Spelling suggestions: "subject:"tet theory"" "subject:"beet theory""
191 |
Fuzzy approaches to speech and peaker recognitionTran, Dat Tat, n/a January 2000 (has links)
Stastical pattern recognition is the most successful approach to automatic speech and
speaker recognition (ASASR). Of all the statistical pattern recognition techniques, the hidden
Markov model (HMM) is the most important. The Gaussian mixture model (GMM)
and vector quantisation (VQ) are also effective techniques, especially for speaker recognition
and in conjunction with HMMs. for speech recognition.
However, the performance of these techniques degrades rapidly in the context of insufficient
training data and in the presence of noise or distortion. Fuzzy approaches with their
adjustable parameters can reduce such degradation.
Fuzzy set theory is one of the most, successful approaches in pattern recognition, where,
based on the idea of a fuzzy membership function, fuzzy C'-means (FCM) clustering and
noise clustering (NC) are the most, important techniques.
To establish fuzzy approaches to ASASR, the following basic problems are solved. First,
a time-dependent fuzzy membership function is defined for the HMM. Second, a general
distance is proposed to obtain a relationship between modelling and clustering techniques.
Third, fuzzy entropy (FE) clustering is proposed to relate fuzzy models to statistical models.
Finally, fuzzy membership functions are proposed as discriminant functions in decison
making.
The following models are proposed: 1) the FE-HMM. NC-FE-HMM. FE-GMM. NC-FEGMM.
FE-VQ and NC-FE-VQ in the FE approach. 2) the FCM-HMM. NC-FCM-HMM.
FCM-GMM and NC-FCM-GMM in the FCM approach, and 3) the hard HMM and GMM
as the special models of both FE and FCM approaches. Finally, a fuzzy approach to speaker
verification and a further extension using possibility theory are also proposed.
The evaluation experiments performed on the TI46, ANDOSL and YOHO corpora showbetter
results for all of the proposed techniques in comparison with the non-fuzzy baseline
techniques.
|
192 |
Distributed Random Set Theoretic Soft/Hard Data FusionKhaleghi, Bahador January 2012 (has links)
Research on multisensor data fusion aims at providing the enabling technology to combine
information from several sources in order to form a unifi ed picture. The literature
work on fusion of conventional data provided by non-human (hard) sensors is vast and
well-established. In comparison to conventional fusion systems where input data are generated
by calibrated electronic sensor systems with well-defi ned characteristics, research
on soft data fusion considers combining human-based data expressed preferably in unconstrained
natural language form. Fusion of soft and hard data is even more challenging, yet
necessary in some applications, and has received little attention in the past. Due to being
a rather new area of research, soft/hard data fusion is still in a
edging stage with even
its challenging problems yet to be adequately de fined and explored.
This dissertation develops a framework to enable fusion of both soft and hard data
with the Random Set (RS) theory as the underlying mathematical foundation. Random
set theory is an emerging theory within the data fusion community that, due to its powerful
representational and computational capabilities, is gaining more and more attention among
the data fusion researchers. Motivated by the unique characteristics of the random set
theory and the main challenge of soft/hard data fusion systems, i.e. the need for a unifying
framework capable of processing both unconventional soft data and conventional hard data,
this dissertation argues in favor of a random set theoretic approach as the first step towards
realizing a soft/hard data fusion framework.
Several challenging problems related to soft/hard fusion systems are addressed in the
proposed framework. First, an extension of the well-known Kalman lter within random
set theory, called Kalman evidential filter (KEF), is adopted as a common data processing
framework for both soft and hard data. Second, a novel ontology (syntax+semantics)
is developed to allow for modeling soft (human-generated) data assuming target tracking
as the application. Third, as soft/hard data fusion is mostly aimed at large networks of
information processing, a new approach is proposed to enable distributed estimation of
soft, as well as hard data, addressing the scalability requirement of such fusion systems.
Fourth, a method for modeling trust in the human agents is developed, which enables the
fusion system to protect itself from erroneous/misleading soft data through discounting
such data on-the-fly. Fifth, leveraging the recent developments in the RS theoretic data
fusion literature a novel soft data association algorithm is developed and deployed to extend
the proposed target tracking framework into multi-target tracking case. Finally, the
multi-target tracking framework is complemented by introducing a distributed classi fication
approach applicable to target classes described with soft human-generated data.
