Handwritten Nushu Character Recognition Based on Hidden Markov Model
|
|
|
- Norah Gaines
- 9 years ago
- Views:
Transcription
1 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY Handwrtten Nushu Character Recognton Based on Hdden Marov Model Jangng Wang Rongbo Zhu College of Coputer Scence South-Central nversty for Natonaltes Wuhan Chna Eal: [email protected] Abstract Ths paper proposes a statstcal-structural character learnng algorth based on hdden Marov odel for handwrtten Nushu character recognton. The stroe relatonshps of a Nushu character reflect ts structure whch can be statstcally represented by the hdden arov odel. Based on the pror nowledge of character structures we desgn an adaptve statstcalstructural character learnng algorth that accounts for the ost portant stroe relatonshps whch as to prove the recognton rate by adaptng selectng correct character to the current handwrtten character condton. We penalze the structurally satched stroe relatonshps usng the pror clue potentals and derve the lelhood clue potentals fro Gaussan xture odels. Theoretc analyss proves the convergence of the proposed algorth. The experental results show that the proposed ethod successfully detected and reflected the stroe relatonshps that seeed ntutvely portant. And the overall recognton rate s 93.7 percent whch confrs the effectveness of the proposed ethods. Index Ters character recognton statstcal-structural learnng algorth Nushu character hdden Marov odels I. INTRODCTION Nushu (feale scrpts) was derved fro suare Chnese characters and were varatons of the later []. Nushu was popular n the valley of the Xaoshu Rver n Jangyong County of Hunan Provnce and s stll used by soe senle woen nowadays. Researches show that Nushu had ore than 000 characters aong whch 80% were created based on Chnese characters and only 0% were conages wth unnown orgn. Its characters too the shape of rhobus and were hgher on the rght part and lower on the left part. They are slender and beautful loo le Jaguwen (scrpts on tortose shells and anal bones) at frst glance and retan uch falar trace of Chnese characters []. Nushu s coposed of very strange characters whch feature strange shapes a strange way of arng strange socal functons and hstory. Dfferent fro Chnese deographc characters Nushu characters are deographc characters that have a sngle syllable and ndcate ther sound. Manuscrpt receved January 009; revsed Feberary 5 009; accepted Feberary Correspondng author J. Wang E-al: [email protected] Nushu was the tool of cultural councaton for local countrysde woen especally ddle- and old-aged woen. It played ts unue socal functon and was bascally used to create woen's wors and record woen's songs. Nushu wors norally were wrtten on delcately ade anuscrpts fans handerchefs and peces of paper. Nushu has acadec value fro the perspectves of phlology lngustcs socology ethnography and hstory etc. Therefore t s reputed as a wonderful dscovery and a wonder n the hstory of Chnese characters by scholars hoe and abroad. A. Related Wor Snce ore than 80% Nushu characters were created based on Chnese characters the orgnal Nushu ateral was handwrtten. Therefore the research schee of handwrtten Nushu character recognton can adopt the schee of Chnese characters recognton whch s the ost coon way to. The Chnese character structure s herarchcal: any straght-lne stroes consttute ndependent radcals whch n turn consttute characters [3 4]. The statstcal recognzer extracts the nforaton of the character age nto a feature vector by a feature extracton process. The feature vector does not represent the pen-trajectores drectly. Generally the recognzer represents and analyzes the character age by one of the two nds of ethod the statstcal ethod and the structural ethod [5 6]. However t represents the property of the character age reflectng the character structure ndrectly. Wth such a representaton the statstcal recognzer odels and analyzes the character usng varous nds of statstcal ethodologes. Wu et al. [7] projected a two densonal (-D) character age along x and y drectons. The ey features for coarse classfcaton are the Fourer coeffcents of the projected profles. Tseng et al. [8] selected contour drecton and crossng count to be the features of ther coarse classfcaton ethod. Chang and Wang [9] nspred by Dr. W. Yun-Wu used the perpheral shape codng technue to preclassfy handwrtten Chnese characters. They used ten categores of stroe patterns to code the four corners of a character. However such systes focused only on the relatonshp between near or connected stroe pars. As the result they were dffcult to represent the relatonshp between the stroes far fro each other. Moreover they were not effectve to represent the relatonshp between ore than two stroes because the nterstroe feature s dffcult to defne for ore than 00 ACADEMY PBLISHER do:0.4304/jcp
