Learning Cascade Attention for fine-grained image classification
Fine-grained image classification is a challenging task due to the large inter-class difference and small intra-class difference. In this paper, we propose a novel Cascade Attention Model using the Deep Convolutional Neural Network to ...
The robustness-fidelity trade-off in Grow When Required neural networks performing continuous novelty detection
Novelty detection allows robots to recognise unexpected data in their sensory field and can thus be utilised in applications such as reconnaissance, surveillance, self-monitoring, etc. We assess the suitability of Grow When Required ...
Multistability and attraction basins of discrete-time neural networks with nonmonotonic piecewise linear activation functions
This paper is concerned with multistability and attraction basins of discrete-time neural networks with nonmonotonic piecewise linear activation functions. Under some reasonable conditions, the addressed networks have ( 2 m + 1 ) n ...
Affinity and class probability-based fuzzy support vector machine for imbalanced data sets
The learning problem from imbalanced data sets poses a major challenge in data mining community. Although conventional support vector machine can generally show relatively robust performance in dealing with the classification problems ...
Highlights
- ACFSVM focuses on the majority class with higher affinities and class probabilities.
New approach to global Mittag-Leffler synchronization problem of fractional-order quaternion-valued BAM neural networks based on a new inequality
In this paper, a novel kind of neural networks named fractional-order quaternion-valued bidirectional associative memory neural networks (FQVBAMNNs) is formulated. On one hand, applying Hamilton rules in quaternion multiplication which ...
Local distinguishability aggrandizing network for human anomaly detection
With the growing demand for an intelligent system to prevent abnormal events, many methods have been proposed to detect and locate anomalous behaviors in surveillance videos. However, most of these methods contain two shortcomings ...