首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
The paper is an outline of a new approach to pattern recognition developed by the author. A fuller introduction to the approach will appear soon.(1) Within the proposed framework the two principal approaches to pattern recognition—vector and syntactic—are unified.  相似文献   

2.
In this study a new approach is presented for the recognition of human actions of everyday life with a fixed camera. The originality of the presented method consists in characterizing sequences by a temporal succession of semi-global features, which are extracted from “space-time micro-volumes”. The advantage of this approach lies in the use of robust features (estimated on several frames) associated with the ability to manage actions with variable durations and easily segment the sequences with algorithms that are specific to time-varying data. Each action is actually characterized by a temporal sequence that constitutes the input of a Hidden Markov Model system for the recognition. Results presented of 1,614 sequences performed by several persons validate the proposed approach.  相似文献   

3.
Using the concept of test functions, we develop a general framework within which many recent approaches to the definition of random sequences can be described. Using this concept we give some definitions of random sequences that are narrower than those proposed in the literature. We formulate an objection to some of these concepts of randomness. Using the notion of effective test function, we formulate a thesis on the true concept of randomness.  相似文献   

4.
5.
Discovering patterns with great significance is an important problem in data mining discipline. An episode is defined to be a partially ordered set of events for consecutive and fixed-time intervals in a sequence. Most of previous studies on episodes consider only frequent episodes in a sequence of events (called simple sequence). In real world, we may find a set of events at each time slot in terms of various intervals (hours, days, weeks, etc.). We refer to such sequences as complex sequences. Mining frequent episodes in complex sequences has more extensive applications than that in simple sequences. In this paper, we discuss the problem on mining frequent episodes in a complex sequence. We extend previous algorithm MINEPI to MINEPI+MINEPI+ for episode mining from complex sequences. Furthermore, a memory-anchored algorithm called EMMA is introduced for the mining task. Experimental evaluation on both real-world and synthetic data sets shows that EMMA is more efficient than MINEPI+MINEPI+.  相似文献   

6.
7.
Detection of recognition errors is important in many areas, such as improving recognition performance, saving manual effort for proof-reading and post-editing, and assigning appropriate weights for retrieval in constructing digital libraries. We propose a novel application of multiple classifiers for the detection of recognition errors. A need for multiple classifiers emerges when a single classifier cannot improve recognition-error detection performance compared with the current detection scheme using a simple threshold mechanism. Although the single classifier does not improve recognition error performance, it serves as a baseline for comparison and the related study of useful features for error detection suggests three distinct cases where improvement is needed. For each case, the multiple classifier approach assigns a classifier to detect the presence or absence of errors and additional features are considered for each case. Our results show that the recall rate (70-80%) of recognition errors, the precision rate (80-90%) of recognition error detection and the saving in manual effort (75%) were better than the corresponding performance using a single classifier or a simple threshold detection scheme.  相似文献   

8.
Although a number of researchers have demonstrated that reasoning on a model of the user's plans and goals is helpful in language understanding and response generation, current models of plan inference cannot handle naturally occurring dialogue. This paper argues that model building from less than ideal dialogues has a great deal in common with processing ill-formed input. It defines well-formedness constraints for information-seeking dialogues and contends that strategies for interpreting ill-formed input can be applied to the problem of modeling the user's plan during an ill-formed dialogue. It presents a meta-rule approach for hypothesizing the cause of dialogue ill-formedness, and describes meta-rules for relaxing the plan inference process and enabling the consideration of alternative hypotheses. The advantages of this approach are that it provides a unified framework for handling both well-formed and ill-formed dialogue, avoids unnatural interpretations when the dialogue is proceeding smoothly, and facilitates a nonmonotonic plan recognition system.Rhonda Eller is a Ph.D. candidate in Computer Science at the University of Delaware. She received her B.S. in Computer Science from Millersville University of Pennsylvania in 1987, and her M.S. degree in the same field from the University of Delaware. Her primary interests lie in the areas of natural language processing, plan recognition, and user modelling. This paper summarizes the current state of her thesis work on repair of an incorrectly inferred plan for a user.Sandra Carberry is an associate professor of computer science at the University of Delaware. Her research interests include discourse understanding, user modeling, planning and plan recognition, and intelligent natural language interfaces. This paper describes work that is part of an ongoing research project to develop a robust model of plan recognition.  相似文献   