2 664 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY 00 two stroes. Also they had a proble n cobnng the stroe atchng scores wth the atchng scores of the stroe relatonshps. They coputed the overall atchng score by sply accuulatng or ultplyng all stroe atchng scores and atchng scores of the stroe relatonshps. As the result the nforaton about the stroe relatonshp was duplcated because the atchng scores of ndvdual stroes also reflect soe nforaton about the stroe relatonshps. Structure approach has hgh tolerance to non-structure dstortons such as nose and wrtng style varatons. Snce Chnese characters are coposed of stroes fored by lne segents ost approaches use the geoetrcal and topologcal features of stroes as the recognton bass. In order to represent fner nforaton Lu et al. and Zhang and Xa categorzed the stroes nto several types such as horzontal vertcal slash bac-slash dot tc and hoo [0] []. The character odel was coposed of a set of odel stroes each of whch belongs to one of the predefned types. By assgnng dfferent attrbutes to each of the stroe types they represented the propertes of the stroe ore accurately. However the perforance of such systes heavly depends on the developer s nowledge because the character odels were not systeatcally traned but anually desgned. K and K represented the stroe by the dstrbutons of ts poston slope and length []. Such a statstcal odelng s ore systeatc than the prevous ethods. Although the character structure was anually specfed as was n the prevous ethods the poston and the shape of each stroe were statstcally odeled. Ther dstrbutons were estated fro tranng saples. The statstcal stroe odelng s desrable to tolerate wrtng varaton and ore robust than the heurstc-based ethod. Character recognton proceeds by fndng the best structural atch between the nput stroes and the stroe odels. Copared wth the statstcal ethod the structural ethod extracts feature ponts and lne segents fro character ages and represents ther spatal relatonshps by a relatonal graph n whch the node denotes the feature pont or lne segent and the edge between two nodes denotes ther relatonshps (for exaple constrant graph odel [0] attrbuted relatonal graph [] and herarchcal rando graph []). Despte the excellent descrptve ablty for fne detals of character structures there are two ajor probles yet to be solved. The frst s the stroe extracton proble because the stroes are often abguous and degraded how to extract the stable ones for odelng ther spatal relatonshps. Ths proble becoes uch ore dffcult f the thnnng preprocessng technues cause juncton-dstortons n character seletons [3]. The second proble les n that the structural ethod usually depends heavly on developer s heurstc nowledge [4 5] leadng to nether the rgorous atchng algorth nor the autoatc leanng schee fro tranng saples. B. Motvaton Chnese character as well as Nushu character recognton s adtted as a very dffcult proble n character recognton due to () very large character set () hgh coplexty of Chnese characters and (3) any slar character patterns. Snce both statstcal schee and structural schee have ther ert and deert. Therefore a hybrd statstcal-structural ethod s necessary for odelng character structures and recognzes characters. Our approach can be consdered to be a convergence between these two threads of research. However t proves the perforance on both sdes n ter of overall recognton rate. In ths paper we concentrate on the handwrtten Nushu character recognton proble where few research wors have done. A statstcal-structural character learnng algorth based on hdden Marov odel s proposed to recognze the handwrtten Nushu characters. The stroe relatonshps of a Nushu character reflect ts structure whch can be statstcally represented by the hdden arov odel. Based on the pror nowledge of character structures we desgn an adaptve statstcalstructural character learnng algorth that accounts for the ost portant stroe relatonshps whch as to prove the recognton rate by adaptng selectng correct character to the current handwrtten Nushu character condton. We penalze the structurally satched stroe relatonshps usng the pror clue potentals and derve the lelhood clue potentals fro Gaussan xture odels. The rest paper s organzed as follows. In secton II the proposed Nushu characters recognton schee s proposed n detal. Detaled experental results are shown n secton III. Fnally the concluson and future wor are gven n secton IV. II. PROPOSED ALGORITHM A. Statstcal-Structural Character