Skip to main content

and
  1. Chapter

    Conclusion

    Now more than ever machine learning and embedded AI will be essential in maintaining information assurance for all aspects of our nation’s security and defense, as well as every transaction we make in governme...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  2. No Access

    Chapter

    General Framework of Mathematics

    With the explosive growth of data nowadays, a young and interdisciplinary field, data science , has emerged, which uses scientific methods, processes, algorithms, and systems to extract knowledge and insights fr...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  3. No Access

    Chapter

    Development of Novel Techniques of CoCoSSC Method

    This chapter provides an introduction to our main contributions concerning the development of the novel methods of CoCoSSC.

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  4. No Access

    Chapter

    Related Work on Geometry of Non-Convex Programs

    Over the past few years, there have been increasing interest in understanding the geometry of non-convex programs that naturally arise from machine learning problems. It is particularly interesting to study ad...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  5. No Access

    Chapter

    Introduction

    Learning has various definitions based on the context in which it is used and the various entities involved in the learning process. The need for machines to learn and thus adapt to the changes in its surround...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  6. No Access

    Chapter

    Necessary Notations of the Proposed Method

    We define necessary notations and review important definitions that will be used later in our analysis. Let ...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  7. No Access

    Chapter

    A Conservation Law Method Based on Optimization

    This chapter is organized as follows: In Sect. 8.1, we warm up with an analytical solution for simple 1-D quadratic function. In Sect. 8.2, we propose the artificially dissipating energy algorithm, energy cons...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  8. No Access

    Chapter

    Optimization Formulation

    Based on the description on the statistics model in the previous section, we formulate the problems that we need to solve from two angles. One is from the field of optimization, the other is from samples of pr...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  9. No Access

    Chapter

    Gradient Descent Converges to Minimizers: Optimal and Adaptive Step-Size Rules

    As mentioned in Chap. 3, gradient descent (GD) and its variants provide the core optimization methodology in machine learning problems. Given a C 1 or C 2 function...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  10. No Access

    Chapter

    Online Discovery for Stable and Grou** Causalities in Multivariate Time Series

    The content of this chapter is organized as follows: The problem formulation is presented in Sect. 10.1. Section 10.2 introduces the details about our proposed approach and its equivalent Bayesian model. A sol...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  11. No Access

    Chapter

    Improved Sample Complexity in Sparse Subspace Clustering with Noisy and Missing Observations

    In this chapter, we show the results of the new CoCoSSC algorithm. The content is organized as follows: The main results concerning CoCoSSC algorithm are shown in Sect. 9.1. Following Sect. 9.1, we show the f...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  12. No Access

    Article

    ACSIR: ANOVA Cosine Similarity Image Recommendation in vertical search

    In today’s world, online shop** is very attractive and grown exponentially due to revolution in digitization. It is a crucial demand to provide recommendation for all the search engine to identify users’ nee...

    D. Sejal, T. Ganeshsingh, K. R. Venugopal in International Journal of Multimedia Inform… (2017)

  13. No Access

    Article

    IR_URFS_VF: image recommendation with user relevance feedback session and visual features in vertical image search

    In recent years, online shop** has grown exponentially and huge number of images are available online. Hence, it is necessary to recommend various product images to aid the user in effortless and efficient a...

    D. Sejal, D. Abhishek, K. R. Venugopal in International Journal of Multimedia Inform… (2016)

  14. No Access

    Article

    Image recommendation based on keyword relevance using absorbing Markov chain and image features

    Image recommendation is an important feature of search engine, as tremendous amount of images are available online. It is necessary to retrieve relevant images to meet the user’s requirement. In this paper, we...

    D. Sejal, V. Rashmi, K. R. Venugopal in International Journal of Multimedia Inform… (2016)

  15. No Access

    Chapter and Conference Paper

    ACTM: Anonymity Cluster Based Trust Management in Wireless Sensor Networks

    Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity Cluster based Trust Management algorithm(ACTM) is proposed wh...

    Shaila K., Sivasankari H., S. H. Manjula in Advances in Communication, Network, and Co… (2012)

  16. No Access

    Chapter and Conference Paper

    Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks

    Wireless Sensor Networks(WSNs) have micro sensors connected in a network with processing capabilities for communications. It is subjected to a set of resource constraints such as battery power, bandwidth and l...

    Sivasankari H., Leelavathi R., Shaila K. in Advances in Communication, Network, and Co… (2012)

  17. No Access

    Chapter and Conference Paper

    RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    The design of hybrid MAC protocol in Wireless Sensor Networks for delay sensitive data traffic QoS is a challenging work. We present Reservation Control Hybrid MAC (RCH-MAC) protocol, which reduces end-to-end ...

    Kumaraswamy M., Shaila K., Sivasankari H. in Wireless Networks and Computational Intell… (2012)