Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence最新文献

筛选
英文 中文
Layout Analysis of Tibetan Historical Documents Based on Deep Learning 基于深度学习的藏文历史文献布局分析
Yong Cuo, N. Tashi, Zhengzhen Liu, Qiuhua Wei, Luosang Gadeng, Gama Trashi
{"title":"Layout Analysis of Tibetan Historical Documents Based on Deep Learning","authors":"Yong Cuo, N. Tashi, Zhengzhen Liu, Qiuhua Wei, Luosang Gadeng, Gama Trashi","doi":"10.1145/3357777.3357790","DOIUrl":"https://doi.org/10.1145/3357777.3357790","url":null,"abstract":"Tibetan historical document are vast, second in quantity only to Chinese historical document in China, and they are considered a treasure of Chinese culture. The digital protection and utilization of Tibetan literature resources is a hot topic in the field of literature digitization. Layout analysis is an important basic step in the digitization of historical document. Tibetan historical document have a complex layout, a variety of graphic and text forms, and diverse backgrounds, all of which have an impact on the layout analysis. We design a method combining deep learning text line detection with rule-based layout analysis to realize layout analysis of Tibetan historical document. This method first conducts text detection through deep learning, then constructs text lines, and finally segments horizontal text regions and vertical text regions by rule analysis to realize the segmentation of the layout. Our self-built datasets with rich sample types show that the proposed method can achieve detection of a variety of layouts with high accuracy and provide reliable text regions for subsequent text recognition, thus offering strong application value.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Adversarial Samples with Convolutional Neural Network 用卷积神经网络生成对抗样本
Zhongxi Qiu, Xiaofeng He, Lingna Chen, Hualing Liu, LianPeng Zuo
{"title":"Generating Adversarial Samples with Convolutional Neural Network","authors":"Zhongxi Qiu, Xiaofeng He, Lingna Chen, Hualing Liu, LianPeng Zuo","doi":"10.1145/3357777.3357791","DOIUrl":"https://doi.org/10.1145/3357777.3357791","url":null,"abstract":"Deep learning has become a hot research direction in the field of computer vision, and has been widely applied in the fields of intelligent transportation, intelligent security and so on. Because deep learning is vulnerable to adversarial samples, therefore poses a great threat to some safety-sensitive applications such as autonomous driving. In order to study the application of convolutional neural networks in adversarial sample generation and to lay the foundation for future research adversarial sample characteristics, we propose a convolutional neural network for generating adversarial samples, which can successfully fool the deep learning model.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Privacy Preserving Proxy re-encryption Scheme for IoT Security using Near-ring 基于近环的物联网安全隐私保护代理重加密方案
S. Krishnamoorthy, V. Muthukumaran, J. Yu, B. Balamurugan
{"title":"A Secure Privacy Preserving Proxy re-encryption Scheme for IoT Security using Near-ring","authors":"S. Krishnamoorthy, V. Muthukumaran, J. Yu, B. Balamurugan","doi":"10.1145/3357777.3359011","DOIUrl":"https://doi.org/10.1145/3357777.3359011","url":null,"abstract":"In current years, Internet of Things (IoT) has attained tremendous growth which includes all the aspects of private and public sectors. The resource constrained nature of IoT devices enables the IoT devices to store and access their sensitive data across the cloud computing platforms. The outsourced data do not only include users personal information's but also contain various information's such as sensor data, device data and several other confidential information's. Thus, the property of security remains to be the major concern across IoT based cloud system. In this article, we describe a secure privacy preserving proxy re- encryption scheme for IoT security using near-ring. The proposed approach solves DLP based factor problem using near-ring. It is observed from the security analysis that the proposed approach is highly secure with lesser computational overheads","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mining the Relationship between Crimes, Weather and Tweets 挖掘犯罪、天气和推文之间的关系
Joseph Alamo, C. Fortes, Nicole Occhiogrosso, Ching-Yu Huang
{"title":"Mining the Relationship between Crimes, Weather and Tweets","authors":"Joseph Alamo, C. Fortes, Nicole Occhiogrosso, Ching-Yu Huang","doi":"10.1145/3357777.3357787","DOIUrl":"https://doi.org/10.1145/3357777.3357787","url":null,"abstract":"This research project attempts to correlate crime rates in Orlando, Florida to Orlando's weather and Twitter presence. The central dataset of interest details the crime incidents in Orlando, Florida as reported daily by the Orlando Police Department. This dataset gives the dates, categories (e.g. theft, aggravated assault, etc.), and latitude and longitude of each reported crime incident. Using a Twitter developer account, Tweets pertaining to crime are downloaded from the greater Orlando area. Tweets are filtered by the following indexed keywords: \"crime\", \"drugs\", \"narcotics\", \"weapons\", \"assault\", \"theft\", \"robbery\", \"murder\", and \"larceny.\" Additionally, Orlando's daily weather data is collected from the National Oceanic and Atmospheric Administration. Using measures of similarity, it is discovered that crime in Orlando is concentrated most closely near Orlando's downtown center. Using regression, moderate correlations are drawn between the rates of crime and the posting of crime-related Tweets. Lastly, chi-square tests are used to show the effect of weather on crime. High crime rates are associated with average daily temperatures above 60°F. Low crime rates are associated with days with precipitation.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusing of Medical Images and Reports in Diagnostics of Brain Diseases 脑疾病诊断中的医学图像融合与报告
A. Vatian, N. Gusarova, N. Dobrenko, Anton Klochkov, N. Nigmatullin, A. Lobantsev, A. Shalyto
{"title":"Fusing of Medical Images and Reports in Diagnostics of Brain Diseases","authors":"A. Vatian, N. Gusarova, N. Dobrenko, Anton Klochkov, N. Nigmatullin, A. Lobantsev, A. Shalyto","doi":"10.1145/3357777.3357793","DOIUrl":"https://doi.org/10.1145/3357777.3357793","url":null,"abstract":"The combination of MRI images with textual clinical records, has a great potential since the former contains a raw information about study area of the human body, and the latter contains a human integral assessment of the image performed by doctor. In other words, there is a problem of including integral information received from clinicians in medical image processing at the feature fusion level. On the example of the multiple sclerosis diagnosis we study the methods of training deep neural networks to answer the following questions: is it possible to improve the quality of diagnosis of multiple sclerosis by fusing information obtained from a series of MRI images and from texts of medical reports corresponding to these images; what advantages gives an early or a late fusion method respectively in solving this problem? We proposed the end-to-end architecture of the neural network, which, using the \"early\" information fusion, determines the presence of multiple sclerosis of a patient with a network trust level (accuracy) of 87.5%, compared to the 60% trust level obtained on the same dataset using only MRI images, i.e. without fusion of textual conclusions of radiologists.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Technology Road Mapping of Two Machine Learning Methods for Triaging Emergency Department Patients in Australia 澳大利亚急诊科患者分诊的两种机器学习方法的技术路线图
S. Yan, Junyan Peng, H. Grain, Meng Yi
{"title":"Technology Road Mapping of Two Machine Learning Methods for Triaging Emergency Department Patients in Australia","authors":"S. Yan, Junyan Peng, H. Grain, Meng Yi","doi":"10.1145/3357777.3357779","DOIUrl":"https://doi.org/10.1145/3357777.3357779","url":null,"abstract":"Triaging is the categorization of patients attending the emergency departments (ED) into categories based on the patient's condition at arrival. In Australia, triage is a manual process, not guaranteed consistent and potentially error-prone. The problem with the manual process is that assigning incorrect triage categories to patients can result in delay of treatment for some patients. With the establishment of the Australian national health record system (MyHealth) and clinical data sharing standards such as HL7, it is possible to use patient history information as well as data about the patients' conditions at arrival in ED to quickly and accurately assign a triage category. The wide availability and application of machine learning (ML) methods, including medical applications using such methods, make these methods a possible solution to this problem. Before implementation of ML algorithms in triage, it is essential to understand the multiple dimensions of potential outcomes of health-services, including changes of clinical behaviors and workflows, \"social-economical-technical\", and ethical and legal debates. This research uses Context-Content-Process (CCP), SWOT and \"Khoja--Durrani--Scott\" (KDS) frameworks to provide an initial review of a technical \"roadmap\" of the classification of patients attending emergency departments (ED) using different stages of Naïve Bayes (NB) and Neural Network (NN) machine learning (ML) methods. This is the first research looking at the potential to use ML methods to assist in triage of patients in the Australia context considering outcomes. This research could be used to evaluate automation of the triage process or to support the manual process. The research results suggest that it is necessary to understand these multiple outcomes before future implementations are actually conducted.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incorporating Singular Value Decomposition in User-based Collaborative Filtering Technique for a Movie Recommendation System: A Comparative Study 结合奇异值分解的基于用户的协同过滤技术在电影推荐系统中的比较研究
Vito Xituo Chen, T. Tang
{"title":"Incorporating Singular Value Decomposition in User-based Collaborative Filtering Technique for a Movie Recommendation System: A Comparative Study","authors":"Vito Xituo Chen, T. Tang","doi":"10.1145/3357777.3357782","DOIUrl":"https://doi.org/10.1145/3357777.3357782","url":null,"abstract":"User-based collaborative filtering (UCF) technique is typically used to build a recommendation system (RS). A wide variety of techniques, such as matrix factorization, cosine similarity and Pearson correlation, have been proposed to improve the performance of the UCF algorithm in order to build more intelligent RSs. In this paper, we first describe the traditional UCF algorithm as the baseline; then we apply various techniques including singular value decomposition (SVD), cosine similarity, and Pearson correlation to examine and compare the performance of a small- scale movie RS. Our preliminary experimental results show that the UCF which used SVD and Pearson correlation performs better than a traditional UCF.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Offline Signature Verification using Clustering Technique 基于聚类技术的离线签名验证
Varun Pandya
{"title":"Offline Signature Verification using Clustering Technique","authors":"Varun Pandya","doi":"10.1145/3357777.3357789","DOIUrl":"https://doi.org/10.1145/3357777.3357789","url":null,"abstract":"Signature verification is one of the most basic and heavily used biometric which finds its application in many fields in the day to day life. However, it is also very complex and difficult to correctly classify a signature as genuine or forged because of the discrepancies associated with a signature and due to the skill and precision with which a forgery of the genuine signature is done. The proposed method is based on extraction and analysis of the features of the handwritten signature from the scanned images using Agglomerative Hierarchical Clustering technique. After pre-processing of the images and formation of clusters, based upon the error threshold, which is calculated using the intra-cluster distances, the signatures are classified as either genuine or forged. The proposed method is reliable, quick and does not require large datasets since it is based on an unsupervised approach and has shown promising results while dealing with skilled forgeries.","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126321587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence 2019年模式识别与人工智能国际会议论文集
{"title":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","authors":"","doi":"10.1145/3357777","DOIUrl":"https://doi.org/10.1145/3357777","url":null,"abstract":"","PeriodicalId":127005,"journal":{"name":"Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信