Modelng In the proposed odelng ethod a character s represented by a set of odel stroes. The structure of the odel stroes s anually desgned. As shown n Fg. the odel stroe s coposed of a poly-lne connectng K feature ponts. In Handwrtten process a odel stroe s nstantated nto varous shapes of nput stroes and therefore the feature ponts are nstantated nto varous pxels of the nput stroes. In order to odel such a varaton the feature pont s represented by a dstrbuton of the pxels. Because each pxel s dentfed by ts poston and drecton the feature pont s represented by ther dstrbuton. Addtonally the drecton at the feature pont was also odeled to reflect ore nforaton. Fgure. Statstcal stroe odel of Nushu character. 00 ACADEMY PBLISHER
3 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY Denote the set of lns of Nushu character Q and let Q denote the cardnalty of the set Q. We defne the stroe crosspont as T event. We refer to N consecutve crossponts as n -graph. The specal case of sngle crossponts s referred to as ungraph. Two consecutve crossponts are referred to as dgraph n the lteratures and trgraph eans three consecutve crossponts etc. Gven a seuence of consecutve crossponts S = { s s s } where s the nuber of crosspont seuence we have n -graph wth the sze of n+. We defne the duraton of n -graph GD = { d d d N [ n + ]} as follows: d T T sn+ s = event event. The duratons of n -graph are used as seuence features for further analyss n our proposed odel. We ae a natural assupton that the n -graph wth duraton y P( y ) fors a Gaussan dstrbuton such that: ( yμ ) σ () P( y ) = e () πσ where μ s the ean value of the duraton y for n - graph and σ s the standard devaton. Snce behavoral characterstcs of the ndvduals could be nfluenced by any reasons the statstcal analyss ethod used by prevous wor can be vewed as the sae probablty was gven to the vald attepts of dgraph latences and duratons wthn the standard devatons of the ean duratons. By usng Gaussan odelng we can gve hgher probablty to the n -graph duratons of test saples that s ore close to the n -graph ean duratons of reference saples and lower probablty to the n - graph duraton that s far fro the ean of the n -graph for the reason that the ndvduals could be teporarly out of regular typng behavor and we can tae the rregular typng behavor wthout dscardng the possblty that the set of n -graph duratons provded by the correspondng ndvduals. Wth the ltaton that we are unable to collect all the typng crossponts of the ndvdual and calculate the exact paraeters of the eans and varances for each dstnct cobnaton of n -graph duratons. We have to deduce {( μ σ )} of n -graph duratons gve a crosspont seuence S by the ethod of axu lelhood estaton of the paraeters. Fortunately the axu lelhood estaton of the paraeters for Gaussan dstrbuton can copute the saple ean and saple varance as follows. = μ = = σ = d ( ) d( ) μ where s the nuber of n -graph appeared n S. In order to ne Nushu structural character the proposed HMM odels seuental data such as the seuence of the crossponts of Nushu characters and handwrtten character nforaton that we tae nto consderaton. The HMM we use to odel the structural character nforaton of crosspont and structural character seuence. HMMs are a odelng technue derved fro Marov odels whch are stochastc processes whose output s a seuence of states correspondng to soe physcal event. HMMs have the observaton as a probablstc functon of the states.e. the resultng odel s a doubly ebedded stochastc process wth an underlyngs to chastc that s not observable (t s hdden) but can only be observed through another set of stochastc processes that produce these ueue of observatons. Consderng that t s a statstcal graphcal odel where each crcle s a rando varable. nshaded crcles t represent are unnown (hdden) state varables we wsh to nfer and shaded crcles y t are observed state varables where t s a specfc pont n te. A s a state transton atrx holdng the probabltes of transtonng fro have: to j t t (3) (4) + where eans the -th state. So we j P( = t = t ) = + A j. (5) η s a state esson atrx holdng the output probablty P( yt t = ) of -th state. π s the ntal state probablty of -th state. A copact notaton λ = ( A ηπ ) s used to ndcate the coplete paraeter set of the odel. In our settng gven a crosspont seuence S n - graph G [ n + ]-graph G ' such that: S = { s s s } N. (6) G = { g g g n + } (7) G' = { g g g } (8) ' ' ' n The state transton atrx A s the probablty of the freuency that the [ n + ]-graph appeared n the as follows: 00 ACADEMY PBLISHER
