1 |
Andersson, M., Petterson, G., "Improving situation awareness using aerial-mission recognition and temporal information," Proceedings of the International Conference on Information Fusion, Stockhholm, Sweden, 2004.
|
2 |
Trevo, K., "Human adaptive mechatronics methods for mobile working machines," Aalto-yliopsiton teknillinen korkeakoulu, 2010.
|
3 |
Quinlan, J. R., "Learning decision tree classifiers," ACM Computing Surveys, vol. 28, no. 1, 1996, pp. 71-72.
|
4 |
Baek, J., Kim, C., and Kim, S., "Multi-Interval Discretization of Continuous Valued Attributes for Constructing Incremental Decision Tree," Journal of the Korean Institute of Industrial Engineers, vol. 27, no. 4., 2001, pp. 394.
과학기술학회마을
|
5 |
Schenk, J., Schwarzler, S., Ruske, G., and Rigoll, G., "Novel VQ designs for discrete HMM on-line handwritten whiteboard note recognition," Lecture Notes in Computer Science, vol. 5096, 2008, pp. 234-243.
|
6 |
Krzanowski, W. J., "Discrimination and classification using both binary and continuous variables," Journal of the American Statistical Association, vol. 70, no. 352, 1975, pp. 782-790.
DOI
|
7 |
Filmer, D. and Pritchett, L. H., "Estimating wealth effects without expenditure Data-Or tears: An application to educational enrollments in states of india," Demography, vol. 38, no. 1, 2001, pp. 115-132.
DOI
|
8 |
Jolliffe, I., Principal component analysis, John Wiley & Sons, Ltd, 2005.
|
9 |
Kim, J., Goo, Y., and Lee, H., "Signal-based Fault Diagnosis Algorithm of Control Surfaces of Small Fixed-wing Aircraft," Journal of the Korean Society for Aeronautical and Space Sciences, vol. 40, no. 12, 2012, pp. 1040-1047.
과학기술학회마을
DOI
|
10 |
Jeong, S., "Required technology for implementing defense M&S," Industrial engineering magazine, vol. 20, no. 4, 2014, pp. 35-41.
|
11 |
Jang, D., Cho, S., Tahk, M., Koo, H., and Kim, J., "Fuzzy Logic Based Collision Avoidance for UAVs," Journal of the Korean Society for Aeronautical and Space Sciences, vol. 34, no. 7, 2006, pp. 55-62.
DOI
|
12 |
Won, D., Shim, S., Kim, K., Tahk, M., Seong, K., and Kim, E., "Track-Before-Detect Algorithm for Multiple Target Detection," Journal of the Korean Society for Aeronautical and Space Sciences, vol. 39, no. 9, 2011, pp. 848-857.
과학기술학회마을
DOI
|
13 |
Rabiner, L., "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, 1989, pp. 257-286.
DOI
|
14 |
Lai, C., Lu, S. L., and Zhao, Q., "Performance analysis of speech recognition software," Proceedings of the Workshop on Computer Architecture Evaluation using Commercial Workloads, 2002.
|
15 |
Hayashi, M., "Hidden Markov Models to identify pilot instrument scanning and attention patterns," Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2003, vol. 3, pp. 2889-2896.
|
16 |
Choi, Y., Kwon, N., Lee, S., Shin Y., Ryo, C., Park, J., Shin, D., "Hypo-vigilance Detection for UCAV Operators Based on a Hidden Markov Model," Computational and Mathematical Methods in Medicine, 2014.
|
17 |
Mori, R., Suzuki, S., "Modeling of Pilot Landing Approach Control Using Stochastic Switched Linear Regression Model," Journal of Aircraft, vol. 47, no. 5, 2010, pp. 1554-1558.
DOI
|
18 |
Lowe, C. D., "Predicting pilot intent and aircraft trajectory in uncontrolled airspace," Massachusetts Institute of Technology, 2014.
|
19 |
Kim, E., Helal, S., Cook, D., "Human Activity Recognition and Pattern," IEEE Transactions on Pervasive Computing, vol. 9, no. 1, 2010, pp. 48-53.
|
20 |
Dempster, A. P., Laird, N. M., and Rubin, D. B., "Maximum likelihood from incomplete data via the EM algorithm," Journal of the Royal statistical Society, vol. 39, no. 1, 1977, pp. 1-38.
|
21 |
Antwarg, L., Rokach, L., Shapira, B., "Attribute-Driven Hidden Markov Model Trees for Intention Prediction," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 42, no. 6, 2012, pp. 1103-1119.
DOI
|
22 |
Kiseleva, J., Lam, H. T., Pechenizkiy, M., Calders, T., "Predicting Current User Intent with Contextual Markov Models," Proceedings of the IEEE International Conference on Data Mining Workshops, 2013, pp. 391-398.
|