Catálogo de publicaciones - libros

Compartir en
redes sociales


Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I

Yue Hao ; Jiming Liu ; Yuping Wang ; Yiu-ming Cheung ; Hujun Yin ; Licheng Jiao ; Jianfeng Ma ; Yong-Chang Jiao (eds.)

En conferencia: International Conference on Computational and Information Science (CIS) . Xi'an, China . December 15, 2005 - December 19, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Artificial Intelligence (incl. Robotics); Information Storage and Retrieval; Pattern Recognition; Computation by Abstract Devices; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-30818-8

ISBN electrónico

978-3-540-31599-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

R-functions Based Classification for Abnormal Software Process Detection

Anton Bougaev; Aleksey Urmanov

An R-functions based classification approach along with a regularization framework is proposed. The abnormal software process detection problem was used as the test bed. The R-functions based classification method is termed as the R-cloud method. The approach was validated both on synthetic and real-world data. Regularization allows to achieve good generalization and classification performance. In addition, the R-cloud approach gives the benefit of the analytical representation of the decision boundary. The introductory study on practical use of the R-cloud classifiers yielded promising results. The prototyping has shown that application of the R-functions based pattern recognition technique is a significant and practical tool for fault detection in providing fault tolerant computing.

- Pattern Recognition | Pp. 991-996

Image Recognition with LPP Mixtures

SiBao Chen; Min Kong; Bin Luo

Locality preserving projections (LPP) can find an embedding that preserves local information and discriminates data well. However, only one projection matrix over the whole data is not enough to discriminate complex data. In this paper, we proposed locality preserving projections mixture models (LPP mixtures), where the set of all data were partitioned into several clusters and a projection matrix for each cluster was obtained. In each cluster, We performed LPP via QR-decomposition, which is efficient computationally in under-sampled situations. Its theoretical foundation was presented. Experiments on a synthetic data set and the Yale face database showed the superiority of LPP mixtures.

- Pattern Recognition | Pp. 1003-1008

Shot Boundary Detection Based on SVM and TMRA

Wei Fang; Sen Liu; Huamin Feng; Yong Fang

Video shot boundary detection (SBD) is an important step in many video applications. In this paper, previous temporal multi-resolution analysis (TMRA) framework was extended by first using SVM (Supported Vector Machines) classify the video frames within a sliding window into normal frames, gradual transition frames and CUT frames, then clustering the classified frames into different shot categories. The experimental result on ground truth, which has about 26 hours (13,344 shots) news video clips, shows that the new framework has relatively good accuracy for the detection of shot boundaries. It basically solves the difficulties of shot boundaries detection caused by sub-window technique in video. The framework also greatly improves the accuracy of gradual transitions.

- Pattern Recognition | Pp. 1015-1020

Credit Evaluation Model and Applications Based on Probabilistic Neural Network

Sulin Pang

The paper introduces the method of probabilistic neural network (PNN) and its classifying principle. It constructs two PNN structures which are used to recognize both the two patterns and the three patterns respectively. The structure of the two patterns classification of PNN is used to classify the 106 listed companies of China in 2000 into two groups. The classification accuracy rate is 87.74%. The structure of the three patterns classification of PNN is used to classify the 96 listed companies of China in 2000 into three groups. The classification accuracy rate is 85.42%.

- Pattern Recognition | Pp. 1027-1032

A New Method for Human Gait Recognition Using Temporal Analysis

Han Su; Fenggang Huang

Human gait recognition is the process of identifying individuals by their walking manners. The gait as one of newly coming biometrics has recently gained more and more interests from computer vision researchers. In this paper, we propose a new method for model-free recognition of gait based on silhouette in computer vision sequences. The silhouette shape is represented by a novel approach which includes not only the spatial body contour but also the temporal information. First, a background subtraction is used to separate objects from background. Then, we represent the spatial shape of walker and their motion by the temporal matrix, and use Discrete Fourier analysis to analyze the gait feature. The nearest neighbor classifier is used to distinguish the different gaits of human. The performance of our approach is tested using different gait databases. Recognition results show this approach is efficient.

- Pattern Recognition | Pp. 1039-1044

Improved Method for Gradient-Threshold Edge Detector Based on HVS

Fuzheng Yang; Shuai Wan; Yilin Chang

This paper presents an improved method which is suitable for gradient-threshold edge detectors. The proposed method takes into account the basic characteristics of the human visual system (HVS) and precisely determines the local masking regions for the edges with arbitrary shape according to the image content. Then the gradient image is masked with the luminance and the activity of local image before edge labelling. The experimental results show that the edge images obtained by our algorithm are more consistent with the perceptive edge images.

- Pattern Recognition | Pp. 1051-1056

Adaptation of Intelligent Characters to Changes of Game Environments

Byeong Heon Cho; Sung Hoon Jung; Kwang-Hyun Shim; Yeong Rak Seong; Ha Ryoung Oh

This paper addresses how intelligent characters, having learning capability based on the neural network technology, automatically adapt to environmental changes in computer games. Our adaptation solution includes an autonomous adaptation scheme and a cooperative adaptation scheme. With the autonomous adaptation scheme, each intelligent character steadily assesses changes of its game environment while taking into consideration recently earned scores, and initiates a new learning process when a change is detected. Intelligent characters may confront various opponents in many computer games. When each intelligent character has fought with just part of the opponents, the cooperative adaptation scheme, based on a genetic algorithm, creates new intelligent characters by composing their partial knowledge of the existing intelligent characters. The experimental results show that intelligent characters can properly accommodate to the changes with the proposed schemes.

- Applications | Pp. 1064-1073

An Agent for the HCARD Model in the Distributed Environment

Bobby D. Gerardo; Jae-Wan Lee; Jae-jeong Hwang; Jung-Eun Kim

In this study, we will employ a multi-agent for searching and extraction of data. We will use Integrator Agent based on CORBA architecture for the proposed model on hierarchical Clustering and Association Rule Discovery (HCARD). The model will address the inadequacy of other data mining tools in processing performance and efficiency when use for knowledge discovery. The result revealed faster searching using the agents. Our experiment also shows that the HCARD generated isolated but imperative association rules which in return could be practically explained for decision making purposes. Shorter processing time had been noted in computing for smaller clusters implying ideal processing period than dealing with the entire dataset.

- Applications | Pp. 1082-1087

Modified PSO Algorithm for Deadlock Control in FMS

Hesuan Hu; Zhiwu Li; Weidong Wang

Both a concept of the optimal set of elementary siphons and a deadlock prevention policy based on integer programming are presented to solve deadlock problems arising in flexible manufacturing systems(FMS). Furthermore, an algorithm based on modified particle swarm optimization(PSO) is illustrated to show its efficiency to deal with such problems. Numerical simulation shows that this policy can minimize the number of newly additional control places and arcs while improving the dynamic performance of the resultant system.

- Applications | Pp. 1094-1099

Application of Multi-objective Evolutionary Algorithm in Coordinated Design of PSS and SVC Controllers

Zhenyu Zou; Quanyuan Jiang; Pengxiang Zhang; Yijia Cao

A multi-objective evolutionary algorithm (MOEA) based approach to Power System Stabilizer (PSS) and Static Var Compensators (SVC) tuning has been investigated in this paper. The coordinated design problem of PSS and SVC is formulated as a multi-objective optimization problem, in which the system response is optimized by minimizing several system-behavior measure criterions. MOEA is employed to search optimal controller parameters.Design of the multi-objective optimization aims to find out the Pareto optimal solution which is a set of possible optimal solutions for controller parameters. And effectiveness of the proposed control scheme has been demonstrated in a multiple power system.

- Applications | Pp. 1106-1111