4 666 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY 00 A = g n (9) ' g /( ). t gt+ t The state esson atrx η here s defned as the Gaussan dstrbuton probablty of the n -graph G = { g g g n + } wth duraton GD = { d ( g ) d ( g ) d ( g )} as follow: n+ n+ ( d( g') μ ) σ g Pd ( ( g') g) = e g= g' ηg ( d( g')) = πσg 0 otherwse (0) There are three basc probles to solve wth the HMM λ = ( A ηπ ): ). Gven a odel paraeters λ = ( A ηπ ) and observaton output seuence O = OO Ot copute the probablty PO ( λ ) of the observaton output seuence. ) Gven a odel paraeters λ = ( A ηπ ) and observaton output seuence O = OO Ot fnd the ost probable state seuence Q = QQ Qt whch could have generated the observaton output seuence. 3) Gven an observaton output seuence O = OO Ot generate a HMM λ = ( A ηπ ) to axze the PO ( λ ). We ae the assupton that each ndvdual has hs/her own HMM wth λ = ( A ηπ ) for characters crosspont and character structural characterstcs. The proble to solve s that gven a crosspont seuence and ts character structural characterstcs nforaton we have to choose one fro the nuber of HMMs whch has the hghest probablty to generate the crosspont seuence S. Conseuently frst we have to calculate the probablty of crosspont seuence S for each HMM. Ths s slar to the frst basc proble to solve wth HMM as descrbed above and we wll show how to solve the proble wth Forward algorth. The state probabltes α s of each state can be coputed by frst calculatng α for all states at t = : α ( g ) = π( g ) η ( d ). () g Then for each te step t = the state probablty α s calculated recursvely for each state: α ( g ) = α ( g ) A η ( d ). () t+ t+ t t gt gt+ gt+ t+ Fnally the probablty of crosspont seuence S gven a HMM λ = ( A ηπ ) s as follows: P( SGGD λ) = α( g) = α ( g ) Ag ( ). g η g d (3) The esson probabltes tae less coputaton to obtan snce we use the Gaussan dstrbuton to odel observed states. Addtonally the observed states are only connected to the correspondng unnown states because we now the exact cobnaton of n -graph the ndvdual typed. So the suaton of all partal probablty of the state at te s gnored and only one probablty s calculated. In orgnal verson of the Forward algorth the coputaton nvolved n the calculaton of α t ( j) t [ T] j [ N] where T s the nuber of observatons n the seuence and s the nuber of states n the odel reures O( N T) calculatons. In our odfed verson of the Forward algorth we can see that t only reures ONT ( ) calculatons. B. Structural Learnng In the character buldng and extracton odule frst we have to buld the reference character for each Nushu character. It reures the user to provde the reference saples or handwrtten profle. The ore uantty of reference saples or hstores provded the ore exact paraeters can be extracted. After collectng suffcent nuber of reference saples we use the axu lelhood estaton for Gaussan odelng to calculate the paraeters of each n -graph duraton. We also have to copute the transton probablty atrx and ntal probablty vector wth respect to HMM. Then the paraeters calculated for HMM are treated as the base eleent of the reference profle for each user. The feature buldng and extracton odule extracts two observaton seuences based on a sldng-wndow approach. One observaton seuence s extracted n the horzontal drecton representng colun observatons and the other one s extracted n the vertcal drecton representng row observatons. Each dscrete observaton represents a ultdensonal feature vector whch s apped by eans of vector uantzaton (VQ). The ultdensonal feature vector cobnes both foreground and bacground nforaton. The foreground features represents local nforaton about the wrtng observed fro bacground foreground transtons. The other two features represent a global pont of vew about the wrtng n the frae fro whch they are extracted. The bacground features are based on a confguraton chan code representng concavty nforaton. The learnng algorth ncludes three steps: settng up Nushu prototypes ntalzng Nushu paraeters and the HMM paraeter estaton. Frst we set up Nushu prototypes for each category of characters usng the observaton fro a well-segented standard character where the nuber of stes I of standard characters euals the nuber of labels J of the Nushu for each category. The proposed adaptve learnng algorth antans a control probablty vector to select an accurate character 00 ACADEMY PBLISHER
