Optimization of multi-attribute multi-label object recognition using support vector machine

Pao Yue-kong Library Electronic Theses Database

Optimization of multi-attribute multi-label object recognition using support vector machine

 

Author: Cui, Zhenxi
Title: Optimization of multi-attribute multi-label object recognition using support vector machine
Degree: M.Sc.
Year: 2016
Subject: Machine learning.
Support vector machines.
Human-robot interaction.
Hong Kong Polytechnic University -- Dissertations
Department: Faculty of Engineering
Pages: v, 92 pages : illustrations
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b2917023
URI: http://theses.lib.polyu.edu.hk/handle/200/8598
Abstract: Intelligent machine learning has been a hot research topic in recent years and its technique has been utilized for a variety of tasks such as object identification, face detection, and body gesture recognition. Over the past few years, an increasing number of research has been done, aiming to improve the recognition accuracy and the response time so that the recognition process could be performed in real-time with no delay. Typical machine learning algorithms that have been considered by researchers include neural network, K-nearest neighbors (K-NN), and support vector machines (SVM). Although different machine learning algorithms have been proposed, the efficiency of machine learning algorithms for applications related to human-computer interaction (HCI), in general, is relatively low. This is mainly due to the lack of robustness insensory data interpretation techniques. To address this issue, this dissertation developed a novel numerical approach based on support vector machine(SVM). The kernel function is the core of the SVM, and choosing the parameters is very important toward the final results for the regression and classification. So this work focuses on the method in parameter optimization so as to improve the accuracy rate while reducing the response time and the computation consumption. Two different kinds of data set, namely the iris data-set, and the spammed email data-set, were used to validate the method proposed in this work. Results were analyzed and recommendations were made for future research.

Files in this item

Files Size Format
b29170230.pdf 1.435Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information