slugA Semantic Concept Detection for Video Based on Regularized Extreme Learning Machine
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
This paper explains the concept detection based on the proposed method regularized extreme learning machine. In regularized extreme learning machine deals with the modification of the extreme learning machine to solve the missing data problems. Semantic concept detection is an important step in concept- based semantic video retrieval, which can be regarded as an intermediate descriptor to bridge the semantic gap. Support Vector Machines (SVM) and ELM (Extreme Learning Machine) is most existing methods. However, there are several drawbacks of using SVM, such as the high computational cost and large number of parameters to be optimized. The drawback facing by using ELM is some parameters are needed to be tuned manually. This consumes time for classification process. Instead of these disadvantages we use a proposed ELM called Regularized extreme learning machine (RELM) is used to detect semantic concept of videos. It uses a cascade of L1 penalty (LARS) and L2 penalty (Tikhonov regularization) on ELM (TROP-ELM) to regularize the matrix computation.
Authors and Affiliations
Julin Rose Jacob
Types of Routing Protocols to maintain Message Security
Every machine on the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the In...
Low Power Cam Gain High Speed with Parity Bit and Power Gated Ml Sensing Technique
Content addressable memory (CAM) it compares input search data against a table of stored data and returns the address of matching data. It have a single clock cycle throughput and make them faster than other hardware, s...
A High Speed FPGA Implementation of an ECSMA-Based Elliptic Curve Crypto Processor
Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key cryptosystems, has become a very attractive choice in wireless mobile communication technology and personal commu...
Extended Cryptographic Mechanism for Secure and Scalable Data Sharing in Cloud using Multiple Keys
Cloud computing technology is widely used now-a-days. Data sharing is an important functionality in cloud storage. Data can be outsourced on cloud and can access easily. Different users can share that data through diffe...
slugSoftware Quality Assurance
When we see Software Quality Assurance then we understand that it is very essential to each software development process. It helps in reducing the number of incomplete deadlines and also the time spent on design an...