5 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY aong a set of characters at te. A good polcy to update the probablty vector s a pursut algorth that always rewards the acton wth the current nu penalty estate and that stochastc learnng control perfors well n speed of convergence. In ths syste the probablty vector s the rate selecton probablty vector pn ( ) = [ p... pk ] where n s the ndex of the seuence of structural characters. The error of the nth handwrtten character durng s expressed by γ. The set of characters avalable are { R : =... K}. At begnnng the pn ( ) are assgned eual values: p(0) = [/ K.../ K ]. (4) In order to axze the lelhood the recognton algorth s reured to fnd the ndex of the best character. Such an approach reures the nowledge of handwrtten state durng each recognton. The stochastc learnng algorth presented n ths paper randoly selects a character. The character selecton probablty vector s altered by an teratve updatng process whch axzes the probablty of axzng the character recognton rate. Then the character recognton proceeds wth the fxed pn ( ) untl every character s selected at least M nuber of tes after whch pn ( ) s augented at each n. Followng each recognton perod an update of Sn ( ) and pn ( ) are carred out consderng the last M recognton sgnals of each recognton perod. Then we can get: R Sn ( ) = I( j) (5) L M j = L M + where I ( j ) s an ndcator functon: f Recognzaton s correct I ( j) = (6) 0 else L ( n ) s the nuber of recognton perods for whch the character structural R s selected durng the nth recognton perod. The structural learnng algorth can be suarzed as follows: Step. If t s the frst recognton perod ntalze the probablty vector as n euaton (4). Else selects a character structural R ( [ K] ) accordng to probablty dstrbuton p. Step. pdate I ( j ) and L ( n ). Then update Sn ( ) accordng to (5). Step 3. If for all L M for all go to next step else go to step. Step 4. Detect the ndex of the estated best character structure and update accordng to the followng euatons: where p Δp K p ( n+ ) = p ( n+ ) = j= j Δ p s a tunable penalty probablty paraeter. (7) The structural learnng algorth fnds the ndex of the estated best character R axzng the lelhood S at te n : L = arg ax{ R I ( )} (8) = L M+ For the probablty of ang the rght decson let the best recognton rate at te n R ( n ) be unue. Let φ ( n ) be the probablty that the estated best recognton rate s the actual best rate. Then we can get: R () n φ () n = Pr{ I() < I () ()} (9) L() n L() n = L() n M+ R = L() n M+ n The above probablty s readly obtaned by usng bnoal probablty dstrbuton. L Snce M I ( ) 0 for all [ K] when = L M+ L L I ( ) > I ( ) = L M+ = L M+ R L I R = L M+ ( ) ay exceed M. Let s tae nto account the fact that L L R I( ) < I( ) n such cases. R = L M+ = L M+ Let ε be the largest nonnegatve nteger less than α ( R/ R ) where α s a nonnegatve nteger. Defne the ndcator functon O() whch value s when condton wthn parentheses s satsfed else s 0. Defne the paraeter θ for [ K] : θ = ε O( ε M) + M O( ε > M) (0) Then we have: M L() n K θ L() n α= = L M+ = β= 0 = L M+ φ = [Pr{ I ( ) = α} Pr{ I( ) = α}] Consderng that: We can get: () θ = M ε M () M θ M α Mα M β φ = Q( Q) Q ( Q) α= α β= 0 β Mβ (3) 00 ACADEMY PBLISHER
6 668 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY 00 where Q s the probablty of successful recognton of a Nushu character usng the structural. Snce the an objectve n the wor was to speed up the learnng process the proposed structural learnng algorth wors by dvdng an off-lne tranng database nto saller blocs. Each teraton of the algorth processes a dfferent bloc of data. Thus gven an ntal HMM and the bloc data drawn fro the tranng set ths algorth wors accordng to the algorth. HMMs are able to perfor recognton tass n pattern recognton systes. The ost popular approach for such tass conssts of creatng a set of HMMs so that each class s represented by an ndependent HMM. The classfcaton of an unnown observaton seuence S = { s s s } nto a class can be carred out by coputng whch HMM outputs the hghest lelhood related to O. In detal consder a class proble n whch each class s represented by a sngle HMM. The lelhood can be easly coputed by the forward bacward procedure. C. Adjustng and Recognton R two probablty value PSGGD ( λ ) and PSGV ( λ ). PSGGD ( λ ) can be vewed as the possblty f all the n -graphs duratons n G are devatng ε tes of duraton σ fro duraton μ. PSGV ( λ ) s the threshold value of probablty used to decde that the acceptance of the crosspont seuence S s confred f followng expresson s true. PSGGD ( λ ) PSGV ( λ ). (5) The weghtng factor ε can be specfed wth respect to dfferent level of securty strength. In the Identfcaton procedure gven a crosspont seuence S = { s s s } fro the ndvdual and a set of HMMs λ ' s = { λ λ λl } where l s the nuber of HMM. The proble s to choose the best one fro λ s whch ost probably generated S or there s no such one exsted. In the begnnng the crosspont seuence s transfored to n -graph cobnatons G = { g g g n + } and the tng nforaton of n - graph duraton GD = { d d d n + } s calculated. PSGGD ( λ ) for each HMM n λ s s produced by the proposed forward algorth. We select user wth the axu probablty over others such as: PSGGD ( λ ) = ax( PSGGD ( λ )) j [ l]. (6) j After that we produce a vector for user such that V V = { μ εσ μ εσ μ εσ } (7) g g g g g n+ g n+ Fgure. Nushu character adjustng and recognton. In the adjustng odule gven a crosspont seuence S wth claed dentty we wsh to exane the possblty that S generated by. Frst we transfor the crosspont seuence S to n -graph cobnatons G and calculate the character structural nforaton of n - graph duraton as usual. At ths oent we have S = { s s s } G = { g g g n + } and GD = { d d d n + }. Now we produce a vector V such that: V = { μ εσ μ εσ μ εσ } (4) g g g g g n+ g n+ where ε s the weghtng factor μ g s s duraton ean of n -graph g and σ g s s duraton standard devaton of n -graph. V s the n -graph duraton vector to evaluate the threshold value of the probablty produced by the proposed odfed forward algorth. Wth the nputs GD V and λ we can apply the proposed forward algorth entoned above to obtan where ε s the weghtng factor μ g s s duraton ean of n -graph g and σ g s s duraton standard devaton of n -graph. Agan we apply the proposed forward algorth entoned above to obtan two probablty value PS ( GGD λ ) and PSGV ( λ ). If the expresson P( S GGD λ) PSGV ( λ) the crosspont seuence generated by user s confred. Otherwse we consder the crosspont seuence s not generated by any user n the user profle database. III. EXPERIMENTAL RESLTS We evaluated the proposed algorth on the Nushu database whch has 783 classes wth 00 saples for each class. Fg. 3 shows soe typcal saples n the Nushu database. Fgure 3. Saples n Nushu database. 00 ACADEMY PBLISHER
7 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY We used a Matlab pleentaton on a PC wth.4 GHz CP and GB of eory. The average te on preprocessng s 0.00 seconds and the stroe extracton (0.03 seconds) and the learnng algorth (0.0 seconds) consue a total of 0.04 seconds n the connected neghborhood syste per character age. Although the structural atch wth one character odel s effcent reurng less than a second n our pleentaton practcally we have to repeat the structural atch wth all categores of character odels such as 783 categores n Nushu database to recognze one nput character age. Recognton rate (%) SCSM MBSEM Proposed schee Tranng saples Fgure 5. Recognton rate of dfferent schee. Fgure 4. The stroe extracton and structural atchng result of the proposed algorth. When the nuber of categores ncreases the total te cost to recognze one character age ncreases. Currently there are two coonly adopted strateges to expedte the recognton process. The frst sultaneously uses several coputers to perfor the structural atch wth all the character odels n parallel. The second s the herarchcal classfcaton syste that uses a fast algorth to select a few canddate character odels and then perfors the structural atch between the nput stroes and these odels to deterne the best one. Fg. 4 shows the proposed stroe extracton and the structural atchng results. The frst colun shows the nput character. The second colun shows the slant and oent noralzaton of the character seleton. The thrd colun shows the proposed character odels where the labels are nubered and the adjustng and recognton functons are perfored. The structural learnng algorth assgns the best labels to the extracted canddate stroes. We copared our ethod wth the SCSM [3] and the attrbuted relatonal graph MBSEM [0]. The recognton rate of dfferent schee s shown n Fg. 5. The SCSM used the frst 000 odd nuber of saples of each category for tranng and the frst 000 saples of even nuber of saples for test on Nushu database. By handlng degraded regon the baselne recognton rate was percent. For MBSEM the recognton rate vares wth the tranng saples ncreasng. The reason s that MBSEM can not recognze the handwrtten Nushu characters although tranng saple ncreases. For the proposed schee the recognton rate ncreases wth the tranng saples ncreasng whch proves the proposed character structural learnng algorth can ncrease the recognton rate. It s clear that the recognton rate of the proposed schee s 3.7% and 4.9% hgher than those of SCSM and MBSEM respectvely. The reason s that the proposed schee not only taes the character structures but statstcal-structural character nto consderatons and the adaptve character structure learnng algorth guarantee the recognton rate. The HMM-based statstcal-structural character odelng also truly depcts the Nushu character structure. IV. CONCLSION AND FTRE WORK A statstcal-structural character learnng algorth based on hdden Marov odel s proposed to recognze the handwrtten Nushu characters. The approach s a convergence between statstcal and structural threads of research. However t proves the perforance on both sdes n ter of overall recognton rate greatly. The stroe relatonshps of a Nushu character reflect ts structure whch can be statstcally represented by the hdden arov odel. Based on the pror nowledge of character structures an adaptve statstcal-structural character learnng algorth accounts for the ost portant stroe relatonshps whch as to prove the recognton rate by adaptng selectng correct character to the current handwrtten Nushu character condton. The experental results and the coparsons wth other ethods show that the proposed ethod successfully detected and reflected the stroe relatonshps that seeed ntutvely portant. And the overall recognton rate s 93.7 percent whch s obvously hgher than those of other schees. As a future research challenge we wll nvestgate how to decrease the use of the external nowledge for the proposed algorth. For exaple the use of a -fold cross-valdaton would be useful to deterne the nuber of teratons to tran each bloc of data Furtherore topology learnng could be eployed to deterne the best HMM topology. 00 ACADEMY PBLISHER
8 670 JORNAL OF COMPTERS VOL. 5 NO. 5 MAY 00 ACKNOWLEDGMENT Ths wor s supported by the Natural Scence Foundaton of Chna (No ) the Natural Scence Foundaton of State Ethnc Affars Cosson (No. 08ZN0). The authors are grateful for the anonyous revewers who ade constructve coents. REFERENCES [] Z.-B. GONG New Fndngs about Feale Scrpts Journal of South-Central nversty for Natonaltes Vol. 3 No. 4 pp [] Z.-B. GONG Nushu n Jangyong Is absolutely Not Ancent Characters durng pre-qn Day Journal of South- Central nversty for Natonaltes Vol. No. 6 pp [3] I.-J. K J.-H. K Statstcal character structure odelng and ts applcaton to handwrtten Chnese character recognton IEEE Transactons on Pattern Analyss and Machne Intellgence Vol. 5 Is. pp [4] R. M. Suresh S. Aruuga Fuzzy technue based recognton of handwrtten characters Iage and Vson Coputng v 5 n pp [5] R. Zhang X. Dng H. L. Lu Dscrnatve tranng based uadratc classfer for handwrtten character recognton Internatonal Journal of Pattern Recognton and Artfcal Intellgence v n 6 pp [6] M. F. Zafar O. Dzulfl Wrter ndependent onlne handwrtten character recognton usng a sple approach Inforaton Technology Journal v 5 n 3 pp [7] W. W. Ln Recognton of handwrtten Chnese characters by feature atchng n Proc. 99 Int. Conf. Coputer Processng of Chnese and Orental Languages 99 pp [8] Y. L. Wu T. M. Wu and B. S. Jeng Optcal Chnese character recognton usng a projecton profle and the Fourer transforaton J. Telecoun. Lab. Technue vol. 0 pp [9] H. D. Chang and J. F. Wang Preclassfcaton for handwrtten Chnese character recognton by a perpheral shape codng ethod Pattern Recognton. vol. 6 pp [0] C.L. Lu I.J. K and J.H. K Model-Based Stroe Extracton and Matchng by Heurstc Search for Handwrtten Chnese Character Recognton Proc. Sxth Int l Worshop Fronters n Handwrtten Recognton pp [] X. Zhang and Y. Xa The Autoatc Recognton of Handprnted Chnese Characters A Method of Extractng an Order Seuence of Stroes Pattern Recognton Letters vol. no. 4 pp [] H.Y. K and J.H. K Herarchcal Rando Graph Representaton of Handwrtten Characters and Its Applcaton to Hangul Recognton Pattern Recognton vol. 34 no. pp [3] I.-J. K and J.-H. K Statstcal Character Structure Modelng and Its Applcaton to Handwrtten Chnese Character Recognton IEEE Trans. Pattern Analyss and Machne Intellgence vol. 5 no. pp Nov [4] M. Asela J. Laasonen Adaptve cobnaton of adaptve classfers for handwrtten character recognton Pattern Recognton Letters v 8 n pp [5] P. M. Patl T. R. Sontae Rotaton scale and translaton nvarant handwrtten Devanagar nueral character recognton usng general fuzzy neural networ Pattern Recognton v 40 n 7 pp Jangng Wang receved the B.S. and M.S. degrees n Artfcal Intellgence fro Wuhan nversty Chna n 986 and 986 respectvely; and Ph.D. degree n ntellgent coputaton fro Wuhan nversty Chna n 007. She was a vstng professor of nversty of Wsconsn-La Crosse and Chonbu Natonal nversty. She s currently a Professor n College of Coputer Scence of South-Central nversty for Natonaltes. She has publshed over 40 papers n nternatonal journals and conferences n the areas of artfcal ntellgence and ntellgent coputaton. Her current research nterests are n the areas of character recognton ntellgent coputaton and optzaton. The research actvtes have been supported by the Natural Scence Foundaton of Chna Natural Scence Foundaton of State Ethnc Affars Cosson and Natural Scence Foundaton of Hube provnce. Dr Wang has been actvely