Text Detection Model Based on Parallel SVM Algorithm
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولSpace Edge Detection Based SVM Algorithm
SVM algorithm has a great advantage when it deals with small sample data set. However, In the process of large sample data set classification, it always has to face to the problems of slowly learning and large storage space. This paper puts forward the process of space edge detection, designs and implements the space edge detection based SVM algorithm. The result of simulation experiments shows...
متن کاملStudy on Parallel SVM Based on MapReduce
Support Vector Machines (SVM) are powerful classification and regression tools. They have been widely studied by many scholars and applied in many kinds of practical fields. But their compute and storage requirements increase rapidly with the number of training vectors, putting many problems of practical interest out of their reach. For applying SVM to large scale data mining, parallel SVM are ...
متن کاملShot Boundary Detection Based on SVM Optimization Model
Categorizing the consecutive video frames into shots is the first step for content-based video retrieval. Recently, more and more research has made use of support vector machine to improve the performance of shot boundary detection. However, there has not been a uniform standard for selecting parameters of support vector machine kernel so that it relies on numerous experiences to try, which is ...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2017
ISSN: 2475-8841
DOI: 10.12783/dtcse/iccae2016/7178