Catálogo de publicaciones - libros
Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I
Yue Hao ; Jiming Liu ; Yuping Wang ; Yiu-ming Cheung ; Hujun Yin ; Licheng Jiao ; Jianfeng Ma ; Yong-Chang Jiao (eds.)
En conferencia: International Conference on Computational and Information Science (CIS) . Xi'an, China . December 15, 2005 - December 19, 2005
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Artificial Intelligence (incl. Robotics); Information Storage and Retrieval; Pattern Recognition; Computation by Abstract Devices; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-30818-8
ISBN electrónico
978-3-540-31599-5
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2005
Tabla de contenidos
doi: 10.1007/11596448_147
R-functions Based Classification for Abnormal Software Process Detection
Anton Bougaev; Aleksey Urmanov
An R-functions based classification approach along with a regularization framework is proposed. The abnormal software process detection problem was used as the test bed. The R-functions based classification method is termed as the R-cloud method. The approach was validated both on synthetic and real-world data. Regularization allows to achieve good generalization and classification performance. In addition, the R-cloud approach gives the benefit of the analytical representation of the decision boundary. The introductory study on practical use of the R-cloud classifiers yielded promising results. The prototyping has shown that application of the R-functions based pattern recognition technique is a significant and practical tool for fault detection in providing fault tolerant computing.
- Pattern Recognition | Pp. 991-996
doi: 10.1007/11596448_149
Image Recognition with LPP Mixtures
SiBao Chen; Min Kong; Bin Luo
Locality preserving projections (LPP) can find an embedding that preserves local information and discriminates data well. However, only one projection matrix over the whole data is not enough to discriminate complex data. In this paper, we proposed locality preserving projections mixture models (LPP mixtures), where the set of all data were partitioned into several clusters and a projection matrix for each cluster was obtained. In each cluster, We performed LPP via QR-decomposition, which is efficient computationally in under-sampled situations. Its theoretical foundation was presented. Experiments on a synthetic data set and the Yale face database showed the superiority of LPP mixtures.
- Pattern Recognition | Pp. 1003-1008
doi: 10.1007/11596448_151
Shot Boundary Detection Based on SVM and TMRA
Wei Fang; Sen Liu; Huamin Feng; Yong Fang
Video shot boundary detection (SBD) is an important step in many video applications. In this paper, previous temporal multi-resolution analysis (TMRA) framework was extended by first using SVM (Supported Vector Machines) classify the video frames within a sliding window into normal frames, gradual transition frames and CUT frames, then clustering the classified frames into different shot categories. The experimental result on ground truth, which has about 26 hours (13,344 shots) news video clips, shows that the new framework has relatively good accuracy for the detection of shot boundaries. It basically solves the difficulties of shot boundaries detection caused by sub-window technique in video. The framework also greatly improves the accuracy of gradual transitions.
- Pattern Recognition | Pp. 1015-1020
doi: 10.1007/11596448_153
Credit Evaluation Model and Applications Based on Probabilistic Neural Network
Sulin Pang
The paper introduces the method of probabilistic neural network (PNN) and its classifying principle. It constructs two PNN structures which are used to recognize both the two patterns and the three patterns respectively. The structure of the two patterns classification of PNN is used to classify the 106 listed companies of China in 2000 into two groups. The classification accuracy rate is 87.74%. The structure of the three patterns classification of PNN is used to classify the 96 listed companies of China in 2000 into three groups. The classification accuracy rate is 85.42%.
- Pattern Recognition | Pp. 1027-1032
doi: 10.1007/11596448_155
A New Method for Human Gait Recognition Using Temporal Analysis
Han Su; Fenggang Huang
Human gait recognition is the process of identifying individuals by their walking manners. The gait as one of newly coming biometrics has recently gained more and more interests from computer vision researchers. In this paper, we propose a new method for model-free recognition of gait based on silhouette in computer vision sequences. The silhouette shape is represented by a novel approach which includes not only the spatial body contour but also the temporal information. First, a background subtraction is used to separate objects from background. Then, we represent the spatial shape of walker and their motion by the temporal matrix, and use Discrete Fourier analysis to analyze the gait feature. The nearest neighbor classifier is used to distinguish the different gaits of human. The performance of our approach is tested using different gait databases. Recognition results show this approach is efficient.