nvolved n around 0 nternatonal conferences servng as Sesson Char and a revewer for nuerous referred journals and any nternatonal conferences. Rongbo Zhu receved the B.S. and M.S. degrees n Electronc and Inforaton Engneerng fro Wuhan nversty of Technology Chna n 000 and 003 respectvely; and Ph.D. degree n councaton and nforaton systes fro Shangha Jao Tong nversty Chna n 006. He s currently an Assocate Professor n College of Coputer Scence of South-Central nversty for Natonaltes. He has publshed over 40 papers n nternatonal journals and conferences n the areas of wreless councatons coverng 3G oble systes and beyond MAC and routng protocols and wreless ad hoc sensor and esh networs. He receved the Outstandng B. S. Thess and M. S. Thess awards fro Wuhan nversty of Technology n 000 and 003 respectvely. Hs current research nterests are n the areas of wreless councatons protocol desgn and optzaton. The research actvtes have been supported by the Natural Scence Foundaton of Hube provnce and Natural Scence Foundaton of South-Central nversty for Natonaltes. Dr Zhu has been actvely nvolved n around 0 nternatonal conferences servng as Sesson Char of the Intellgent Networs Trac at LSMS 07 and as a revewer for nuerous referred journals such as IEEE Councaton Letters Wley Wreless Councatons and Moble Coputng and any nternatonal conferences such as IEEE Globeco 08 IEEE ICC 07 IET CCWMSN 07 ISICA 07 and so on. 00 ACADEMY PBLISHER
Least Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
Two-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
How Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t
Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set
A Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna [email protected]
An Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
An Approach For: Improving Voice Command processor Based On Better Features and Classifiers Selection
An Approach For: Iprovng Voce Coand processor Based On Better Features and Classfers Selecton Mohaed FEZARI 1, Al Al-Dhoud 1.Laboratory of Autoatc and Sgnals, Annaba, BP.1, Annaba, 3, ALGERIA. Faculty
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected];
A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Basic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications
CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
Statistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION
Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,
Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Conversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, [email protected] Zhyng
How To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
Virtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Research Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
PERRON FROBENIUS THEOREM
PERRON FROBENIUS THEOREM R. CLARK ROBINSON Defnton. A n n matrx M wth real entres m, s called a stochastc matrx provded () all the entres m satsfy 0 m, () each of the columns sum to one, m = for all, ()
An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System
201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng
Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
Tourism Demand Forecasting by Improved SVR Model
Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
where the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
Portfolio Loss Distribution
Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment
THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *
Internatonal Journal of Computatonal Scence 992-6669 (Prnt) 992-6677 (Onlne) Global Informaton Publsher 27, Vol., No., 27-39 A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano,
A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht [email protected] 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
Damage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the
Performance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter
2066 JOURL OF COMPUTERS, VOL. 9, O. 9, SEPTEMBER 204 GPS Recever utonoous Integrt Montorng lgorth Based on Iproved Partcle Flter Ershen Wang School of Electronc and Inforaton Engneerng, Shenang erospace
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
The Packing Server for Real-Time Scheduling of MapReduce Workflows
The Packng Server for Real-Te Schedulng of MapReduce Workflows Shen L, Shaohan Hu, Tarek Abdelzaher Unversty of Illnos at Urbana-Chapagn {shenl3, shu7, zaher}@llnos.edu Abstract Ths paper develops new
21 Vectors: The Cross Product & Torque
21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Ring structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
Research of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
