2008 International Symposium on Computational Intelligence and Design

17-18 Oct. 2008

Go

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover - Vol 2]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2008, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees and Sponsors - Volume 2

    Publication Year: 2008, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Urinary Sediment Overlapping Cells Image Segmentation Based on Combination Strategy

    Publication Year: 2008, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    The cell overlapping phenomenon often appears in the urinary sediment images. Separating overlapped cells into individual ones is a great important and difficult task for the automatic urinary sediment examination system. To solve this problem, an efficient segmenting algorithm based on combination strategy is proposed in this paper. The algorithm first locates the overlapped cells utilizing the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Dynamic Programming in Dynamic Image Sequence Analysis

    Publication Year: 2008, Page(s):8 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB) | HTML iconHTML

    Dynamic Programming (DP) is an important mathematical method in solving optimization problems. Dynamic image sequence analysis includes tracking and quantitatively estimating objectpsilas motion from the sequences. Both of them are actually optimization problems minimizing predefined cost functions. Consequently, they can be solved by using DP to acquire global optimum with low computation cost. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAR Image Despeckling via Bivariate Shrinkage Based on Contourlet Transform

    Publication Year: 2008, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    We propose a novel and efficient SAR image despeckling via bivariate shrinkage based on contourlet transform, which has been recently introduced. Contourlet transform is a flexible multi-scale, multi-direction and multi-resolution image decomposition that can be efficiently implemented via transform. A bivariate shrinkage with local variance estimation is applied to the decomposed contourlet coeff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Matching Evaluation Method Considering Color Area Combinations and its Application to Two-colored Products

    Publication Year: 2008, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Considering the effect of color area combinations in color matching on the product aesthetic measure, color combination factor is introduced into the evaluation of product color matching. Based on the improvement of Moon and Spencer's aesthetic measure model, a new evaluation method on product color matching is proposed. The color hue, valve, chroma and color area combination are considered as the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Characteristics Analysis of Pólya Count Theorems

    Publication Year: 2008, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Polya count is a method which can solve a special kind of counting problems based on the theory of permutation group, and the count has been widely used in the calculation scientific field. Polya count process can be abstractly described as coloring, classification and counting of graphics, and it requires deep understanding of the real problem, such as the factors of the number of colors, topolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition based on Wavelet Transform and Image Comparison

    Publication Year: 2008, Page(s):24 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    As a time-frequency scale transformation tool for data, function and operator, wavelet transform is a very good method about image compression, by which redundancies of the image are removed and original features of the image are reserved. The pixels of facial images are usually larger, so the wavelet transform is used before image comparison. The low-frequency images can be decomposed and extract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time Medical Image Volume Rendering Based on GPU Accelerated Method

    Publication Year: 2008, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    By growing power and flexibility of modern GPU, hardware based volume rendering techniques show their great powers in accelerating rendering. In this paper, we propose a 3D texture base algorithm with local phong lighting model. It load medical image series as volume data, then creates 3D texture from the volume data, then setups and renders proxy-geometry to sample 3D texture. Phong model is used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time Method of Vehicle License Plate Location Based on Multi-features

    Publication Year: 2008, Page(s):34 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    Vehicle license plate is a special region of vehicle image, which has many features and can not be located by only one of these characteristics. Based on multi- characteristics a novel real-time license plate detection method is presented, which consists of two main steps: license plate area's rough detection and license plate segmentation & verification. The former is stimulated by the fact t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Constrained Learning Algorithm for Finding Multiple Real Roots of Polynomial

    Publication Year: 2008, Page(s):38 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    A constrained learning algorithm is proposed for finding the multiple real roots by neural networks based on the complete discrimination system of polynomial. By coupling a constrained condition into the error function of the neural networks, the proposed algorithm is effectively to avoid the weights fluctuating in a large range. To speed up the convergence speed, a momentum term is added into the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape and Boundary Analysis for Classification of Breast Masses

    Publication Year: 2008, Page(s):42 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Malignant breast tumors appear spiculate or microlobulate in the boundary and irregular in shape. But benign breast masses appear smooth in the boundary and round in shape. We used polygonal modeling to draw Index of spiculation(SI), index of lobule(IF), measure of fractal dimension (FD) and measure of circularity (C) to represent the characteristic of the boundary and the shape of breast masses. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Approach for Recognizing Bridges over Water in Large Remote Sensing Images

    Publication Year: 2008, Page(s):47 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1149 KB) | HTML iconHTML

    There have been many approaches to recognize bridges, but most of them can not be effectively used on real-time occasions. In this paper, a novel approach is presented to rapidly recognize bridges over water in large remote sensing imagery. First, the rough river regions are quickly detected based on fuzzy pattern classification and clustering analysis. Next, with the knowledge of relationship bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable Length Methods for Detecting Anomaly Patterns in Time Series

    Publication Year: 2008, Page(s):52 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    There has been much interest in mining anomaly patterns in time series. However, different datasets may have different lengths of anomaly patterns, and usually, the length of anomaly patterns is unknown. This paper uses k-distance of a pattern and median to define anomaly factor, the degree of anomaly, presents- definition- of- anomaly pattern based on it and two algorithms, algorithm 1 and algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Multi-Fractal Wavelet Model Based on Different Distributed Multipliers

    Publication Year: 2008, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In order to synthesize and analyze network traffic, many specialists have been applying the beta Multi-fractal Wavelet Model (beta MWM) to do researches. In this paper, we adopted other two kinds of MWM, point-mass MWM and hybrid MWM, to compare with the beta MWM by synthesizing network traffic. Having done lots of experiments, analyzing and comparing real traffic with synthesized one, we found th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auto-threshold Confirming Segmentation for Wear Particles in Ferrographic Image

    Publication Year: 2008, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In machine condition monitoring, wear particles formed in rubbing are a source of valuable information on the wear mechanism and severity, while ferrographic image is an information carrier of wear particles. For the significance of image segmentation for wear particle feature extraction and recognition, defects of some traditional methods that can convert color image into binary are introduced an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Randomization Approach to Mining Sequential Pattern with Privacy Preserving

    Publication Year: 2008, Page(s):65 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Data mining is to discover previously unknown, potentially useful and nontrivial knowledge, patterns or rules. Because databases may have some sensitive information that should not to be leaked out, we should study how to make data mining without leaking sensitive information, i.e., privacy-preserving data mining. We propose a randomization approach for privacy-preserving mining of sequential patt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development Actuality and Application of Registration Technology in Augmented Reality

    Publication Year: 2008, Page(s):69 - 74
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    The registration in augmented reality is a process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the tracker-based registration and the knowledge-based registration, and analyzes the process and current approaches of computer vision-based registration. In consideration of current research challenges, the outdoor registration technol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Edge-Collapse-Based 3-D Model Simplification

    Publication Year: 2008, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Highly detailed geometric models are rapidly becoming common-place in computer graphics. But sometimes it is often desirable to use approximations in place of excessively detailed models to control processing time. This paper introduces a surface simplification algorithm that based on edge-collapse. The algorithm uses quadric error metrics to confirm the position of new vertex in order to control ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Kind of Dynamic Bandwidth Allocation Scheme Suitable for MPEG Video in Broadband Network

    Publication Year: 2008, Page(s):79 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    In view of bandwidth requirements in ATM (asynchronous transfer mode) network, a kind of dynamic bandwidth allocation scheme has been proposed. It solves the problem of low bandwidth utilization ratio caused in VBR (variable bit rate) MPEG (Moving Picture Experts Group) video transmission, the simulation experiment curve indicates that with the increase of already bandwidth value, the average cell... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.