9.
Automatic summarization of texts is now crucial for several information retrieval tasks owing to the huge amount of information available in digital media, which has increased the demand for simple, language-independent extractive summarization strategies. In this paper, we employ concepts and metrics of complex networks to select sentences for an extractive summary. The graph or network representing one piece of text consists of nodes corresponding to sentences, while edges connect sentences that share common meaningful nouns. Because various metrics could be used, we developed a set of 14 summarizers, generically referred to as CN-Summ, employing network concepts such as node degree, length of shortest paths, d-rings and k-cores. An additional summarizer was created which selects the highest ranked sentences in the 14 systems, as in a voting system. When applied to a corpus of Brazilian Portuguese texts, some CN-Summ versions performed better than summarizers that do not employ deep linguistic knowledge, with results comparable to state-of-the-art summarizers based on expensive linguistic resources. The use of complex networks to represent texts appears therefore as suitable for automatic summarization, consistent with the belief that the metrics of such networks may capture important text features.  相似文献   

10.
This letter is concerned with the operation of a class of multi-layer associative networks commonly known as the multi-layer perceptron (MLP), Rumelharte network or back-propagation network. We describe the operation of the MLP as a pattern recognition device in terms of a feature-space representation. This allows an understanding of how structure in the training data is represented internally in the machine.  相似文献   

11.
Geometric feature recognition is a crucial task in the development of concurrent engineering software. This paper presents a new methodology for geometric feature recognition which combines the advantages of face-edge adjacency graphs and expert systems. The methodology uses several new concepts such as enhanced winged edge data structure (EWEDS) and multi-attributed adjacency graphs (MAAG). The object model is presented as a set of facts. The rules for the recognition of each feature are derived from the corresponding feature-MAAG. This simplifies the process of writing the rules while enabling the inclusion of new features into the rule base as they are encountered.  相似文献   

12.
13.
This paper describes a syntactic method for representing the primitive parts of a pattern as nodes of a type of directed graph. A linear representation of the digraph can then be presented to a regular unordered tree automaton for classification. Regular unordered tree automata can be simulated by deterministic pushdown automata, so this procedure can be implemented easily. Regular u-tree automata and the corresponding generative systems, regular u-tree grammars are formally defined. Several results are shown which are applicable to all syntactic pattern recognition schemes involving the use of primitives.  相似文献   

14.
15.
In this paper, a method for writing composable TLA+ specifications that conform to the formal model called Masaccio is introduced. Specifications are organized in TLA+ modules that correspond to Masaccio components by means of a trace-based semantics. Hierarchical TLA+ specifications are built from atomic component specifications by parallel and serial composition that can be arbitrary nested. While the rule of parallel composition is a variation of the classical joint-action composition, the authors do not know about a reuse method for the TLA+ that systematically employs the presented kind of a serial composition. By combining these two composition rules and assuming only the noninterleaving synchronous mode of an execution, the concurrent, sequential, and timed compositionality is achieved.  相似文献   

16.
17.
Plan recognition is an important task whenever a system has to take into account an agent's actions and goals in order to be able to react adequately. Most plan recognizers work by merely maintaining a set of equally plausible plan hypotheses each of which proved compatible with recent observations without taking into account individual preferences of the currently observed agent. Such additional information provides a basis for ranking the hypotheses so that the best one can be selected whenever the system is forced to react (e.g., to provide help to the user of a software system to accomplish his goals). Furthermore, hypotheses with low valuations can be excluded from considerations at an early stage. In this paper, an approach to the quantitative modeling of the required agent-related data and their use in plan recognition is presented. It relies on the DempsterShafer Theory and provides mechanisms for the initialization and update of corresponding numerical values.  相似文献   

18.
Kanerva's Sparse Distributed Memory (SDM) is one of the self-organizing neural networks that mimic closely the psychological behavior of the human brain. In this paper, a Genetic Sparse Distributed Memory (GSDM) model that combines SDM with genetic algorithms is proposed. The proposed GSDM model not only maintains the advantages of both SDM and genetic algorithms, but also has higher memory utilization to improve the recognition rate. Its effective performance is also verified by application to Optical Character Recognition (OCR). Experimental results reveal the feasibility and validity of the proposed model.  相似文献   

19.
There are two standard approaches to the classification task: generative, which use training data to estimate a probability model for each class, and discriminative, which try to construct flexible decision boundaries between the classes. An ideal classifier should combine these two approaches. In this paper a classifier combining the well-known support vector machine (SVM) classifier with regularized discriminant analysis (RDA) classifier is presented. The hybrid classifier is used for protein structure prediction which is one of the most important goals pursued by bioinformatics. The obtained results are promising, the hybrid classifier achieves better result than the SVM or RDA classifiers alone. The proposed method achieves higher recognition ratio than other methods described in the literature.  相似文献   

20.
The well-known Faà di Bruno formula for higher derivatives of a composite function plays an important role in combinatorics. In this paper we obtain a unified approach to some recurrence sequences for the complete Bell polynomials by using Faà di Bruno’s formula. Furthermore, we obtain an inverse relation of Lah numbers of two types, and by using this relation we obtain some new and interesting combinatorial identities.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号