Computational Intelligence and Multimedia Applications, 1999. ICCIMA '99. Proceedings. Third International Conference on

23-26 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 95
  • Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):499 - 501
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Credit analysis using radial basis function networks

    Publication Year: 1999, Page(s):138 - 142
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The assessment of credit applications is usually carried out by loan officers based on their own heuristics. Thus, different officers may make different decisions for the same application. In order to avoid the problems due to this subjective evaluation, quantitative methods have been proposed, such as the use of neural networks. In this paper, different approaches to define the parameters of radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying multimedia configurations in Z

    Publication Year: 1999, Page(s):331 - 335
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    In this paper we illustrate how the formal specification language Z can be used to reason about the temporal and throughput constraints associated with multimedia flows of information. In particular we show how it is possible to specify issues related to maximum delays, throughputs and jitter of information flows and how control of these flows can be achieved. What makes out work particularly inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for CSCW applications by using virtual reality

    Publication Year: 1999, Page(s):359 - 363
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    This paper discusses aspects of computer supported co-operative work (CSCW) and distributed virtual environments. It presents a framework for CSCW in a distributed virtual environment and an application. The application was developed with WorldToolKit, WorldToWorld tools and the Common Object Request Broker Architecture platform. This application is a useful meeting room of the Virtual Environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining CBR and GA for designing FPGAs

    Publication Year: 1999, Page(s):133 - 137
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Field programmable gate arrays (FPGAs) are a form of user-programmable logic devices that contain an array of logic gates. As there is no complete set of techniques for designing any FPGA program, researchers have been successful in evolving program designs using genetic algorithms (GAs). However, using GAs to generate software programs for FPGAs faces two main problems, namely scaling and errors.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying aspects of multimedia in LOTOS

    Publication Year: 1999, Page(s):326 - 330
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    The formal specification language LOTOS provides a model of systems where the temporal ordering of actions is specified. LOTOS typically does not deal with the specific times at when actions can occur. Most approaches for specifying real time systems in LOTOS have either extended the language, e.g. with timing aspects, or used the language in conjunction with a temporal logic. We argue that such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of virtual interfaces using configurable templates

    Publication Year: 1999, Page(s):354 - 358
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Technological evolution dictates the need to make human-computer interactions (HCI) more natural. This need has led to the development of virtual reality (VR), which offers improved user-computer interaction. This study proposes to increase user, HCI designer and software engineer integration, exploring the user's cognitive aspects and VR resources. The HCI designer, working with the user and aide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)

    Publication Year: 1999, Page(s):81 - 85
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    We develop a genetic algorithm as a method for cryptanalysing the Chor-Rivest knapsack public key cryptosystem (PKC) (B. Chor and R.L. Rivest, 1988). As far as we know there is no feasible attack known on it (A.J. Menezes, 1997). The results show how the algorithm is effectively used to break this scheme by examining a very small fraction of the space of possible solutions. The algorithm found the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new supervised training algorithm for generalised learning

    Publication Year: 1999, Page(s):489 - 493
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    The paper proposes a new supervised training algorithm for feedforward neural networks. Instead of applying single valued input-output information, multivalued information in the form of a K-dimensional vector (K>1) is applied to each node of the input-output layer. Weights are adjusted using the gradient decent approximation method in order to minimise the sum-squared error value at each node ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of genetic and fuzzy modelling in time series analysis

    Publication Year: 1999, Page(s):128 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    Researchers have proposed several change point detection and testing methods. However, in real cases, it has been shown that the structure of a time series changes gradually, i.e. the change points illustrate a sense of fuzziness. This research is based on the concept of a time series model and on fuzzy theory. It combines the concept of genetic models with other leading models. We use time series... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OOHyTime from the time-based point of view: the case of synchronization specification in multimedia documents

    Publication Year: 1999, Page(s):319 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    HyTime is an ISO standard for the formal specification of the structure of interchangeable documents. OOHyTime has been proposed as an object-oriented view of the standard, with the aim of facilitating both its understanding and use. Initially, this paper introduces HyTime and OOHyTime and follows with details of the OOHyTime view of the modules Measurement and Scheduling, which allow the specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-stage approach to 3D scene structural analysis from a single two-dimensional image

    Publication Year: 1999, Page(s):196 - 200
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Structural analysis of a 3D scene from 2D image pixel positions is an important and unresolved issue in image processing and pattern recognition. Current algorithms for 3D structural analysis do not explicitly use geometrical properties of distance between feature points and angle information as constraints to calibrate transformation parameters. We propose a novel two-stage approach to analyse th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS tradeoffs using an application-oriented transport protocol (AOTP) for multimedia applications over IP

