By Topic

Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings. Third International Conference on

23-26 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 95
  • Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):499 - 501
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Potential of artificial intelligence based feature selection methods in regression models

    Publication Year: 1999, Page(s):159 - 163
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Pattern recognition based on learning approaches is regarded as one of the disciplines of AI. Floating search methods, developed originally for feature selection problems in statistical pattern recognition, are applicable to a much wider class of problems outside pattern recognition. They have the potential to find an optimal subset of variables maximizing any criterion adopted for the problem at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical calculi of rough-set granules in problems of approximate synthesis in distributed systems

    Publication Year: 1999, Page(s):223 - 227
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    A logical calculus of granules is presented. This calculus provides a framework for the approximate synthesis of solutions under uncertainty by distributed systems. The presented calculus is based on rough mereology, a paradigm for approximate reasoning developed by the authors which blends together and relies on the mereology ideas of St. Lesniewski (see L. Polkowski and A. Skowron, Intell. Autom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)

    Publication Year: 1999, Page(s):81 - 85
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    We develop a genetic algorithm as a method for cryptanalysing the Chor-Rivest knapsack public key cryptosystem (PKC) (B. Chor and R.L. Rivest, 1988). As far as we know there is no feasible attack known on it (A.J. Menezes, 1997). The results show how the algorithm is effectively used to break this scheme by examining a very small fraction of the space of possible solutions. The algorithm found the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling an interactive ITS using a MAS approach: from design to pedagogical evaluation

    Publication Year: 1999, Page(s):153 - 158
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    This paper shows how a multi-agent systems (MAS) approach may be used to build an interactive intelligent tutoring system (ITS) designed as a game. We model the ITS as a society of both reactive and cognitive agents that interact through a graphical interface. We present an experiment carried out in a school in order to test our hypothesis about the architecture's pedagogical potential, and we pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional decomposition for FPGA based designs: a weighted graph approach for encoding of compatible classes

    Publication Year: 1999, Page(s):217 - 222
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Functional decomposition plays an important role in the design of FPGA-based circuits because their structure only imposes constraints on the number of inputs. Several decomposition techniques have been developed, and they show better area and level optimization. In a multi-level decomposition method, the coding of the decomposed function is an important factor that influences further decompositio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formulation of an encryption algorithm on the basis of molecular genetics and image patterns

    Publication Year: 1999, Page(s):76 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    We introduce a novel approach to cryptography by amalgamating two cryptic concepts: molecular genetics and image patterning. The genetic code for an organism is unique and yet to be cracked. Formed on the basis of just four nucleotide bases, numerous variations of characteristics are produced. At the same time, encoding using images gives rise to millions of patterns. We draw a parallel between a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can neural networks really generalize?

    Publication Year: 1999, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent hybrid system for a training and teaching environment

    Publication Year: 1999, Page(s):148 - 152
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    An architecture called SIATE (Sistema Inteligente de Apoio a Treinamento e Ensino=“Intelligent System for Aiding Training and Teaching”) has been proposed, enriching an exploratory environment for teaching with expert knowledge about the domain, while also improving the students' learning experience. The work described in this paper, which is a part of the domain of knowledge acquisiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulated annealing approach for the capacitated minimum spanning tree problem

    Publication Year: 1999, Page(s):432 - 436
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Presents a novel approach to solve an NP-complete problem that is very important from the theoretical and practical point of view, namely the capacitated minimum spanning tree (CMST) problem. This approach has the following features: (a) it is based on the simulated annealing (SA) algorithm; (b) it represents a tree with N edges using N-2 integers; and (c) it defines a consistent ordering between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of rules for medical expert systems-rough set approach

    Publication Year: 1999, Page(s):212 - 216
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The paper presents a systematic approach from knowledge acquisition by using a rule induction method to construct a decision support systems as follows. First, a rule induction system based on a rough set model is introduced and is applied to a database for diagnosis of headaches to extract diagnostic rules. Then, by use of the induced knowledge, an expert system which makes a differential diagnos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated method for inspection of IC bonds

    Publication Year: 1999, Page(s):176 - 180
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    The continuing increase in packing density of VLSI circuits requires that the inspection process be completely automated. The paper suggests a new method for automatic inspection of that part of the wire bond where the wire connects to the bond pad on the chip. A popular type of bonding (connected to bond pad) known as “ball bond” is considered. Although several approaches for ball bon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object oriented toolkit for multiobjective genetic optimisation

