Computer Science ›› 2022, Vol. 49 ›› Issue (11): 148-155.doi: 10.11896/jsjkx.211200265
• Computer Graphics & Multimedia • Previous Articles Next Articles
HE Yu-lin1,2, LI Xu1,2, JIN Yi3, HUANG Zhe-xue1,2
CLC Number:
[1]全国科学技术名词审定委员会术语在线 [EB/OL].[2020-12-20].https://www.termonline.cn/search?k=手写字符识别&r=1608 471572108. [2]MUHAMMAND’ARIFMOHAMAD D N,HASSAN H,HA-RON H.A review on feature extraction and feature selection for handwritten character recognition [J].International Journal of Advanced Computer Science and Applications,2015,6(2):204-212. [3]KUMAR M,JINDAL M K,SHARMA R K.k-nearest neighbor based offline handwritten Gurmukhi character recognition [C]//Proceedings of International Conference on Image Information Processing.IEEE,2011:1-4. [4]SHANTHI N,DURAISWAMY K.A novel SVM-based handwritten Tamil character recognition system [J].Pattern Analysis and Applications,2010,13(2):173-180. [5]PATEL C I,PATEL R,PATEL P.Handwritten character reco-gnition using neural network [J].International Journal of Scientific & Engineering Research,2011,2(5):1-6. [6]SHRIDHAR M,BADRELDIN A.A high-accuracy syntacticrecognition algorithm for handwritten numerals [J].IEEE Transactions on Systems,Man,and Cybernetics,1985,1:152-158. [7]LECUN Y,BOSER B,DENKER J S,et al.Backpropagation applied to handwritten zip code recognition [J].Neural Computation,1989,1(4):541-551. [8]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-basedlearning applied to document recognition [J].Proceedings of the IEEE,1998,86(11):2278-2324. [9]HINTON G E,OSINDERO S,TEH Y W.A fast learning algorithm for deep belief nets [J].Neural Computation,2006,18(7):1527-1554. [10]SALAKHUTDINOV R,LAROCHELLE H.Efficient learningof deep Boltzmann machines [C]//In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics.2010:693-700. [11]HUANG G B,ZHU Q Y,SIEW C K.Extreme learning ma-chine:theory and applications [J].Neurocomputing,2006,70(1/2/3):489-501. [12]HUANG G B,ZHOU H,DING X,et al.Extreme learning machine for regression and multiclass classification [J].IEEE Transactions on Systems,Man,and Cybernetics,Part B(Cybernetics),2011,42(2):513-529. [13]HUANG G B,CHEN L,SIEW C K.Universal approximationusing incremental constructive feedforward networks with random hidden nodes [J].IEEE Transactions on Neural Networks,2006,17(4):879-892. [14]HUANG G B,DING X,ZHOU H.Optimization method based extreme learning machine for classification [J].Neurocompu-ting,2010,74(1/2/3):155-163. [15]LEKAMALAGE C K,LIU T,YANG Y,et al.Extreme learning machine for clustering [C]//Proceedings of ELM-2014.Sprin-ger,2015:435-444. [16]HUANG G,SONG S,GUPTA J N,et al.Semi-supervised and unsupervised extreme learning machines [J].IEEE Transactions on Cybernetics,2014,44(12):2405-2417. [17]PAN J,WANG X,CHENG Y,et al.Reinforcement learningbased on extreme learning machine [C]//Proceedings of International Conference on Intelligent Computing.Springer,2012:80-86. [18]CAO F,LIU B,PARK D S.Image classification based on effective extreme learning machine [J/OL].Neurocomputing.2013,102:90-97.https://doi.org/10.1016/j.neucom.2012.02.042. [19]SCHMIDT W F,KRAAIJVELD M A,DUIN R P.Feed forwardneural networks with random weights [C]//Proceedings of In- ternational Conference on Pattern Recognition.IEEE,1992:1-4. [20]IGELNIK B,PAO Y H.Stochastic choice of basis functions inadaptive function approximation and the functional-link net [J].IEEE transactions on Neural Networks,1995,6(6):1320-1329. [21]HUANG G,HUANG G B,SONG S,et al.Trends in extreme learning machines:A review [J].Neural Networks,2015,61(1):32-48. [22]DING S,ZHAO H,ZHANG Y,et al.Extreme learning ma-chine:algorithm,theory and applications [J].Artificial Intelligence Review,2015,44(1):103-115. [23]CAO W,WANG X,MING Z,et al.A review on neural networks with random weights [J/OL].Neurocomputing,2018,275:278-287.https://doi.org/10.1016/j.neucom.2017.08.040. [24]KASUN L L,ZHOU H,HUANG G B,et al.Representational learning with extreme learning machine for big data [J].IEEE Intelligent Systems,2013,28(6):31-34. [25]DING S,ZHANG N,XU X,et al.Deep extreme learning ma-chine and its application in EEG classification [J/OL].Mathematical Problems in Engineering,2015,2015(129021).https://www.hindawi.com/journals/mpe/2015/129021. [26]TANG J X,DENG C,HUANG G B.Extreme learning machine for multilayer perceptron [J].IEEE Transactions on Neural Networks and Learning Systems,2015,27(4):809-821. [27]KUSSUL E,BAIDYK T.Improved method of handwritten digit recognition tested on MNIST database [J].Image and Vision Computing,2004,22(12):971-981. [28]COHEN G,AFSHAR S,TAPSON J,et al.EMNIST:Extending MNIST to handwritten letters [C]//Proceedings of Interna-tional Joint Conference on Neural Networks.IEEE,2017:2921-2926. [29]CLANUWAT T,BOBER-IRIZAR M,KITAMOTO A,et al.Deep learning for classical Japanese literature [J].arXiv:1812.01718,2018. [30]ZHAO Z T,ZHENG X D.Feature Incremental Extreme Lear-ning Machine[J].Computer Science,2019,46(11A):112-116. [31]XU R,LIANG X,MA R F,et al.Adaptive Orthogonal Search for Network Structure Learning of ELM[J].Chinese Journal of Computer,2021,44(9):1888-1906. [32]HE Y L,LIU J N,WANG X Z,et al.Optimal bandwidth selection for re-substitution entropy estimation [J].Applied Mathematics and Computation,2012,219(8):3425-3260. |
[1] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[2] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[3] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[4] | QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638. |
[5] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[6] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[7] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[8] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[9] | MIAO Lan-xin, LEI Yu, ZENG Peng-peng, LI Xiao-yu, SONG Jing-kuan. Granularity-aware and Semantic Aggregation Based Image-Text Retrieval Network [J]. Computer Science, 2022, 49(11): 134-140. |
[10] | XU Si-qin, HUANG Xiang-qian, YANG Kun, ZHANG Zhan-long, GAN Peng-fei. Prediction of Insulation Deterioration Degree of Cable Joints Based on Temperature and Operation Data [J]. Computer Science, 2022, 49(10): 132-137. |
[11] | ZHANG Min, YU Zeng, HAN Yun-xing, LI Tian-rui. Overview of Person Re-identification for Complex Scenes [J]. Computer Science, 2022, 49(10): 138-150. |
[12] | JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139. |
[13] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[14] | FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23. |
[15] | ZHANG Li-qian, LI Meng-hang, GAO Shan-shan, ZHANG Cai-ming. Summary of Computer-assisted Tongue Diagnosis Solutions for Key Problems [J]. Computer Science, 2021, 48(7): 256-269. |
|