Catálogo de publicaciones - libros

Compartir en
redes sociales


Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I

Yue Hao ; Jiming Liu ; Yuping Wang ; Yiu-ming Cheung ; Hujun Yin ; Licheng Jiao ; Jianfeng Ma ; Yong-Chang Jiao (eds.)

En conferencia: International Conference on Computational and Information Science (CIS) . Xi'an, China . December 15, 2005 - December 19, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Artificial Intelligence (incl. Robotics); Information Storage and Retrieval; Pattern Recognition; Computation by Abstract Devices; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-30818-8

ISBN electrónico

978-3-540-31599-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

Clustering XML Documents by Structure Based on Common Neighbor

Xizhe Zhang; Tianyang Lv; Zhengxuan Wang; Wanli Zuo

It is important to perform the clustering task on XML documents. However, it is difficult to select the appropriate parameters’ value for the clustering algorithms. Meanwhile, current clustering algorithms lack the effective mechanism to detect outliers while treating outliers as “noise”. By integrating outlier detection with clustering, the paper takes a new approach for analyzing the XML documents by structure. After stating the concept of common neighbor based outlier, the paper proposes a new clustering algorithm, which stops clustering automatically by utilizing the outlier information and needs only one parameter, whose appropriate value range is decided in the outlier mining process. After discussing some features of the proposed algorithm, the paper adopts the XML dataset with different structure and other real-life datasets to compare it with other clustering algorithms.

- Data Mining | Pp. 771-776

Hierarchical Recognition of English Calling Card by Using Multiresolution Images and Enhanced Neural Network

Kwang-Baek Kim; Sungshin Kim

In this paper, we proposed a novel hierarchical algorithm to recognize English calling cards. The algorithm processes multiresolution images of calling cards hierarchically to extract characters and recognize the characters by using an enhanced neural network method. Each processing step functions at lower overhead and results improved output. That is, first, horizontal smearing is applied to a 1/3 resolution image in order to extract the areas that only include characters from the calling card image. Second vertical smearing and the contour tracking masking, is applied to a 1/2 resolution image in order to extract individual characters from the character string areas. And last, the original image is used in the recognition step, because the image accurately includes the morphological information of the characters accurately. To recognize characters with diverse font types and sizes, the enhanced RBF network that improves the middle layer based on the ART1 was used. The results of experiments on a large number of calling card images showed that the proposed algorithm greatly improves the character extraction and recognition compared with traditional recognition algorithms.

- Data Mining | Pp. 785-792

RD-Based Seeded Region Growing for Extraction of Breast Tumor in an Ultrasound Volume

Jong In Kwak; Sang Hyun Kim; Nam Chul Kim

This paper proposes a rate-distortion (RD) based seeded region growing (SRG) for extracting an object such as breast tumors in ultrasound volumes which contain speckle noise and indistinct edges. In the proposed algorithm, region growing proceeds in such a way that the growing cost is minimized which is represented as the combination of rate measuring the roughness of a region contour and distortion measuring the inhomogeneity of pixels in a region. An input image is first segmented into an initial seed region and atomic homogeneous regions. The seed is next merged with one of adjacent regions which makes the RD cost minimum at each step. Such a merging is repeated until the RD cost averaged over the entire seed contour reaches the maximum. As a result, the final seed holds region homogeneity and has a smooth contour while maximizing inhomogeneity against its adjacent regions. Experiments of extracting breast tumors in four real ultrasound volumes show the proposed method yields the average 40% improvement in error rate with respect to the results extracted manually over some conventional methods.

- Data Mining | Pp. 799-808

A Method to Locate the Position of Mobile Robot Using Extended Kalman Filter

Ping Wei; Chengxian Xu; Fengji Zhao

A method to estimate long distance navigation of a mobile robot is proposed. The method uses the dead reckoning,sonar and infrared sensors to detect the landmarks. A corridor environment with equal spaced convex edges is applied as the mobile robot’s moving space and the convex edges are used as landmarks for the robot mounted with the combined sensor system to estimate its position. The robot detects the convex edges using combined sensor system, and navigates in this corridor by using the information obtained from dead reckoning and combined sensor system based on the Extended Kalman. Experiment result show the effectiveness of the method.