    Publication Year: 1999, Page(s):96 - 100
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Evolutionary computations are emerging as powerful tools for search and optimisation, and increasingly being used in many scientific and engineering applications. Side-by-side, object oriented computing has revolutionised, during the current decade, the style of programming and software system design and development which is now configured around the `class' concept. We present a general purpose o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using neural network method computes quadratic optimization problems

    Publication Year: 1999, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB)

    According to the basic optimization principle of artificial neural networks, a novel kind of neural network model for solving the quadratic programming problem is presented. The methodology is based on the Lagrange multiplier theory in optimization and seeks to provide solutions satisfying the necessary conditions of optimality. The equilibrium point of the network satisfies the Kuhn-Tucker condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive processing of data structures

    Publication Year: 1999, Page(s): 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ANN parallelization on a token-based simulated parallel system

    Publication Year: 1999, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    We believe that parallelism is strongly connected with artificial neural networks (ANN), as biological neural networks are known to make good use of massive parallelism. At present, there has been little research in this direction. We have designed and implemented parallel ANNs on different environments. The best implementation possibilities are given, naturally, by massively parallel computers (d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal model for software evolution

    Publication Year: 1999, Page(s):143 - 147
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    Proposes a formal model with mathematical definitions to represent and explore the complicated hierarchy and multidimensional structure of software evolution. This formalization of software evolution is based on a hypergraph and extended to an evolutionary hypergraph with different software evolution objects. In an evolutionary hypergraph, a top-level software evolution step can be refined into se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Holographic technology applied to face location and identification

    Publication Year: 1999, Page(s):469 - 473
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    Holographic technology has been successfully applied on a number of applications in the fields of pattern recognition and prediction. A short review of the face recognition problem introduces one to the fundamental aspects of holographic technology, which are briefly discussed so that their similarities and differences from typical neural nets are shown. Some of the applications of this tool are m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-criteria capital budgeting using FLIP

    Publication Year: 1999, Page(s):426 - 431
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    By using fuzzy linear programming (FLIP), tolerance intervals are used for calculating the availability of capital at each point in time. The main advantage, compared to the non-fuzzy problem formulation, is the fact that the decision maker is not forced into a precise formulation for mathematical reasons. Linear membership functions which monotonically increase or decrease in the tolerance interv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RBF neural network for thrust and torque predictions in drilling operations

    Publication Year: 1999, Page(s):55 - 59
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    In recent years, radial basis function (RBF) neural networks have been shown to be versatile for performance prediction involving nonlinear processes. Machining performance prediction involving various process variables is a nonlinear problem. The conventional mechanics of the cutting approach for predicting thrust and torque in drilling makes use of the oblique cutting theory and an orthogonal cu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prototype search for a nearest neighbor classifier by a genetic algorithm

    Publication Year: 1999, Page(s):117 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB)

    Deals with the problem of finding good prototypes for a condensed nearest-neighbor classifier for a character recognition system based on directional codes. A prototype search by a genetic algorithm which is capable of creating new prototypes is compared against a direct prototype selection algorithm. It is shown, in a leave-one-out experiment, that the prototypes found by the genetic algorithm gi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision system with depth obtaining capabilities

    Publication Year: 1999, Page(s):206 - 210
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Obtaining of 3D information from image sequences or stereoscopic images is a key problem, not completely solved, and any improvement in its resolution would bring to light a huge quantity of real life applications. The main difficulties lie in the matching of different elements of every image, the so-called correspondence problem. According to the trend of analysing singular points of the scene, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent on-line system for content based image retrieval

    Publication Year: 1999, Page(s):273 - 277
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    We propose an intelligent content based image retrieval system and it is an extension of a previously published research paper (S. Kulkarni et al., 1999), where a neuro-fuzzy technique was presented. The CBIR system will accept multiple queries as input such as “mostly red and many blue and few green” that can be provided online and the outputs of the system are the images with their c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the filtering of imperfect multimedia information by means of representation-based queries

    Publication Year: 1999, Page(s):494 - 498
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    The issue of handling imperfect information in a multimedia database system is addressed. The issue of filtering imperfect information appears to be especially crucial in the context of a multimedia system since multimedia data are very often uncertain and/or imprecise. This work is mainly situated in the framework of the possibility theory-based approach which proves to be best suited to qualitat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.