Li et al., 2016 - Google Patents
Turing learning: a metric-free approach to inferring behavior and its application to swarmsLi et al., 2016
View HTML- Document ID
- 4445890258715816446
- Author
- Li W
- Gauci M
- Groß R
- Publication year
- Publication venue
- Swarm Intelligence
External Links
Snippet
Abstract We propose Turing Learning, a novel system identification method for inferring the behavior of natural or artificial systems. Turing Learning simultaneously optimizes two populations of computer programs, one representing models of the behavior of the system …
- 230000006399 behavior 0 title abstract description 126
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/629—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of extracted features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Turing learning: a metric-free approach to inferring behavior and its application to swarms | |
Zablocki et al. | Explainability of deep vision-based autonomous driving systems: Review and challenges | |
Xiong et al. | Transferable two-stream convolutional neural network for human action recognition | |
Ramakrishnan et al. | An exploration of embodied visual exploration | |
Olowononi et al. | Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS | |
Sermanet et al. | Time-contrastive networks: Self-supervised learning from video | |
Roy et al. | A deep learning based artificial neural network approach for intrusion detection | |
Lopez-Paz et al. | Discovering causal signals in images | |
Jayaraman et al. | Look-ahead before you leap: end-to-end active recognition by forecasting the effect of motion | |
Sinz et al. | Stimulus domain transfer in recurrent models for large scale cortical population prediction on video | |
Wu et al. | Deep Graph Pose: a semi-supervised deep graphical model for improved animal pose tracking | |
Temple et al. | Learning contextual-variability models | |
Ramos et al. | Visual data mining for crowd anomaly detection using artificial bacteria colony | |
Sun et al. | Socially-aware graph convolutional network for human trajectory prediction | |
Fahmy et al. | Simulator-based explanation and debugging of hazard-triggering events in DNN-based safety-critical systems | |
Mastorakis | Human-like machine learning: limitations and suggestions | |
Sun et al. | Weakly-supervised amodal instance segmentation with compositional priors | |
Hansen et al. | Soccer ball recognition and distance prediction using fuzzy Petri nets | |
Nozarian et al. | Uncertainty quantification and calibration of imitation learning policy in autonomous driving | |
Sravanthi et al. | An efficient classifier using machine learning technique for individual action identification | |
Deepalakshmi et al. | A Reinforcement Learning based Eye-Gaze Behavior Tracking | |
Luo et al. | Visual diagnostics for deep reinforcement learning policy development | |
Kawabata et al. | Active interaction utilizing micro mobile robot and on-line data gathering for experiments in cricket pheromone behavior | |
Khattab et al. | Autonomous Recognition of Collective Motion Behaviours in Robotic Swarms from Video using a Deep Neural Network | |
Fasth et al. | Air Reconnaissance Analysis using Convolutional Neural Network-based Object Detection |