• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 259
  • 49
  • 17
  • 13
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • 9
  • 6
  • 4
  • 4
  • 3
  • Tagged with
  • 470
  • 470
  • 91
  • 82
  • 68
  • 50
  • 48
  • 45
  • 39
  • 37
  • 35
  • 35
  • 31
  • 30
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Fuzzy approaches to speech and peaker recognition

Tran, Dat Tat, n/a January 2000 (has links)
Stastical pattern recognition is the most successful approach to automatic speech and speaker recognition (ASASR). Of all the statistical pattern recognition techniques, the hidden Markov model (HMM) is the most important. The Gaussian mixture model (GMM) and vector quantisation (VQ) are also effective techniques, especially for speaker recognition and in conjunction with HMMs. for speech recognition. However, the performance of these techniques degrades rapidly in the context of insufficient training data and in the presence of noise or distortion. Fuzzy approaches with their adjustable parameters can reduce such degradation. Fuzzy set theory is one of the most, successful approaches in pattern recognition, where, based on the idea of a fuzzy membership function, fuzzy C'-means (FCM) clustering and noise clustering (NC) are the most, important techniques. To establish fuzzy approaches to ASASR, the following basic problems are solved. First, a time-dependent fuzzy membership function is defined for the HMM. Second, a general distance is proposed to obtain a relationship between modelling and clustering techniques. Third, fuzzy entropy (FE) clustering is proposed to relate fuzzy models to statistical models. Finally, fuzzy membership functions are proposed as discriminant functions in decison making. The following models are proposed: 1) the FE-HMM. NC-FE-HMM. FE-GMM. NC-FEGMM. FE-VQ and NC-FE-VQ in the FE approach. 2) the FCM-HMM. NC-FCM-HMM. FCM-GMM and NC-FCM-GMM in the FCM approach, and 3) the hard HMM and GMM as the special models of both FE and FCM approaches. Finally, a fuzzy approach to speaker verification and a further extension using possibility theory are also proposed. The evaluation experiments performed on the TI46, ANDOSL and YOHO corpora showbetter results for all of the proposed techniques in comparison with the non-fuzzy baseline techniques.
192

Distributed Random Set Theoretic Soft/Hard Data Fusion

Khaleghi, Bahador January 2012 (has links)
Research on multisensor data fusion aims at providing the enabling technology to combine information from several sources in order to form a unifi ed picture. The literature work on fusion of conventional data provided by non-human (hard) sensors is vast and well-established. In comparison to conventional fusion systems where input data are generated by calibrated electronic sensor systems with well-defi ned characteristics, research on soft data fusion considers combining human-based data expressed preferably in unconstrained natural language form. Fusion of soft and hard data is even more challenging, yet necessary in some applications, and has received little attention in the past. Due to being a rather new area of research, soft/hard data fusion is still in a edging stage with even its challenging problems yet to be adequately de fined and explored. This dissertation develops a framework to enable fusion of both soft and hard data with the Random Set (RS) theory as the underlying mathematical foundation. Random set theory is an emerging theory within the data fusion community that, due to its powerful representational and computational capabilities, is gaining more and more attention among the data fusion researchers. Motivated by the unique characteristics of the random set theory and the main challenge of soft/hard data fusion systems, i.e. the need for a unifying framework capable of processing both unconventional soft data and conventional hard data, this dissertation argues in favor of a random set theoretic approach as the first step towards realizing a soft/hard data fusion framework. Several challenging problems related to soft/hard fusion systems are addressed in the proposed framework. First, an extension of the well-known Kalman lter within random set theory, called Kalman evidential filter (KEF), is adopted as a common data processing framework for both soft and hard data. Second, a novel ontology (syntax+semantics) is developed to allow for modeling soft (human-generated) data assuming target tracking as the application. Third, as soft/hard data fusion is mostly aimed at large networks of information processing, a new approach is proposed to enable distributed estimation of soft, as well as hard data, addressing the scalability requirement of such fusion systems. Fourth, a method for modeling trust in the human agents is developed, which enables the fusion system to protect itself from erroneous/misleading soft data through discounting such data on-the-fly. Fifth, leveraging the recent developments in the RS theoretic data fusion literature a novel soft data association algorithm is developed and deployed to extend the proposed target tracking framework into multi-target tracking case. Finally, the multi-target tracking framework is complemented by introducing a distributed classi fication approach applicable to target classes described with soft human-generated data. In addition, this dissertation presents a novel data-centric taxonomy of data fusion methodologies. In particular, several categories of fusion algorithms have been identifi ed and discussed based on the data-related challenging aspect(s) addressed. It is intended to provide the reader with a generic and comprehensive view of the contemporary data fusion literature, which could also serve as a reference for data fusion practitioners by providing them with conducive design guidelines, in terms of algorithm choice, regarding the specifi c data-related challenges expected in a given application.
193

