Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Hidden Markov Models" wg kryterium: Temat


Wyświetlanie 1-11 z 11
Tytuł:
Detection of selective cationic amphipatic antibacterial peptides by Hidden Markov models
Autorzy:
Polanco, Carlos
Samaniego, Jose
Powiązania:
https://bibliotekanauki.pl/articles/1040652.pdf
Data publikacji:
2009
Wydawca:
Polskie Towarzystwo Biochemiczne
Tematy:
Hidden Markov models
antibacterial peptides
Opis:
Antibacterial peptides are researched mainly for the potential benefit they have in a variety of socially relevant diseases, used by the host to protect itself from different types of pathogenic bacteria. We used the mathematical-computational method known as Hidden Markov models (HMMs) in targeting a subset of antibacterial peptides named Selective Cationic Amphipatic Antibacterial Peptides (SCAAPs). The main difference in the implementation of HMMs was focused on the detection of SCAAP using principally five physical-chemical properties for each candidate SCAAPs, instead of using the statistical information about the amino acids which form a peptide. By this method a cluster of antibacterial peptides was detected and as a result the following were found: 9 SCAAPs, 6 synthetic antibacterial peptides that belong to a subregion of Cecropin A and Magainin 2, and 19 peptides from the Cecropin A family. A scoring function was developed using HMMs as its core, uniquely employing information accessible from the databases.
Źródło:
Acta Biochimica Polonica; 2009, 56, 1; 167-176
0001-527X
Pojawia się w:
Acta Biochimica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Characteristics of the use of coupled hidden Markov models for audio-visual Polish speech recognition
Autorzy:
Kubanek, M.
Bobulski, J.
Adrjanowicz, L.
Powiązania:
https://bibliotekanauki.pl/articles/201266.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
coupled hidden Markov models
audiovisual speech recognition
lip reading
Opis:
This paper focuses on combining audio-visual signals for Polish speech recognition in conditions of the highly disturbed audio speech signal. Recognition of audio-visual speech was based on combined hidden Markov models (CHMM). The described methods were developed for a single isolated command, nevertheless their effectiveness indicated that they would also work similarly in continuous audiovisual speech recognition. The problem of a visual speech analysis is very difficult and computationally demanding, mostly because of an extreme amount of data that needs to be processed. Therefore, the method of audio-video speech recognition is used only while the audiospeech signal is exposed to a considerable level of distortion. There are proposed the authors’ own methods of the lip edges detection and a visual characteristic extraction in this paper. Moreover, the method of fusing speech characteristics for an audio-video signal was proposed and tested. A significant increase of recognition effectiveness and processing speed were noted during tests – for properly selected CHMM parameters and an adequate codebook size, besides the use of the appropriate fusion of audio-visual characteristics. The experimental results were very promising and close to those achieved by leading scientists in the field of audio-visual speech recognition.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2012, 60, 2; 307-316
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Using hidden Markov models in signature recognition process
Autorzy:
Doroz, R.
Wróbel, K.
Powiązania:
https://bibliotekanauki.pl/articles/333622.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
rozpoznawanie podpisu
ukryte modele Markowa
signature recognition
hidden Markov models
Opis:
This paper presents a method of recognition of handwritten signatures with the use of Hidden Markov Models (HMM). The method in question consists in describing each signature with a sequence of symbols. Sequences of symbols were generated on the basis of an analysis of local extremes determined on diagrams of dynamic features of signatures. For this purpose, the method proposed by G.K. Gupta and R.C. Joyce has been modified. The determined sequences were then used as input data for the HMM method. The studies were conducted with the use of the SVC2004 database. The results are competitive in relation to other methods known from the literature.
Źródło:
Journal of Medical Informatics & Technologies; 2012, 21; 75-84
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tunneling Activities Detection Using Machine Learning Techniques
Autorzy:
Allard, F.
Dubois, R.
Gompel, P.
Morel, M.
Powiązania:
https://bibliotekanauki.pl/articles/309515.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cyberdefense
network security
decision trees
hidden Markov models
HTTPS tunnel
RandomForest
Opis:
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy. Indeed, a permitted protocol can be used to embed a forbidden one until the remote server. Therefore, if the resulting information flow is ciphered, security standard tools such as application level gateways (ALG), firewalls, intrusion detection system (IDS), do not detect this violation. In this paper, we describe a statistical analysis of ciphered flows that allows detection of the carried inner protocol. Regarding the deployed security policy, this technology could be added in security tools to detect forbidden protocols usages. In the defence domain, this technology could help preventing information leaks through side channels. At the end of this article, we present a tunnel detection tool architecture and the results obtained with our approach on a public database containing real data flows.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 1; 37-42
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Time stability of the impact of institutions on economic growth and real convergence of the EU countries: implications from the hidden Markov models analysis
Autorzy:
Bernardelli, Michał
Próchniak, Mariusz
Witkowski, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/22444341.pdf
Data publikacji:
2021
Wydawca:
Instytut Badań Gospodarczych
Tematy:
catching up
convergence
Bayesian model averaging
hidden Markov models
Viterbi path
Opis:
Research background: It is not straightforward to identify the role of institutions for the economic growth. The possible unknown or uncertain areas refer to nonlinearities, time stability, transmission channels, and institutional complementarities. The research problem tackled in this paper is the analysis of the time stability of the relationship between institutions and economic growth and real economic convergence. Purpose of the article: The article aims to verify whether the impact of the institutional environment on GDP dynamics was stable over time or diffed in various subperiods. The analysis covers the EU28 countries and the 1995?2019 period. Methods: We use regression equations with time dummies and interactions to assess the stability of the impact of institutions on economic growth. The analysis is based on the partially overlapping observations. The models are estimated with the use of Blundell and Bond?s GMM system estimator. The results are then averaged with the Bayesian Model Averaging (BMA) approach. Structural breaks are identified on the basis of the Hidden Markov Models (HMM). Findings & value added: The value added of the study is threefold. First, we use the HMM approach to find structural breaks. Second, the BMA method is applied to assess the robustness of the outcomes. Third, we show the potential of HMM in foresighting. The results of regression estimates indicate that good institution reflected in the greater scope of economic freedom and better governance lead to the higher economic growth of the EU countries. However, the impact of institutions on economic growth was not stable over time.
Źródło:
Equilibrium. Quarterly Journal of Economics and Economic Policy; 2021, 16, 2; 285-323
1689-765X
2353-3293
Pojawia się w:
Equilibrium. Quarterly Journal of Economics and Economic Policy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selection of parameters of HMM
Dobór parametrów HMM
Autorzy:
Bobulski, J.
Powiązania:
https://bibliotekanauki.pl/articles/156099.pdf
Data publikacji:
2009
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
przetwarzanie obrazów
ukryte modele Markowa
UMM
image processing
hidden Markov models
HMM
Opis:
Hidden Markov models are widely applied in data classification. They are used in many areas. The choice of parameters of HMM is very important because of efficiency of whole identification system. Individual parameters should be matched individually for each system in the experiment way.
Ukryte modele Markowa (ang. Hidden Markov Models - HMM) są szeroko stosowane do klasyfikacji danych w wielu dziedzinach, np. w biometryce do rozpoznawania twarzy lub głosu, rozpoznawania obrazów i dźwięku. Pozwala to na budowanie skutecznych systemów kontroli dostępu do zasobów oraz systemów identyfikacji/autoryzacji osób. Każde z tych zastosowań wymaga specyficznego podejścia do problemu i odpowiedniego zaprojektowania HMM. Dobór Parametrów HMM jest bardzo ważny ze względu za skuteczność systemu identyfikacji. Poszczególne parametry powinny być dobierane indywidualnie dla każdego systemu w sposób eksperymentalny, a badania powinny być przeprowadzone na reprezentatywnej liczbie wzorców. Najważniejszym problemem w projektowaniu systemów opartych o HMM jest wybór architektury modelu, czyli topologii oraz liczby stanów i obserwacji. Wpływ na te parametry ma złożoność i zróżnicowanie danych- sygnałów wejściowych. W przypadku topologii do dyspozycji mamy modele ergodyczne lub left-right. Natomiast przy doborze liczby stanów i obserwacji uwzględniamy typ sygnału wejściowego. Im bardziej złożony i różnorodny, tym te wartości powinny być większe. Należy jednak pamiętać, że im więcej stanów i obserwacji wybierzemy, tym czas estymacji parametrów i czas testowania wydłuży się wykładniczo. Ponadto istnieje granica, powyżej której system nie będzie wykazywał większej skuteczności.
Źródło:
Pomiary Automatyka Kontrola; 2009, R. 55, nr 10, 10; 844-846
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lifelogging system based on averaged Hidden Markov Models: dangerous activities recognition for caregiver support
Autorzy:
Postawka, A.
Rudy, J.
Powiązania:
https://bibliotekanauki.pl/articles/305668.pdf
Data publikacji:
2018
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
lifelogging
abnormal human activity recognition
machine vision
Microsoft Kinect
Hidden Markov Models
Opis:
In this paper, a prototype lifelogging system for monitoring people with cognitive disabilities and elderly people as well as a method for the automatic detection of dangerous activities are presented. The system allows for the remote monitoring of observed people via an Internet website and respects the privacy of the people by displaying their silhouettes instead of their actual images. The application allows for the viewing of both real-time and historical data. The lifelogging data (skeleton coordinates) needed for posture and activity recognition are acquired using Microsoft Kinect 2.0. Several activities are marked as potentially dangerous and generate alarms sent to caregivers upon detection. Recognition models are developed using Averaged Hidden Markov Models with multiple learning sequences. Action recognition includes methods for dierentiating between normal and potentially dangerous activities (e.g., self-aggressive autistic behavior) using the same motion trajectory. Some activity recognition examples and results are presented.
Źródło:
Computer Science; 2018, 19 (3); 257-278
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of Teager Energy Operator on Linear and Mel Scales for Whispered Speech Recognition
Autorzy:
Marković, B. R.
Galić, J.
Mijić, M.
Powiązania:
https://bibliotekanauki.pl/articles/176961.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Teager energy operator
cepstral mean subtraction
whispered speech recognition
linear scale
mel scale
dynamic time warping
hidden Markov models
Opis:
This paper presents experimental results on whispered speech recognition based on Teager Energy Operator for linear and mel cepstral coefficients including the Cepstral Mean Subtraction normalization technique. The feature vectors taken into consideration are Linear Frequency Cepstral Coefficients, Teager Energy based Linear Frequency Cepstral Coefficients, Mel Frequency Cepstral Coefficients and Teager Energy based Mel Frequency Cepstral Coefficients. A speaker dependent scenario is used. For the recognition process, Dynamic Time Warping and Hidden Markov Models methods are applied. Results show a respectable improvement in whispered speech recognition as achieved by using the Teager Energy Operator with Cepstral Mean Subtraction.
Źródło:
Archives of Acoustics; 2018, 43, 1; 3-9
0137-5075
Pojawia się w:
Archives of Acoustics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A System for Predicting Musculoskeletal Disorders Among Dental Students
Autorzy:
Thanathornwong, B.
Suebnukarn, S.
Ouivirach, K.
Powiązania:
https://bibliotekanauki.pl/articles/90683.pdf
Data publikacji:
2014
Wydawca:
Centralny Instytut Ochrony Pracy
Tematy:
musculoskeletal disorders
prediction model
hidden Markov models
dental students
zaburzenia układu mięśniowo-szkieletowego
model prognostyczny
model Markova
studenci stomatologii
Opis:
Objective. This study aimed to develop a system for predicting work-related musculoskeletal disorders (WMSD) among dental students. Materials and methods. The system comprised 2 accelerometer sensors to register neck and upper back postures and movements, and software developed to collect and process the data. Hidden Markov models (HMMs) were used to predict the likelihood of WMSD in dental students by comparing their neck and upper back movement patterns with WMSD and non-WMSD HMMs learned from previous data. To evaluate the performance of the system, 16 participants were randomly assigned into a 2 × 2 crossover trial scheduled for each sequence of working: receiving feedback or no-feedback from the system. The primary outcome measure was the extension of the neck and upper back, before (pre-test) and after (posttest) receiving feedback or no-feedback from the system. The secondary outcome measure was the log likelihood of classifying the movements as WMSD. Results and discussion. The results showed that in the group that received feedback, the extension of the neck in the y axis and of the upper back in the y axis decreased significantly (t test, p < .05) on the post-test. Conclusion. The system for predicting and preventing WMSD aids the correction of the extension of the neck and upper back in the y axis.
Źródło:
International Journal of Occupational Safety and Ergonomics; 2014, 20, 3; 463-475
1080-3548
Pojawia się w:
International Journal of Occupational Safety and Ergonomics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analytical investigation of congestion -avoidance strategies in closed-type queuing models of computer networks with priority scheduling
Autorzy:
Oniszczuk, W.
Powiązania:
https://bibliotekanauki.pl/articles/1933179.pdf
Data publikacji:
2007
Wydawca:
Politechnika Gdańska
Tematy:
pre-emptive-resume queuing model
mean value analysis (MVA)
congestion problem
call admission con-trol (CAC)
hidden Markov models (HMM's)
Opis:
A new approach is presented to modeling intelligent admission control and congestion avoiding mechanism, without rejecting new requests, embedded into a priority closed computer network. Most Call Admission Control (CAC) algorithms treat every request uniformly and hence optimize network performance by maximizing the number of admitted and served requests. In practice, requests have various levels of importance to the network, for example priority classes. Here, the investigated closed network with priority scheduling has been reduced to two service centers, which allows for decomposition of a larger network into a chain of individual queues, where each queue can be studied in isolation. A new algorithm (approach) of this special type of closed priority queuing systems is presented, including a node consisting of several priority sources generating tasks, designated as an Infinite Server (IS), and a service centre with a single service line. This model type is frequently described as a finite source, pre-emptive-resume priority queue (with general distribution of service time). The pre-emptive service discipline allows a task of lower priority to be returned to the head of a queue when a new task of higher priority arrives. A mathematical model of provisioning and admission control mechanism is also described. The idea behind this mechanism has been derived from the Hidden Markov Model (HMM) theory. It is crucial in the CAC process that the network manager obtains correct information about the traffic characteristics declared by the user. Otherwise, the quality of service (QoS) may be dramatically reduced by accepting tasks based on erroneous traffic descriptors. Numerical results illustrate the strategy's effectiveness in avoiding congestion problems.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2007, 11, 3; 237-252
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models
Autorzy:
Pietras, M.
Klęsk, P.
Powiązania:
https://bibliotekanauki.pl/articles/201874.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
hidden Markov models
numerical stability
Viterbi algorithm
parallel architecture
field-programmable gate array
ukryte modele Markowa
stabilność numeryczna
Algorytm Viterbiego
architektura równoległa
Opis:
This paper presents a programmable system-on-chip implementation to be used for acceleration of computations within hidden Markov models. The high level synthesis (HLS) and “divide-and-conquer” approaches are presented for parallelization of Baum-Welch and Viterbi algorithms. To avoid arithmetic underflows, all computations are performed within the logarithmic space. Additionally, in order to carry out computations efficiently – i.e. directly in an FPGA system or a processor cache – we postulate to reduce the floating-point representations of HMMs. We state and prove a lemma about the length of numerically unsafe sequences for such reduced precision models. Finally, special attention is devoted to the design of a multiple logarithm and exponent approximation unit (MLEAU). Using associative mapping, this unit allows for simultaneous conversions of multiple values and thereby compensates for computational efforts of logarithmic-space operations. Design evaluation reveals absolute stall delay occurring by multiple hardware conversions to logarithms and to exponents, and furthermore the experiments evaluation reveals HMMs computation boundaries related to their probabilities and floating-point representation. The performance differences at each stage of computation are summarized in performance comparison between hardware acceleration using MLEAU and typical software implementation on an ARM or Intel processor.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2017, 65, 6; 935-946
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-11 z 11

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies