang

The models developed to date for knowledge base embedding are all based on the assumption that the relations contained in knowledge bases are binary. For the training and testing of these embedding models, multi-fold (or n-ary) relational data are converted to triples (e.g., in FB15K dataset) and interpreted as instances of binary relations. This paper presents a canonical representation of kno...

2014
Martin Baláz Jozef Frtús Martin Homola Ján Sefránek Giorgos Flouris

A novel argumentation semantics of defeasible logic programs (DeLP) is presented. Our goal is to build a semantics, which respects existing semantics and intuitions of “classical” logic programming. Generalized logic programs (GLP) are selected as an appropriate formalism for studying both undermining and rebutting. Our argumentation semantics is based on a notion of conflict resolution strateg...

2014
Behnam Neyshabur Yury Makarychev Nathan Srebro

We study the convex relaxation of clustering and hamming embedding, focusing on the asymmetric case (co-clustering and asymmetric hamming embedding), understanding their relationship to LSH as studied by [7] and to the max-norm ball, and the differences between their symmetric and asymmetric versions.

2016
Jacky Cresson Jacky CRESSON

— This paper is a contribution to the general program of embedding theories of dynamical systems. Following our previous work on the Stochastic embedding theory developed with S. Darses, we define the fractional embedding of differential operators and ordinary differential equations. We construct an operator combining in a symmetric way the left and right (Riemann-Liouville) fractional derivati...

2008
Jacky CRESSON

— This paper is a contribution to the general program of embedding theories of dynamical systems. Following our previous work on the Stochastic embedding theory developed with S. Darses, we define the fractional embedding of differential operators and ordinary differential equations. We construct an operator combining in a symmetric way the left and right (Riemann-Liouville) fractional derivati...

Journal: :bulletin of the iranian mathematical society 2015
j li w. shi d. yu

let h be a subgroup of a group g. h is said to be s-embedded in g if g has a normal t such that ht is an s-permutable subgroup of g and h ∩ t ≤ h sg, where h denotes the subgroup generated by all those subgroups of h which are s-permutable in g. in this paper, we investigate the influence of minimal s-embedded subgroups on the structure of finite groups. we determine the structure the finite grou...

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

Journal: :I. J. Network Security 2018
Jian-Jun Li Yun-He Wu Chin-Feng Lee Chin-Chen Chang

Recently, several reversible information hiding methods based PVO (pixel value ordering) techniques have been proposed, in these methods, secret data always are embedded in pixels with largest or smallest value in the block. In order to make use of the block with multiple largest-valued (or smallest-valued) pixels, a PVO-K method was proposed, which treats K largest-valued (or smallest-valued) ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید