共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
Albert A. Stahel 《International Transactions in Operational Research》2004,11(4):435-446
This paper presents two concepts: asymmetric warfare and dissymmetric warfare. NATO and US Military operations in recent wars in Kosovo and Afghanistan are analysed by means of comparison with old Chinese strategic thinking. No‐Loss‐Strategy and virtual warfare as well as the transformation from asymmetric to dissymmetric and from dissymmetric to asymmetric warfare are reflected upon. 相似文献
4.
5.
D. Gordeziani G. Avalishvili M. Avalishvili 《Computers & Mathematics with Applications》2006,51(12):1789-1808
In the present paper, static and dynamical problems for linearly elastic shells in curvilinear coordinates are considered. Hierarchies of two-dimensional models for corresponding boundary and initial boundary value problems are constructed within the variational settings. The existence and uniqueness of solutions of the reduced problems are investigated in suitable spaces. Under the conditions of solvability of the original static or dynamical problem, convergence of the sequence of vector functions of three variables restored from the solutions of the constructed two-dimensional problems to the solution of the three-dimensional problem is proved and approximation error is estimated. 相似文献
6.
Classification problems have a long history in the machine learning literature. One of the simplest, and yet most consistently well-performing set of classifiers is the Naïve Bayes models. However, an inherent problem with these classifiers is the assumption that all attributes used to describe an instance are conditionally independent given the class of that instance. When this assumption is violated (which is often the case in practice) it can reduce classification accuracy due to “information double-counting” and interaction omission. In this paper we focus on a relatively new set of models, termed Hierarchical Naïve Bayes models. Hierarchical Naïve Bayes models extend the modeling flexibility of Naïve Bayes models by introducing latent variables to relax some of the independence statements in these models. We propose a simple algorithm for learning Hierarchical Naïve Bayes models in the context of classification. Experimental results show that the learned models can significantly improve classification accuracy as compared to other frameworks. 相似文献
7.
We show that a hierarchical Bayesian modeling approach allows us to perform regularization in sequential learning. We identify three inference levels within this hierarchy: model selection, parameter estimation, and noise estimation. In environments where data arrive sequentially, techniques such as cross validation to achieve regularization or model selection are not possible. The Bayesian approach, with extended Kalman filtering at the parameter estimation level, allows for regularization within a minimum variance framework. A multilayer perceptron is used to generate the extended Kalman filter nonlinear measurements mapping. We describe several algorithms at the noise estimation level that allow us to implement on-line regularization. We also show the theoretical links between adaptive noise estimation in extended Kalman filtering, multiple adaptive learning rates, and multiple smoothing regularization coefficients. 相似文献
8.
9.
10.
Different hierarchical models in pattern analysis and recognition are proposed, based on occurrence probability of patterns. As an important application of recognizing handprinted characters, three typical kinds of hierarchical models such asM
89-89,M
89-36 andM
36-36 have been presented, accompanied by the computer algorithms for computing recognition rates of pattern parts. Moreover, a comparative study of their recognition rates has been conducted theoretically; and numerical experiments have been carried out to verify the analytical conclusions made. Various hierarchical models deliberated in this paper can provide users more or better choices of pattern models in practical application, and lead to a uniform computational scheme (or code). The recognition rates of parts can be improved remarkably by a suitable hierarchical model. For the modelM
89-36 in which case some of the Canadian standard handprinted characters have multiple occurrence probabilities, the total mean recognition rates of the given sample may reach 120% of that by the model proposed by Li et al., and 156% of that obtained from the subjective experiments reported by Suen. 相似文献
11.
《Robotics and Autonomous Systems》2006,54(5):361-369
According to the motor theories of perception, the motor systems of an observer are actively involved in the perception of actions when these are performed by a demonstrator. In this paper we review our computational architecture, HAMMER (Hierarchical Attentive Multiple Models for Execution and Recognition), where the motor control systems of a robot are organised in a hierarchical, distributed manner, and can be used in the dual role of (a) competitively selecting and executing an action, and (b) perceiving it when performed by a demonstrator. We subsequently demonstrate that such an arrangement can provide a principled method for the top-down control of attention during action perception, resulting in significant performance gains. We assess these performance gains under a variety of resource allocation strategies. 相似文献
12.
Recognizing human actions from a stream of unsegmented sensory observations is important for a number of applications such as surveillance and human-computer interaction. A wide range of graphical models have been proposed for these tasks, and are typically extensions of the generative hidden Markov models (HMMs) or their discriminative counterpart, conditional random fields (CRFs). These extensions typically address one of three key limitations in the basic HMM/CRF formalism – unrealistic models for the duration of a sub-event, not encoding interactions among multiple agents directly and not modeling the inherent hierarchical organization of activities. In our work, we present a family of graphical models that generalize such extensions and simultaneously model event duration, multi agent interactions and hierarchical structure. We also present general algorithms for efficient learning and inference in such models based on local variational approximations. We demonstrate the effectiveness of our framework by developing graphical models for applications in automatic sign language (ASL) recognition, and for gesture and action recognition in videos. Our methods show results comparable to state-of-the-art in the datasets we consider, while requiring far fewer training examples compared to low-level feature based methods. 相似文献
13.
Enrico Casella Marco Ortolani Simone Silvestri Sajal K. Das 《Personal and Ubiquitous Computing》2020,24(4):451-464
Recognizing users’ daily life activities without disrupting their lifestyle is a key functionality to enable a broad variety of advanced services for 相似文献
14.
Hierarchical fuzzy relational models: linguistic interpretation and universal approximation 总被引:2,自引:0,他引:2
Hierarchical fuzzy structures composed of a series of sub-models connected in cascade have been found to be effective tools for dealing with the dimensionality problem in fuzzy systems. This paper addresses both the issues of linguistic interpretation and universal approximation of systems using hierarchical fuzzy models. Fuzzy relational equations are used to implement the sub-models of a hierarchical structure that has two very important properties: i) it can be converted into a completely equivalent nonhierarchical model, which in turn allows the extraction of linguistic knowledge in the form of consistent fuzzy If-Then rules; and ii) it is a universal approximator. These properties are analytically derived and the proposed model is illustrated by means of an example. 相似文献
15.
Hierarchical optimization of personalized experiences for e-Learning systems through evolutionary models 总被引:1,自引:1,他引:1
Recent researches in e-Learning area highlight the need to define novel and advanced support mechanism for commercial and
academic organizations in order to enhance the skills of employees and students and, consequently, to increase the overall
competitiveness in the new economy world. This is due to the unbelievable velocity and volatility of modern knowledge that
require novel learning methods which are able to offer additional support features as efficiency, task relevance and personalization.
This paper tries to deal with these features by proposing an adaptive e-Learning framework based on Computational Intelligence
methodologies by supporting e-Learning systems’ designers in two different aspects: (1) they represent the most suitable solution,
able to support learning content and activities, personalized to specific needs and influenced by specific preferences of
the learner and (2) they assist designers with computationally efficient methods to develop “in time” e-Learning environments.
Our work attempts to achieve both results by exploiting an ontological representation of learning environment and a hierarchical
memetic approach of optimization. In detail, our approach takes advantage of a collection of ontological models and processes
for adapting an e-Learning system to the learner expectations by efficiently solving a well-defined optimization problem,
through a hierarchical multi-cores memetic approach. 相似文献
16.
17.
The simplest mathematical models describing the spreading of information warfare are considered. New mathematical models which describe the process of information warfare are created. In particular, complete conditions are obtained for one of the participants to win in this warfare. 相似文献
18.
19.
The past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial technologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increasing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. In today's heavily networked environment, safety demands protection from both obvious and subtle intrusions that can delete or corrupt vital data. Traditionally, information systems security focuses primarily on prevention: putting controls and mechanisms in place that protect confidentiality, integrity, and availability by stopping users from doing bad things. Moreover, most mechanisms are powerless against misbehavior by legitimate users who perform functions for which they are authorized. The paper discusses traditional approaches and their limitations 相似文献
20.