The 2013 International Joint Conference on Neural Networks (IJCNN)最新文献

筛选
英文 中文
Unsupervised collaborative boosting of clustering: An unifying framework for multi-view clustering, multiple consensus clusterings and alternative clustering 无监督协同提升聚类:多视图聚类、多共识聚类和替代聚类的统一框架
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-04 DOI: 10.1109/IJCNN.2013.6706911
Jacques-Henri Sublemontier
{"title":"Unsupervised collaborative boosting of clustering: An unifying framework for multi-view clustering, multiple consensus clusterings and alternative clustering","authors":"Jacques-Henri Sublemontier","doi":"10.1109/IJCNN.2013.6706911","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706911","url":null,"abstract":"In this paper, we propose a collaborative framework that is able to solve multi-view and alternative clustering problems using some clustering ensemble and semi-supervised clustering principles. We provide a mechanism to control, via an information sharing model, different clustering algorithms to obtain consensus or alternative clustering solutions. The strong point is that our approach does not need to know which clustering algorithms to use nor their parameters.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126220145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recurrent neural networks with fixed time convergence for linear and quadratic programming 线性和二次规划的固定时间收敛递归神经网络
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-04 DOI: 10.1109/IJCNN.2013.6706835
J. Sánchez‐Torres, E. Sánchez, A. Loukianov
{"title":"Recurrent neural networks with fixed time convergence for linear and quadratic programming","authors":"J. Sánchez‐Torres, E. Sánchez, A. Loukianov","doi":"10.1109/IJCNN.2013.6706835","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706835","url":null,"abstract":"In this paper, a new class of recurrent neural networks which solve linear and quadratic programs are presented. Their design is considered as a sliding mode control problem, where the network structure is based on the Karush-Kuhn-Tucker (KKT) optimality conditions with the KKT multipliers considered as control inputs to be implemented with fixed time stabilizing terms, instead of common used activation functions. Thus, the main feature of the proposed network is its fixed convergence time to the solution. That means, there is time independent to the initial conditions in which the network converges to the optimization solution. Simulations show the feasibility of the current approach.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Spike-based learning of transfer functions with the SpiNNaker neuromimetic simulator SpiNNaker神经模拟模拟器传递函数的基于spike的学习
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-04 DOI: 10.1109/IJCNN.2013.6706962
Sergio Davies, T. Stewart, C. Eliasmith, S. Furber
{"title":"Spike-based learning of transfer functions with the SpiNNaker neuromimetic simulator","authors":"Sergio Davies, T. Stewart, C. Eliasmith, S. Furber","doi":"10.1109/IJCNN.2013.6706962","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706962","url":null,"abstract":"Recent papers have shown the possibility to implement large scale neural network models that perform complex algorithms in a biologically realistic way. However, such models have been simulated on architectures unable to perform real-time simulations. In previous work we presented the possibility to simulate simple models in real-time on the SpiNNaker neuromimetic architecture. However, such models were “static”: the algorithm performed was defined at design-time. In this paper we present a novel learning rule, that exploits the peculiarities of the SpiNNaker system, enabling models designed with the Neural Engineering Framework (NEF) to learn transfer functions using a supervised framework. We show that the proposed learning rule, belonging to the Prescribed Error Sensitivity (PES) class, is able to learn, effectively, both linear and non-linear functions.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132171409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Human behaviour recognition based on trajectory analysis using neural networks 基于神经网络轨迹分析的人类行为识别
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-04 DOI: 10.1109/IJCNN.2013.6706724
J. A. López, M. Saval-Calvo, Andrés Fuster Guilló, J. G. Rodríguez
{"title":"Human behaviour recognition based on trajectory analysis using neural networks","authors":"J. A. López, M. Saval-Calvo, Andrés Fuster Guilló, J. G. Rodríguez","doi":"10.1109/IJCNN.2013.6706724","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706724","url":null,"abstract":"Automated human behaviour analysis has been, and still remains, a challenging problem. It has been dealt from different points of views: from primitive actions to human interaction recognition. This paper is focused on trajectory analysis which allows a simple high level understanding of complex human behaviour. It is proposed a novel representation method of trajectory data, called Activity Description Vector (ADV) based on the number of occurrences of a person is in a specific point of the scenario and the local movements that perform in it. The ADV is calculated for each cell of the scenario in which it is spatially sampled obtaining a cue for different clustering methods. The ADV representation has been tested as the input of several classic classifiers and compared to other approaches using CAVIAR dataset sequences obtaining great accuracy in the recognition of the behaviour of people in a Shopping Centre.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Correctness and performance of the SpiNNaker architecture SpiNNaker架构的正确性和性能
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-04 DOI: 10.1109/IJCNN.2013.6706988
T. Sharp, S. Furber
{"title":"Correctness and performance of the SpiNNaker architecture","authors":"T. Sharp, S. Furber","doi":"10.1109/IJCNN.2013.6706988","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706988","url":null,"abstract":"SpiNNaker is a computer architecture designed to simulate many millions of neurons in real-time, using very many low-power processors and biologically inspired communications. This paper demonstrates that prototype SpiNNaker hardware correctly and quickly simulates networks of point neurons with respect to established reference simulators. Models of increasing complexity are presented and the simulation results obtained from SpiNNaker, NEST and Brian are shown to correlate. An execution profile is sketched of real-time simulation on SpiNNaker, and it is shown to outperform NEST using similar computational resources on a standard benchmark model.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127139036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Solutions to finite horizon cost problems using actor-critic reinforcement learning 有限视界成本问题的actor-critic强化学习解决方案
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-01 DOI: 10.1109/IJCNN.2013.6706755
I. Grondman, Hao Xu, S. Jagannathan, Robert Babuška
{"title":"Solutions to finite horizon cost problems using actor-critic reinforcement learning","authors":"I. Grondman, Hao Xu, S. Jagannathan, Robert Babuška","doi":"10.1109/IJCNN.2013.6706755","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706755","url":null,"abstract":"Actor-critic reinforcement learning algorithms have shown to be a successful tool in learning the optimal control for a range of (repetitive) tasks on systems with (partially) unknown dynamics, which may or may not be nonlinear. Most of the reinforcement learning literature published up to this point only deals with modeling the task at hand as a Markov decision process with an infinite horizon cost function. In practice, however, it is sometimes desired to have a solution for the case where the cost function is defined over a finite horizon, which means that the optimal control problem will be time-varying and thus harder to solve. This paper adapts two previously introduced actor-critic algorithms from the infinite horizon setting to the finite horizon setting and applies them to learning a task on a nonlinear system, without needing any assumptions or knowledge about the system dynamics, using radial basis function networks. Simulations on a typical nonlinear motion control problem are carried out, showing that actor-critic algorithms are capable of solving the difficult problem of time-varying optimal control. Moreover, the benefit of using a model learning technique is shown.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Incremental anomaly identification by adapted SVM method 基于改进支持向量机的增量异常识别
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-01 DOI: 10.1109/IJCNN.2013.6707031
M. Suvorov, S. Ivliev, Garegin Markarian, Denis Kolev, Dmitry Zvikhachevskiy, P. Angelov
{"title":"Incremental anomaly identification by adapted SVM method","authors":"M. Suvorov, S. Ivliev, Garegin Markarian, Denis Kolev, Dmitry Zvikhachevskiy, P. Angelov","doi":"10.1109/IJCNN.2013.6707031","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6707031","url":null,"abstract":"In our work we used the capability of one-class support vector machine (SVM) method to develop a novel one-class classification approach. Algorithm is designed and tested within the project SVETLANA aimed for fault detection in complex technological systems, such as aircraft. The main objective of this project was to create an algorithm responsible for collecting and analyzing the data since the launch of an aircraft engine. Data can be transferred from a variety of sensors that are responsible for the speed, oxygen level etc. In order to apply real time (in flight) application a recursive learning algorithm is proposed. The proposed method analyzes both “positive”/”normal” and “negative”/ “abnormal” examples The overall model structure is the same as an outlier-detection approach. The most important benefits of the new algorithm based on our algorithm are verified in comparison with several classifiers, including the traditional one-class SVM. This algorithm has been tested on real flight data from the USA, Western European as well as Russia. The test results are presented in the final part of the article.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authenticated key exchange protocol using neural cryptography with secret boundaries 使用具有秘密边界的神经密码学的认证密钥交换协议
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-01 DOI: 10.1109/IJCNN.2013.6707125
A. M. Allam, H. Abbas, M. El-Kharashi
{"title":"Authenticated key exchange protocol using neural cryptography with secret boundaries","authors":"A. M. Allam, H. Abbas, M. El-Kharashi","doi":"10.1109/IJCNN.2013.6707125","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6707125","url":null,"abstract":"Key exchange is one of the major concerns in cryp-tology. Neural cryptography is a recent non-classical paradigm which achieves key exchange by mutual learning between two neural networks that receive the same input patterns and update their weights using specific rules. Each weight component of the network can be seen as a random walker in the weight space. The two walkers move in the weight space and reflect at two boundaries (left and right) which represent the network synaptic depth. The reflecting boundaries cause the distance between the two walkers decreases if one of them hits the boundary when a common direction is chosen at each step. Therefore, the mutual learning algorithm relies on this defined boundary condition to achieve synchronization between the two parties. In this paper, we aim to increase the security of the neural cryptography by authenticating the communication using preshared secrets. The mutual learning algorithm is modified so that the reflecting boundaries become hidden and only accessible by the two partners. New update rules are developed to exploit the secret information without adding any limitation to the initial configuration for the two parties. This is done by converting the two boundaries located at a straight line path to a one secret boundary located randomly at a circular path. Therefore, the mutual learning is impeded except this secret information is known. The proposed algorithm is called Neural Cryptography with Secret Boundaries (NCSB) and it is proved with information theory that the secret boundaries can not be revealed from the public information broadcast through the public channel.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The added value of gating in evolved neurocontrollers 门控在进化的神经控制器中的附加价值
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-01 DOI: 10.1109/IJCNN.2013.6706895
Timur Chabuk, J. Reggia
{"title":"The added value of gating in evolved neurocontrollers","authors":"Timur Chabuk, J. Reggia","doi":"10.1109/IJCNN.2013.6706895","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706895","url":null,"abstract":"While the concept of gating has been explored in past studies of neural networks, and neural network controllers have been successfully designed through evolutionary computation methods, very little past work has focused on empirically determining the value of adding gating to evolved neural network architectures. In this study, we do precisely that, by examining a neural architecture and genetic representation that explicitly permits the use of gating connections in a neurocontroller, and comparing the evolved controller performance to similar evolved controllers where gating connections are not explicitly included. The performance of these different approaches is evaluated in evolving a neurocontroller for an autonomous agent navigating through a simulated predator-prey environment. We find that the neural architecture that explicitly allows gating clearly outperforms three other architectures without gating, suggesting that there is a clear benefit to having gating connections directed by a command module. Further analysis of the best evolved agent reveals that its controller executes by producing command signals that encode high-level goals, which then modify low-level behaviors to achieve those goals, supporting the hypothesis that allowing gated connections in neural networks substantially improves the neurocontrollers that can be evolved.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Contradiction resolution with explicit and limited evaluation and its application to SOM 明确和有限评价的矛盾解决及其在SOM中的应用
The 2013 International Joint Conference on Neural Networks (IJCNN) Pub Date : 2013-08-01 DOI: 10.1109/IJCNN.2013.6706999
R. Kamimura
{"title":"Contradiction resolution with explicit and limited evaluation and its application to SOM","authors":"R. Kamimura","doi":"10.1109/IJCNN.2013.6706999","DOIUrl":"https://doi.org/10.1109/IJCNN.2013.6706999","url":null,"abstract":"In this paper, we improve contradiction resolution method. In contradiction resolution, a neuron is self-evaluated to fire without considering other neurons. On the other hand, a neuron is outer-evaluated by considering all neighboring neurons. We improve contradiction resolution by separating the results by self-evaluation from those by outer-evaluation and by limiting the number of winning neurons. The explicit separation is used to enhance contradiction between self and outer-evaluation. The reduction of the number of winning neurons is to focus on a limited number of neurons for extracting main characteristics of input patterns. We applied contradiction resolution to the Senate data. Experimental results confirmed that improved prediction was accompanied by improved visualization and interpretation performance.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信