By Topic

Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003

27-30 Sept. 2003

Filter Results

Displaying Results 1 - 25 of 83
  • Image denoising with optimized subband threshold

    Publication Year: 2003, Page(s):160 - 164
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Denoising is basic work for image processing. In this paper, a method based on subband threshold for image denoising is described. Thresholding is a nonlinear technique and it is very simple. But how to estimate threshold is a key problem. After studying the relationship between threshold and PSNR of image, an algorithm for estimating an optimal threshold is proposed. Results of simulation show th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new image fusion algorithm based on wavelet transform

    Publication Year: 2003, Page(s):154 - 159
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    A new method is presented based on wavelet transform (WT) for the fusion of a high-resolution panchromatic image and a low-resolution multi-spectral image. The high-resolution panchromatic image approximation can be first merged into the multi-spectral image approximation by edge intensity factor, and then the merged image is reconstructed by means of an inverse WT using the fused approximation an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web mining based on multi-agents

    Publication Year: 2003, Page(s):90 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Web mining is an important sub-branch of data mining. The data mining technology normally adopts data integration method to generate data warehouse, on which to dig the relation rules, cluster characters and get the useful module prediction and knowledge evaluation. For Web data's semi-structure and heterogeneous (mixed media) character, the Web mining technology is different to the pure mining ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Negotiation modeling and e-shopping agents

    Publication Year: 2003, Page(s):3 - 10
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Negotiation is a key component of e-business. Like business in the real world, negotiation often occurs between two parties or among parties. Considering how to settle on the terms of a transaction, negotiation varies in duration and complexity depending on the market. In general, people are directly engaged in a negotiation process with common knowledge, their experience, and certain learning or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A blind watermarking of vector graphics images

    Publication Year: 2003, Page(s):424 - 429
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2257 KB) | HTML iconHTML

    A blind algorithm for watermarking of vector map is presented in this paper. Only the magnitude of the DWT coefficients of vertices extracted from the map is altered to embed the watermark. Watermark can be extracted without original image because the embedding procedure is based on the relationship between the watermark value and the DWT coefficients. Experiment results show that this algorithm i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method of SAR image segmentation based on neural network

    Publication Year: 2003, Page(s):149 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    For the speckle consisted in SAR image, SR image cannot be segmented efficiently with traditional methods. In this paper, according to the features of SAR image and ANN, the automatic clustering method based on competitive Hopfield NN is used o segment SAR image. With experiment, it is proved that a good result can be gotten with the method proposed in the paper, and at the same time, the speckle ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online adaptive fuzzy neural identification based on direction basis function

    Publication Year: 2003, Page(s):342 - 349
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper presents a robust adaptive fuzzy direction basis function neural controller (AFDBFNC) suitable for identification based on direction basis function. The proposed controller has the following salient features: (1) self-organizing fuzzy neural structure; (2) online learning ability of nonlinear systems; (3) fast learning speed; (4) adaptive control. Simulation example is included to confi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent digital filmmaker DMP

    Publication Year: 2003, Page(s):272 - 277
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    This paper present a system designed to automate the production of digital movies with various visual effects like three-dimension (3D) animation, real image, and their composition. The system can understand an inputted screenplay through a parser then automatically translates it into a relevant motion picture under the direction of a virtual director in place of a human one. The virtual director ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web mining research

    Publication Year: 2003, Page(s):84 - 89
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Web mining is a cross point of database, information retrieval and artificial intelligence. Web content mining (WCM), Web structure mining (WSM) and Web usage mining (WUM) buildup the whole Web mining. The research issues, techniques and development efforts are presented in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A watermarking scheme using image object recognition

    Publication Year: 2003, Page(s):419 - 423
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2130 KB) | HTML iconHTML

    Most existing watermarking techniques embed watermarks into the entire image without taking the image object region into account. For one kind of image with salient object feature, such as portraits, the object region is more important than other parts. In this paper, we propose a watermarking scheme using image object region, in which we exploit DWT to decompose the image and cluster the high-fre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAR image denoising based on data fusion

    Publication Year: 2003, Page(s):143 - 148
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    The CMAP filter which is based on the statistic characteristics of SAR (synthetic aperture radar) image and the filter which is based on the wavelet transform show different performance in the application of SAR image denoising. The CMAP filter can reduce the influence of the speckle better, but the detail of the image is lost greatly. Wavelet transform can keep the detail of the image well, but t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization with genetic algorithms in multispecies environments

    Publication Year: 2003, Page(s):194 - 199
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    We discuss a converging 'scaled coevolutionary genetic algorithm' (scGA) in a setting where populations contain fixed numbers of interacting creatures of several types. The interaction defines a population-dependent fitness function. The scGA employs multiple-spot mutation, various crossover operators and power-law scaled proportional fitness selection. In particular, the Vose-Liepins version of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel transmission and controlling strategy for progressive streaming video over the wireless Internet