A characterization of homomorphisms between groupoids and the relationships existing among them

Grant, David Joseph 03 June 2011 (has links)
This thesis presents a partition of the class of homomorphisms between groupoids of n-tuples in a system g = (G,&,@), where G = { a,b,c,d,e }is a set of five elements such that: 1) a is the &-identity and annihilates all elements under @; 2) b is the @-identity; 3) d absorbs all all elements except e under & and all elements except a and e under @; 4) e absorbs all elements under & and all elements except a under @; 5) & is a binary operation on G and is commutative in G; 6) @ is a binary operation on G and is left-distributive over & in G.Matrices over g were examined for characteristics which would determine different atomic properties of homomorphisms. A matrix operation @ was defined, which allowed the homomorphisms of groupoids of the form, (G(n) , &), to be modeled by a matrix equation. Using the atomic proper ties, a partition of the class of homomorphisms between groupoids was developed, and an example of an element in each of its disjoint subsets was presented. A listing of theorems was also derived.Ball State UniversityMuncie, IN 47306
194

A Characterization of LYM and Rank Logarithmically Concave Partially Ordered Sets and Its Applications

Huang, Junbo January 2010 (has links)
The LYM property of a finite standard graded poset is one of the central notions in Sperner theory. It is known that the product of two finite standard graded posets satisfying the LYM properties may not have the LYM property again. In 1974, Harper proved that if two finite standard graded posets satisfying the LYM properties also satisfy rank logarithmic concavities, then their product also satisfies these two properties. However, Harper's proof is rather non-intuitive. Giving a natural proof of Harper's theorem is one of the goals of this thesis. The main new result of this thesis is a characterization of rank-finite standard graded LYM posets that satisfy rank logarithmic concavities. With this characterization theorem, we are able to give a new, natural proof of Harper's theorem. In fact, we prove a strengthened version of Harper's theorem by weakening the finiteness condition to the rank-finiteness condition. We present some interesting applications of the main characterization theorem. We also give a brief history of Sperner theory, and summarize all the ingredients we need for the main theorem and its applications, including a new equivalent condition for the LYM property that is a key for proving our main theorem.
195

A Characterization of LYM and Rank Logarithmically Concave Partially Ordered Sets and Its Applications

Huang, Junbo January 2010 (has links)
The LYM property of a finite standard graded poset is one of the central notions in Sperner theory. It is known that the product of two finite standard graded posets satisfying the LYM properties may not have the LYM property again. In 1974, Harper proved that if two finite standard graded posets satisfying the LYM properties also satisfy rank logarithmic concavities, then their product also satisfies these two properties. However, Harper's proof is rather non-intuitive. Giving a natural proof of Harper's theorem is one of the goals of this thesis. The main new result of this thesis is a characterization of rank-finite standard graded LYM posets that satisfy rank logarithmic concavities. With this characterization theorem, we are able to give a new, natural proof of Harper's theorem. In fact, we prove a strengthened version of Harper's theorem by weakening the finiteness condition to the rank-finiteness condition. We present some interesting applications of the main characterization theorem. We also give a brief history of Sperner theory, and summarize all the ingredients we need for the main theorem and its applications, including a new equivalent condition for the LYM property that is a key for proving our main theorem.
196

A Spam Filter Based on Reinforcement and Collaboration

Yang, Chih-Chin 07 August 2008 (has links)
Growing volume of spam mails have not only decreased the productivity of people but also become a security threat on the Internet. Mail servers should have abilities to filter out spam mails which change time by time precisely and manage increasing spam rules which generated by mail servers automatically and effectively. Most paper only focused on single aspect (especially for spam rule generation) to prevent spam mail. However, in real word, spam prevention is not just applying data mining algorithm for rule generation. To filter out spam mails correctly in a real world, there are still many issues should be considered in addition to spam rule generation. In this paper, we integrate three modules to form a complete anti-spam system, they are spam rule generation module, spam rule reinforcement module and spam rule exchange module. In this paper, rule-based data mining approach is used to generate exchangeable spam rules. The feedback of user¡¦s returns is reinforced spam rule. The distributing spam rules are exchanged through machine-readable XML format. The results of experiment draw the following conclusion: (1) The spam filter can filter out the Chinese mails by analyzing the header characteristics. (2) Rules exchanged among mail improve the spam recall and accuracy of mail servers. (3) Rules reinforced improve the effectiveness of spam rule.
197

Realizable closures for the ensemble averaged equations of large scale atmospheric flow

Sargent, Neil. January 1975 (has links)
No description available.
198

Badiou, political nihilism, and a small-scale solution

Vizeau, Brent Unknown Date
No description available.
199

A text editor based on relations /

Fayerman, Brenda. January 1984 (has links)
No description available.
200

On Mergelyan's theorem.

Borghi, Gerald. January 1973 (has links)
No description available.

Page generated in 0.0471 seconds