By Topic

Computational Intelligence and Security, 2008. CIS '08. International Conference on

Date 13-17 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 113
  • [Front cover - Workshop]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Title page i - Workshop]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii - Workshop]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Copyright notice - Workshop]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents - Workshop

    Publication Year: 2008, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Preface to CIS 2008 Workshop

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • CIS 2008 Committees - Workshop

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • CIS 2008 Program Committee - Workshop

    Publication Year: 2008, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Chinese Named Entity Recognition with CRFs: Two Levels

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Named entity recognition (NER) is one of the key techniques in natural language processing tasks such as information extraction, text summarization and so on. Chinese NER is more complicated and difficult than other languages because of its characteristics. This paper investigates Chinese named entity recognition based on CRFs, and implements three main named entities, person, location, and organi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content Semantic Similarity Boosted Collaborative Filtering

    Publication Year: 2008, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Collaborative filtering (CF) is one of the most promising techniques in recommender systems, providing personalized recommendations to users based on their previously expressed preferences in the form of ratings and those of other similar users. In practice, a large number of ratings from similar users are not available, due to the sparsity inherent to rating data. Consequently, recommendation qua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expansion Complex Fast-ICA Algorithm Based on Complex Orthogonal Space

    Publication Year: 2008, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Based on independent component analysis (ICA), this paper discusses the complex signal model of blind source separation. With discussions of characteristics of complex-valued signals, paper establishes mixed and separated model of complex-valued signals used to define an orthogonal decomposition of the complex-valued space. Using the relative gradients method, based on 4-th order cumulant, it sets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain

    Publication Year: 2008, Page(s):16 - 20
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    This paper proposed a novel blind image watermark scheme in discrete cosine transform (DCT) domain. The original image is divided into small image blocks with size 8*8 first, and then the binary watermark bits are embedded into DCT domain of image blocks adaptively through a novel watermark embedding algorithm. The original image is not needed in the extraction algorithm. For gaining good fidelity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New SVM Multi-Class Classification Method Based on Error-Correcting Code

    Publication Year: 2008, Page(s):21 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Traditional SVM (support vector machine) multi-class classification methods are mainly based on one-to-one and one-to-multi, which both have disadvantages in applications: slow computational speed and low classification precision. This paper introduces a new method based on error correcting code to reduce the training time and improve the classification precision. In view of the relations among th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • cDNA Microarray Image Processing Using Spot Centroid of Intensity

    Publication Year: 2008, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (978 KB) | HTML iconHTML

    cDNA microarray is an independent platform that offers the ability to analyze large amount of data, and an important application in the organism¿s metabolism and the gene expression analysis. cDNA microarray Image analysis aims to measure the intensity of each spot in the scanned image and this intensity represents the amount of a specific gene of the studied cell. The result can directly affect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Semi-Supervised Learning Methods

    Publication Year: 2008, Page(s):30 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    In traditional machine learning approaches to classification, one uses only a labelled set to train the classifier. Labelled instances however are often difficult, expensive, or time consuming to obtain, as they require the efforts of experienced human annotators. Meanwhile unlabeled data may be relatively easy to collect, but there has been few ways to use them. Semi-supervised learning addresses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Artificial Neural Network Based on CIEA

    Publication Year: 2008, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Chaotic Immune evolutionary algorithm (CIEA) is proposed on the shortage of current algorithms training artificial neural network, biological immune mechanism and the characteristics of evolution. A novel artificial neural network based on chaotic immune evolutionary algorithm (CIEANN) is presented in this paper. The algorithm has the merits of chaos, immunity and evolutionary algorithm. It can en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Particle Swarm Optimization Using Particle Reliving Strategy

    Publication Year: 2008, Page(s):41 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    The particle swarm optimization (PSO) is one of the best efficient algorithms. It has obtained more and more attention and has been applied in many fields, such as machine design and circuit design. But it also has some disadvantages, such as prematurely and difficultly to convergence. To improvement the performance of PSO, particle reliving strategy is proposed. With this strategy, a criterion is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Particle Swarm Optimization Based on Number-Theoretical Net

    Publication Year: 2008, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    An improved particle swarm optimization algorithm was proposed to fit multi-peaks searching; this algorithm was combined with number-theoretical method. In this algorithm, Number-theoretic net was used to initialize the particles' position, and for the purpose of multi-peak searching, the evolution equation was modified. The result of PSO is fined by a method named creeping algorithm for improving... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence Property Analysis for PSO Based on Cluster-Degree

    Publication Year: 2008, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    The concept of cluster-degree was put forward and distribute status of particle with different cluster-degree was studied. The reasonable parameters setting range based on cluster-degree was proposed. Under the direction of cluster-degree, many parameters which can get better searching results were found. So this paper is helpful for the choosing and adjustment of PSO parameters in practical appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Particle Swarm Optimization and K-Nearest Neighbors to Emotion Recognition from Physiological Signals

    Publication Year: 2008, Page(s):52 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Emotion recognition based on physiological signals has a significant future of research and applications. However, in the process of emotion recognition, it is difficult to obtain the most significant feature combinations. Dual-Structure Particle Swarm Optimization (DSPSO) is applied to select emotion features of physiological signals so as to improve the recognition rates in this paper. K-Nearest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved MCPSO with Center Communication

    Publication Year: 2008, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    This paper proposes an improved multi-swarm cooperative particle swarm optimizer with center communication (MCPSO-CC) based on our previous proposed MCPSO algorithm, which enhances the particles based on the experience of master swarm and slave swarms. In our original MCPSO, there is no information sharing among slave swarms except that the information of the best performing particle is broadcaste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Algorithm to Find Optimal Double-Loop Networks

    Publication Year: 2008, Page(s):62 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Double-loop networks have been widely studied as architecture for local area networks. A double-loop digraph G(N; s1, s2) has N vertices 0, 1,..., N-l and 2N edges of two types: s1-edge: i¿1 + s (mod N); i=0, 1,..., N-l, and s2-edge: i¿ s + s2 (modN); i=0, 1,..., N-l, for some fixed steps 1¿ s1<s2<N with gcd(N; s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning through Decision Tree in Simulated Soccer Environment

    Publication Year: 2008, Page(s):68 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1134 KB) | HTML iconHTML

    The robotic soccer is one of the most complex multiagent systems in which agents play the role of soccer players. The characteristics of such systems are: realtime, noisy, collaborative and adversarial. Therefore, playing agents must be capable to making decisions. This paper describes the use of decision tree to kick and catch the ball for two simulated soccer agents. One player shoots towards th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Business Operation Model Based on Semantic Web Service and MAS

    Publication Year: 2008, Page(s):71 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    With Web service technology widely accepted, Web service has become the standard of resources package in the Internet. The approach of exchanging information and transaction is also from a single device to the collaboration in the worldwide network. To face the challenges posed by today¿s changing and uncertain business environment, traditional business system integration approaches are not suffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Fuzzy Models Using Cartesian Genetic Programming

    Publication Year: 2008, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Fuzzy models have capability for solving problem in different application such as pattern recognition, prediction and control. Nevertheless, it has to be emphasized that the identification of a fuzzy model is complex task with many local minima. Cartesian genetic programming provides a way to solve such complex optimization problem. In this paper, fuzzy model is in form of network. Cartesian genet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.