In addition, this dissertation presents a novel data-centric taxonomy of data fusion
methodologies. In particular, several categories of fusion algorithms have been identifi ed
and discussed based on the data-related challenging aspect(s) addressed. It is intended to
provide the reader with a generic and comprehensive view of the contemporary data fusion
literature, which could also serve as a reference for data fusion practitioners by providing
them with conducive design guidelines, in terms of algorithm choice, regarding the specifi c
data-related challenges expected in a given application.
|
193 |
A characterization of homomorphisms between groupoids and the relationships existing among themGrant, David Joseph 03 June 2011 (has links)
This thesis presents a partition of the class of homomorphisms between groupoids of n-tuples in a system g = (G,&,@), where G = { a,b,c,d,e }is a set of five elements such that: 1) a is the &-identity and annihilates all elements under @; 2) b is the @-identity; 3) d absorbs all all elements except e under & and all elements except a and e under @; 4) e absorbs all elements under & and all elements except a under @; 5) & is a binary operation on G and is commutative in G; 6) @ is a binary operation on G and is left-distributive over & in G.Matrices over g were examined for characteristics which would determine different atomic properties of homomorphisms. A matrix operation @ was defined, which allowed the homomorphisms of groupoids of the form, (G(n) , &), to be modeled by a matrix equation. Using the atomic proper ties, a partition of the class of homomorphisms between groupoids was developed, and an example of an element in each of its disjoint subsets was presented. A listing of theorems was also derived.Ball State UniversityMuncie, IN 47306
|
194 |
A Characterization of LYM and Rank Logarithmically Concave Partially Ordered Sets and Its ApplicationsHuang, Junbo January 2010 (has links)
The LYM property of a finite standard graded poset is one of the central notions in Sperner theory. It is known that the product of two finite standard graded posets satisfying the LYM properties may not have the LYM property again. In 1974, Harper proved that if two finite standard graded posets satisfying the LYM properties also satisfy rank logarithmic concavities, then their product also satisfies these two properties. However, Harper's proof is rather non-intuitive. Giving a natural proof of Harper's theorem is one of the goals of this thesis.
The main new result of this thesis is a characterization of rank-finite standard graded LYM posets that satisfy rank logarithmic concavities. With this characterization theorem, we are able to give a new, natural proof of Harper's theorem. In fact, we prove a strengthened version of Harper's theorem by weakening the finiteness condition to the rank-finiteness condition. We present some interesting applications of the main characterization theorem. We also give a brief history of Sperner theory, and summarize all the ingredients we need for the main theorem and its applications, including a new equivalent condition for the LYM property that is a key for proving our main theorem.
|
195 |
A Characterization of LYM and Rank Logarithmically Concave Partially Ordered Sets and Its ApplicationsHuang, Junbo January 2010 (has links)
The LYM property of a finite standard graded poset is one of the central notions in Sperner theory. It is known that the product of two finite standard graded posets satisfying the LYM properties may not have the LYM property again. In 1974, Harper proved that if two finite standard graded posets satisfying the LYM properties also satisfy rank logarithmic concavities, then their product also satisfies these two properties. However, Harper's proof is rather non-intuitive. Giving a natural proof of Harper's theorem is one of the goals of this thesis.
The main new result of this thesis is a characterization of rank-finite standard graded LYM posets that satisfy rank logarithmic concavities. With this characterization theorem, we are able to give a new, natural proof of Harper's theorem. In fact, we prove a strengthened version of Harper's theorem by weakening the finiteness condition to the rank-finiteness condition. We present some interesting applications of the main characterization theorem. We also give a brief history of Sperner theory, and summarize all the ingredients we need for the main theorem and its applications, including a new equivalent condition for the LYM property that is a key for proving our main theorem.
|
196 |
A Spam Filter Based on Reinforcement and CollaborationYang, Chih-Chin 07 August 2008 (has links)
Growing volume of spam mails have not only decreased the productivity of people but also become a security threat on the Internet. Mail servers should have abilities to filter out spam mails which change time by time precisely and manage increasing spam rules which generated by mail servers automatically and effectively. Most paper only focused on single aspect (especially for spam rule generation) to prevent spam mail. However, in real word, spam prevention is not just applying data mining algorithm for rule generation. To filter out spam mails correctly in a real world, there are still many issues should be considered in addition to spam rule generation.
In this paper, we integrate three modules to form a complete anti-spam system, they are spam rule generation module, spam rule reinforcement module and spam rule exchange module. In this paper, rule-based data mining approach is used to generate exchangeable spam rules. The feedback of user¡¦s returns is reinforced spam rule. The distributing spam rules are exchanged through machine-readable XML format. The results of experiment draw the following conclusion: (1) The spam filter can filter out the Chinese mails by analyzing the header characteristics. (2) Rules exchanged among mail improve the spam recall and accuracy of mail servers. (3) Rules reinforced improve the effectiveness of spam rule.
|
197 |
Realizable closures for the ensemble averaged equations of large scale atmospheric flowSargent, Neil. January 1975 (has links)
No description available.
|
198 |
Badiou, political nihilism, and a small-scale solutionVizeau, Brent Unknown Date
No description available.
|
199 |
A text editor based on relations /Fayerman, Brenda. January 1984 (has links)
No description available.
|
200 |
On Mergelyan's theorem.Borghi, Gerald. January 1973 (has links)
No description available.
|
Page generated in 0.0884 seconds