- Data Mining | Pp. 815-820

A Noise-Insensitive Hierarchical Min-Max Octree for Visualization of Ultrasound Datasets

Sukhyun Lim; Kang-hee Seo; Byeong-Seok Shin

There are two important factors to visualize ultrasound datasets for volume ray casting method. The first is an efficient method to skip over empty space and the second is an adequate noise filtering method. We propose a noise-insensitive hierarchical min-max octree. In preprocessing stage, we generate a filtered dataset and make a hierarchical min-max octree from the dataset. In rendering step, we exploit the hierarchical min-max octree only when rays skip over transparent region. If rays reach meaningful object, color and opacity values are computed from the original volume dataset. By adaptively using two datasets, our method increases image quality while reducing rendering time.

- Data Mining | Pp. 827-832

Improving PSO-Based Multiobjective Optimization Using Competition and Immunity Clonal

Xiaohua Zhang; Hongyun Meng; Licheng Jiao

An Intelligent Particle Swarm Optimization (IPSO) for MO problems is proposed based on AER (Agent-Environment-Rules) model, in which Competition and Clonal Selection operator are designed to provide an appropriate selection pressure to propel the swarm population towards the Pareto-optimal front. Simulations and comparison with NSGA-II and MOPSO indicate that IPSO is highly competitive.

- Data Mining | Pp. 839-845

Key Frame Extraction Based on Evolutionary Artificial Immune Network

Fang Liu; Xiaoying Pan

Key frame extraction has been recognized as one of the important research issues in video retrieval. Key Frame Extraction based on Evolutionary Artificial Immune Network (KFE-EAIN) is proposed in this paper. To describe the distribution of video frame data, an artificial immune network is first evolved by video frame data. Then, key frame can be selected by minimal spanning tree of the network. KFE-EAIN does not require the number of clusters to be known beforehand. Otherwise, it can apply to both single shot and video sequence. Experimental results show that KFE-EAIN can effectively summarize content of a video with acceptable complexity.

- Data Mining | Pp. 852-857

A Fault-Tolerant and Minimum-Energy Path-Preserving Topology Control Algorithm for Wireless Multi-hop Networks

Zhong Shen; Yilin Chang; Can Cui; Xin Zhang

In this paper, we propose a topology control algorithm for constructing an energy-efficient spanning subgraph for a wireless multi-hop network. The constructed topology has the following properties: (1) it preserves a minimum-energy path between every pair of nodes; (2) it is biconnected, i.e., it can tolerate any one node failure and avoid network partition. Simulation results show that the constructed topology has a small average node degree, a small average transmission range and a constant power stretch factor.

- Data Mining | Pp. 864-869

Numerical Computing of Brain Electric Field in Electroencephalogram

Dexin Zhao; Zhiyong Feng; Wenjie Li; Shugang Tang

This paper expatiated on the process of numerical computing of brain electric field in electroencephalogram (EEG). Based on boundary element method (BEM), a 3D reconstruction of computing model is presented first, which is the premise of BEM computing in EEG. A simple but efficient triangular mesh generation method with constrained points is developed, furthermore, a mesh subdivision method is also put forward. Forward computation of EEG is investigated and acceptable results are obtained with the simulated experiments by using these methods.

- Data Mining | Pp. 878-883

Medical Image Alignment by Normal Vector Information

Xiahai Zhuang; Lixu Gu; Jianfeng Xu

In this paper, a new approach on image registration is presented. We introduce a novel conception- normal vector information (NVI) – to evaluate the similarity between two images. NVI method takes advantage of the relationship between voxels in the image to extract the normal vector (NV) information of each voxel. Firstly, NVI criterion is presented. Then, based on the criterion, we find that NVI related metric has a quite perfect global optimal value on transformation parameter ranges. Finally, registration examples which are based on NVI criterion are provided. The result implies that the feature of smooth value distribution and one global optimal value that NVI metric has makes the optimization procedure much easier to be implemented in image registration.

- Data Mining | Pp. 890-895