    Publication Year: 1999, Page(s):348 - 352
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Traditionally, the provided service of Internet transport protocols is reliable/ordered or unreliable/unordered service, respectively. It has been widely accepted that a variety of applications (e.g. multimedia) can tradeoff reliability mechanisms to achieve higher throughput. Such a solution, which additionally respects user preferences for QoS characteristics (e.g. reliability, cost, throughput,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the decision making behaviors within human conflict negotiation

    Publication Year: 1999, Page(s):235 - 239
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Since conflict negotiation requires many humans interacting, the modeling of human decision-making within conflict negotiation requires accuracy at both the individual cognitive behavior level and the group interaction level. The key to this accuracy is the characterization of the attributes of conflict negotiation strategies and of individual human decision-making processes. The characteristics o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formulation of an encryption algorithm on the basis of molecular genetics and image patterns

    Publication Year: 1999, Page(s):76 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    We introduce a novel approach to cryptography by amalgamating two cryptic concepts: molecular genetics and image patterning. The genetic code for an organism is unique and yet to be cracked. Formed on the basis of just four nucleotide bases, numerous variations of characteristics are produced. At the same time, encoding using images gives rise to millions of patterns. We draw a parallel between a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison between features for a residential security prototype based on speaker identification with a model of artificial neural network

    Publication Year: 1999, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    This paper presents an implementation of a security system for elevators using speaker identification. The system uses a model of an artificial neural network called a multi-layer perceptron as a classifier. In this work, some features, such as pitch, formants, perceptual linear prediction coefficients, mel-cepstral coefficients and cepstral coefficients, are used to obtain the best results in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia environment support by WWW in a computer assisted learning system

    Publication Year: 1999, Page(s):484 - 488
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The innovative exploitation of information technologies and communication promises to improve the quality, flexibility and effectiveness of engineering education. The present application, SEACom, is a bilingual system which is divided into two main versions; one Portuguese and the other in English, called TeSa-Teaching System Architecture for the production of printed circuit boards (PCB). The aim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on supervised learning by evolving multi-layer perceptrons

    Publication Year: 1999, Page(s):122 - 126
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    This paper provides a guide to evolving-architecture neural networks for a beginner in multi-layer perceptrons. All the quoted methods aim at automatically fitting a neural network architecture to a particular classification task. Several kinds of evolving architectures are exposed. Some neural networks start small and become bigger and bigger during the learning, whereas others start over-dimensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional decomposition for FPGA based designs: a weighted graph approach for encoding of compatible classes

    Publication Year: 1999, Page(s):217 - 222
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Functional decomposition plays an important role in the design of FPGA-based circuits because their structure only imposes constraints on the number of inputs. Several decomposition techniques have been developed, and they show better area and level optimization. In a multi-level decomposition method, the coding of the decomposed function is an important factor that influences further decompositio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to graph layout to assist in Web navigation

    Publication Year: 1999, Page(s):314 - 318
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    An important aspect of Web navigation systems is to maintain the users sense of orientation and facilitate navigation within the context of the total information space. Most navigation systems (or browsers) display pages that contain very limited orientation information apart from links to other pages. To provide a global overview we have developed a navigation interface based on diagrams. A diagr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring solid objects with cylindrical surfaces from orthographic views

    Publication Year: 1999, Page(s):191 - 195
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Two dimensional (2D) orthographic views are powerful representations of three dimensional (3D) objects, and the construction of 3D solid objects from orthographic views is one of various useful methods to generate geometric models. We have reported an estimation method for generation of solid objects with curved surfaces from inconsistent views for some simple cases (T. Watanabe and Y. Chao, 1998)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organization neurons blocks networks [sic]

    Publication Year: 1999, Page(s):60 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Presents a new class of higher-order feedforward neural networks, called self-organized neuron block networks (SNBNs). SNBN networks are based on the inductive learning method (also called self-organization). These new networks are shown to uniformly approximate any continuous function with an arbitrary degree of accuracy. An SNBN provides a natural mechanism for incremental network growth, and we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pruning based fast rate control algorithm for MPEG coding

    Publication Year: 1999, Page(s):403 - 407
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Presents a fast rate control scheme that regulates the coded bit stream generated by an MPEG video encoder such that the resulting variable-rate compressed bit stream can be transmitted over a fixed-rate channel. A new bit-rate regulation scheme is proposed using a technique called pruning, in which only the required number of low-frequency coefficients of the discrete cosine transform (DCT) are c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive QoS schemes for real-time multimedia applications in communications

    Publication Year: 1999, Page(s):343 - 347
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    In this research, two pro-active dynamic quality of service (QoS) control schemes are designed, the dynamic QoS control scheme with delay estimation, and the hybrid dynamic QoS control scheme. The two schemes aim at fulfilling the requested level of QoS while simultaneously achieving high resource utilization. Emphasis is placed upon buffer management via administration schemes of packet loss and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.