
Computer and Modernization ›› 2015, Vol. 0 ›› Issue (8): 121-126.doi: 10.3969/j.issn.1006-2475.2015.08.025
Received:2015-03-20
Online:2015-08-08
Published:2015-08-19
CLC Number:
ZHAO Chun-lan. A Simplex Coding Multi-class Boosting Optimizing Algorithm[J]. Computer and Modernization, 2015, 0(8): 121-126.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2015.08.025
| [1] Mroueh Y, Poggio T, Rosasco L, et al. Multiclass learning with simplex coding[C]// Proceedings of Annual Conference on Neural Information Processing Systems, 2012. 2012:2798-2806.
[2] Li Fei-fei, Fergus R, Perona P. Learning generative visual models from few training examples: An incremental Bayesian approach tested on 101 object categories [J]. Computer Vision and Image Understanding, 2007,106(1):59-70. [3] 罗磊. 形状分解和基于机器学习的图像检索技术研究[D]. 长沙:国防科学技术大学, 2013. [4] 王宇,林成德. 非局部二值模式人脸表示与识别方法[J]. 厦门大学学报(自然科学版), 2009,48(2):207-211. [5] Zhang Jianguo, Marszalek M, Lazebnik S, et al. Local features and kernels for classification of texture and object categories: A comprehensive study[J]. International Journal of Computer Vision, 2007,73(2):213-238. [6] Coifman R R, Lafon S. Diffusion maps[J]. Applied and Computational Harmonic Analysis, 2006,21(1):5-30. [7] 邓乃扬,田英杰. 数据挖掘中的新方法:支持向量机[M]. 北京:科学出版社, 2004. [8] Zhang Jing, Li Guili, He Seok-wun. Texture-based image retrieval by edge detection matching GLCM[C]// Proceedings of the 10th IEEE Intemational Conference on High Performance Computing and Communications. 2008:782-787. [9] Lazebnik S, Schmid C, Ponce J. Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories[C]// Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2006:2169-2178. [10]Frey B, Dueck D. Clustering bypassing messages between data points[J]. Science, 2007,315(5814):972-976. [11]张磊. 基于机器学习的图像检索若干问题研究[D]. 济南:山东大学, 2011. [12]Steinwart I. Sparseness of support vector machines[J]. The Journal of Machine Learning Research, 2003,4:1071-1105. [13]Zhu Feng, Zhang Xian-da, Hu Ya-feng. Gabor filter approach to joint feature extraction and target recgnition[J]. IEEE Transactions on Aerospace and Electronic Systems, 2009,45(1):17-30. [14]Opelt A, Fussenegger M, Pinz A, et al. Weak hypotheses and boosting for generic object detection and recognition[C]// Lecture Notes in Computer Science 2004. 2004, 3022:71-84. |
| [1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
| [2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
| [3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
| [4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
| [5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
| [6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
| [7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
| [8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
| [9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
| [10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
| [11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
| [12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
| [13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
| [14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
| [15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||