- Pattern Recognition | Pp. 1039-1044
doi: 10.1007/11596448_157
Improved Method for Gradient-Threshold Edge Detector Based on HVS
Fuzheng Yang; Shuai Wan; Yilin Chang
This paper presents an improved method which is suitable for gradient-threshold edge detectors. The proposed method takes into account the basic characteristics of the human visual system (HVS) and precisely determines the local masking regions for the edges with arbitrary shape according to the image content. Then the gradient image is masked with the luminance and the activity of local image before edge labelling. The experimental results show that the edge images obtained by our algorithm are more consistent with the perceptive edge images.
- Pattern Recognition | Pp. 1051-1056
doi: 10.1007/11596448_159
Adaptation of Intelligent Characters to Changes of Game Environments
Byeong Heon Cho; Sung Hoon Jung; Kwang-Hyun Shim; Yeong Rak Seong; Ha Ryoung Oh
This paper addresses how intelligent characters, having learning capability based on the neural network technology, automatically adapt to environmental changes in computer games. Our adaptation solution includes an autonomous adaptation scheme and a cooperative adaptation scheme. With the autonomous adaptation scheme, each intelligent character steadily assesses changes of its game environment while taking into consideration recently earned scores, and initiates a new learning process when a change is detected. Intelligent characters may confront various opponents in many computer games. When each intelligent character has fought with just part of the opponents, the cooperative adaptation scheme, based on a genetic algorithm, creates new intelligent characters by composing their partial knowledge of the existing intelligent characters. The experimental results show that intelligent characters can properly accommodate to the changes with the proposed schemes.
- Applications | Pp. 1064-1073
doi: 10.1007/11596448_161
An Agent for the HCARD Model in the Distributed Environment
Bobby D. Gerardo; Jae-Wan Lee; Jae-jeong Hwang; Jung-Eun Kim
In this study, we will employ a multi-agent for searching and extraction of data. We will use Integrator Agent based on CORBA architecture for the proposed model on hierarchical Clustering and Association Rule Discovery (HCARD). The model will address the inadequacy of other data mining tools in processing performance and efficiency when use for knowledge discovery. The result revealed faster searching using the agents. Our experiment also shows that the HCARD generated isolated but imperative association rules which in return could be practically explained for decision making purposes. Shorter processing time had been noted in computing for smaller clusters implying ideal processing period than dealing with the entire dataset.
- Applications | Pp. 1082-1087
doi: 10.1007/11596448_163
Modified PSO Algorithm for Deadlock Control in FMS
Hesuan Hu; Zhiwu Li; Weidong Wang
Both a concept of the optimal set of elementary siphons and a deadlock prevention policy based on integer programming are presented to solve deadlock problems arising in flexible manufacturing systems(FMS). Furthermore, an algorithm based on modified particle swarm optimization(PSO) is illustrated to show its efficiency to deal with such problems. Numerical simulation shows that this policy can minimize the number of newly additional control places and arcs while improving the dynamic performance of the resultant system.
- Applications | Pp. 1094-1099
doi: 10.1007/11596448_165
Application of Multi-objective Evolutionary Algorithm in Coordinated Design of PSS and SVC Controllers
Zhenyu Zou; Quanyuan Jiang; Pengxiang Zhang; Yijia Cao
A multi-objective evolutionary algorithm (MOEA) based approach to Power System Stabilizer (PSS) and Static Var Compensators (SVC) tuning has been investigated in this paper. The coordinated design problem of PSS and SVC is formulated as a multi-objective optimization problem, in which the system response is optimized by minimizing several system-behavior measure criterions. MOEA is employed to search optimal controller parameters.Design of the multi-objective optimization aims to find out the Pareto optimal solution which is a set of possible optimal solutions for controller parameters. And effectiveness of the proposed control scheme has been demonstrated in a multiple power system.
- Applications | Pp. 1106-1111