    Publication Year: 2003, Page(s):254 - 259
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    A new streaming video transmission and controlling strategy based on wavelet EBCOT coding over the wireless Internet is proposed in this paper. The strategy analyzes the bit streams encoded by EBCOT and packs to multiple transmission layers according to different importance. Then the strategy determines whether the present IP network is in the congestion situation or in unreliable transmission on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of optimized algorithm based on EDA virtual laboratory

    Publication Year: 2003, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    This paper describes a practical algorithm applied in optimizing the parameters of virtual laboratory. The yield maximization problem is first reformulated into a deterministic design-centering problem. Macromodeling is then applied to solve the efficient design-centering problem. The effectiveness of this methodology is illustrated through a simulation example about virtual laboratory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Support vector machine classifications for microarray expression data set

    Publication Year: 2003, Page(s):67 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Gene selection, cancer classification and functional gene classification are three main concerns and interests by biologists for cancer detection, cancer classification, and understanding the functions of genes from the molecular level of tissues, where the large number of genes and relatively small number of experiments in gene expression data generate a great challenge. After a brief introductio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation of MR osteosarcoma images

    Publication Year: 2003, Page(s):379 - 384
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    There is a large body of literature about MR image segmentation methods. In this paper we briefly review these methods, particular emphasis is based on the relative merits of single image versus multispectral segmentation, and supervised versus unsupervised segmentation methods. Finally, we discuss that how to segment osteosarcoma into tumor tissue classes based on three different MR weighted imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using association features to enhance the performance of Naive Bayes text classifier

    Publication Year: 2003, Page(s):336 - 341
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The co-occurrence of words can make contributions to automatic text classification. However, this information cannot be represented in the feature set when only using primitive features, and can only be partially represented when using n-grams as features. In this paper, we define a novel feature, association feature, to describe this information. In order to make the association features which we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GA-based clustering algorithm for large data sets with mixed and categorical values

    Publication Year: 2003, Page(s):102 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    In the field of data mining, it is often encountered to perform cluster analysis on large data sets with mixed numeric and categorical values. However, most existing clustering algorithms are only efficient for the numeric data rather than the mixed data set. For this purpose, this paper presents a novel clustering algorithm for these mixed data sets by modifying the common cost function, trace of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The convergence of the abstract evolutionary algorithm based on a special selection mechanism

    Publication Year: 2003, Page(s):356 - 361
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    There has been a growing interest in mathematical models to character the evolutionary algorithms. The best-known one of such models is the axiomatic model called the abstract evolutionary algorithm. In this paper, we first introduce the definitions of the abstract selection and evolution operators, and that of the abstract evolutionary algorithm, which describes the evolution as an abstract stoch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ant colony optimization heuristic for solving maximum independent set problems

    Publication Year: 2003, Page(s):206 - 211
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    In this paper, ant colony optimization heuristic is extended for solving maximum independent set (MIS) problems. MIS problems are quite different from the travelling salesman problems (TSP) etc., in which no concept of "path or order" exists in its solutions. Based on such characteristics, the ant colony optimization heuristic is modified in this paper in the following ways: (i) a new computation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion retrieval and synthesis based on posture features indexing

    Publication Year: 2003, Page(s):266 - 271
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    This paper presents a simple and effective approach to synthesize new motions from a given sequence of continuous motion capture data. First, an index function, based on posture features of each motion frame, is introduced to segment the given motion capture data into indexed motion clips. Then, based on the fact that motion coherence implies index coherence, a new motion with start frame fst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model of Web oriented intelligent tutoring system for distance education

    Publication Year: 2003, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Distance education delivery systems enable students to use tutoring resources anytime and anywhere. Among various possibilities for implementing distance education delivery computer supported ones are nowadays the most popular. In this paper a general-purpose modal of Web oriented intelligent tutoring systems (ITSs) is proposed, which is based on Internet/intranet. The tutoring model, course model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified fuzzy c-means algorithm for segmentation of MRI

    Publication Year: 2003, Page(s):391 - 395
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    In this paper, we present a novel algorithm for fuzzy segmentation of the osteosarcoma magnetic resonance imaging (MRI) data and estimation of intensity inhomogeneties. The algorithm is formulated by modifying the objective function in the fuzzy c-means (FCM) algorithm to compensate for such inhomogeneities. Our experiments demonstrate the effectiveness of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on knowledge processing techniques in air defense operation intelligent aid decision

    Publication Year: 2003, Page(s):114 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    This paper describes the classification of knowledge in air defense operation, presents a knowledge processing technique based on the hierarchical decomposition of fuzzy concept, introduces its main idea, subjection degree description of fuzzy concept in air defense operation, and provides a key factor decomposition based fuzzy weighted reasoning model. In knowledge acquisition, a kind of data dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image denoising based on the dyadic wavelet transform

    Publication Year: 2003, Page(s):402 - 406
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Since subsampling does not take place in image dyadic wavelet transform at each level, image representation in dyadic wavelet domain compared with wavelet series reconstruction is very redundant and part of disturbance of image dyadic wavelet coefficients in transform domain will not lead to serious distortion. Therefore, with the same error decision probability, the better reconstruction can be e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.