نتایج جستجو برای: knearest neighbor

تعداد نتایج: 23101  

2017

Similarity assessment plays a key role in lazy learning methods such as knearest neighbor or case-based reasoning. In this paper we will show how refinement graphs, that were originally introduced for inductive learning, can be employed to assess and reason about similarity. We will define and analyze two similarity measures, $S_{?}$ and $S_{?}$, based on refinement graphs. The \emph{anti-unifi...

2003
Douglas Vail Manuela Veloso

Robot calibration for an environment is a tedious task that usually involves extensive, if not total, human intervention. However, robots have sensing mechanisms, in particular accelerometers, which could in principle be used to detect specific environmental states. In this paper, we contribute several approaches for robots to detect their state using accelerometer data. In particular, we use a...

2011
R. Pouteau A. Collin B. Stoll

* Corresponding author. ** This work was supported in part by the French Marine Protected Areas Agency and the Research Department of the Government of French Polynesia. Abstract – A substantial number of studies compare conventional classifiers (e.g. Maximum Likelihood, Decision Trees, Neural Networks or Support Vector Machines (SVM)) in a single location. We propose here an in-depth compariso...

2006
Xiaopeng Xiong Hicham G. Elmongui Xiaoyong Chai Walid G. Aref

Moving objects equipped with locating devices can report their locations periodically to data stream sewers. With the pervasiveness of moving objects, one single sewer cannot support all objects and queries in a wide area. As a result, multiple spatio-temporal data stream management systems must be deployed and thus result in a sewer network. It is vital for sewers in the network to collaborate...

2013
James Sharpnack Akshay Krishnamurthy Aarti Singh

The detection of anomalous activity in graphs is a statistical problem that arises in many applications, such as network surveillance, disease outbreak detection, and activity monitoring in social networks. Beyond its wide applicability, graph structured anomaly detection serves as a case study in the difficulty of balancing computational complexity with statistical power. In this work, we deve...

Journal: :The Computer Science Journal of Moldova 2014
Lucas Calabrez Pereyra Silvio M. Pereira Juliana P. Souza Marco Andrey Cipriani Frade Rangaraj M. Rangayyan Paulo Mazzoncini de Azevedo Marques

We present color image processing methods for the characterization of images of dermatological lesions for the purpose of content-based image retrieval (CBIR) and computer-aided diagnosis. The intended application is to segment the images and perform classification and analysis of the tissue composition of skin lesions or ulcers, in terms of granulation (red), fibrin (yellow), necrotic (black),...

2000
Ronald A. Metoyer Jessica K. Hodgins

Character animation is usually reserved for highly skilled animators and computer programmers because few of the available tools allow the novice or casual user to create compelling animated content. In this paper, we explore a partial solution to this problem which lets the user coach animated characters by sketching their trajectories on the ground plane. The details of the motion are then co...

2017
Young-Hun Kim M M Manjurul Islam Rashedul Islam Jong-Myon Kim

Corresponding author. Abstract In this paper, we present an efficient model for reliable fault diagnosis of the induction motor. This is now a growing demand for high classification accuracy in fault diagnosis. However, the system performance is highly dependable on superior feature analysis. But, it’s still crucial and computational complex to select discernment features, thus, a new genetic a...

2009
Steffen Rendle Christoph Freudenthaler Zeno Gantner Lars Schmidt-Thieme

Item recommendation is the task of predicting a personalized ranking on a set of items (e.g. websites, movies, products). In this paper, we investigate the most common scenario with implicit feedback (e.g. clicks, purchases). There are many methods for item recommendation from implicit feedback like matrix factorization (MF) or adaptive knearest-neighbor (kNN). Even though these methods are des...

2017
Asia J. Biega Azin Ghazimatin Hakan Ferhatosmanoglu Krishna P. Gummadi Gerhard Weikum

Search engines in online communities such as TwiŠer or Facebook not only return matching posts, but also provide links to the pro€les of the authors. Œus, when a user appears in the top-k results for a sensitive keyword query, she becomes widely exposed in a sensitive context. Œe e‚ects of such exposure can result in a serious privacy violation, ranging from embarrassment all the way to becomin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید