Post-Processing techniques on Binary Clique Configuration Algorithm for Data Segments
Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 2
Abstract
Sampled the prior distribution using the Metropolis Algorithm. We then estimated the percent of black pixels in each band and compared it to the percent of black pixels in the training set. Several other neighborhoods were considered for the binary prior. We found that with our banding we could accurately estimate cliques and separator distributions containing more than five pixels from the given training set. By that we mean that for cliques containing more than five pixels, we found that there existed at least one binary clique configuration that appeared less than thirty times in the training set. Furthermore, not all collections of cliques formed neighborhoods for which Graphical Model theory could be used. These constraints were the reason for the chosen small neighborhood. Keywords: Metropolis Algorithm, Graphical Model theory, binary clique configuration.
Authors and Affiliations
Shahin Shafei
Model of complex weighting coefficients of adaptive spatial filtering algorithm based on conjugate gradient method
In recent years, GPS, GLONASS and other global navigation satellite systems (Galileo, BeiDou, IRNSS, QZSS) are widely used in both civilian and military applications for navigation, positioning, distance measurement, mis...
Research on the Mechanism of Viscoelastic Emulsion Flooding
Chemical flooding adopts polymer to realize flow control generally. But section inversion is serious in the late injection and polymer is easily to block oil layers, compounding the difficulty of chemical flooding. In-ho...
The Analysis of the New Urbanization Development Strategy in China by Synergism of Five Laws Theory
The synergism of five laws theory has important guiding significance on the new ecological and intensive urbanization. Use of the synergism of five laws theory, analyzed from five aspects: urban nature, society, economy,...
Detection of Security Hacking Attacks by Scan Based TPG Using Verilog
Hardware development of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduce for hardware testability open a back door to potential attacks. Scan based te...
Analysis on Influencing Factors of Service Outsourcing Industry in Langfang— Based on the grey relation theory
With the rapid development of economic globalization and information technology, the service outsourcing industry is developing vigorously, and the market competition of undertaking service outsourcing is becoming fierce...