首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance 双馈VSCF感应发电机运行性能的计算与分析
P. Cheng, Weili Li, Wenbiao Chen, D. Xia
By using electromagnetic field theory and calculus of variations, the mathematic model of double-fed variable-speed constant-frequency(VSCF) wind generators was established firstly in this paper, and the two-dimensional transient electromagnetic field finite element method(FEM) was presented. To satisfy the requirement of VSCF, the electromagnetic field was coupled with the outside circuit in FEM calculation, and the stator terminal voltage was taken as the convergence condition. Rotor exciting current was iterating calculated, and the performance of double-fed wind generators at different speed and different load was analyzed. Then the obtained results were compared with the experimental data, from which it could be seen that the calculated results satisfy the engineering requirements well. All these provide some useful reference for the design and analysis of wind power generation system
利用电磁场理论和变分法,首先建立了双馈变速恒频风力发电机的数学模型,并给出了二维瞬态电磁场有限元法。在有限元计算中,为了满足VSCF的要求,将电磁场与外电路耦合,并将定子端电压作为收敛条件。迭代计算了转子励磁电流,分析了双馈风力发电机在不同转速、不同负载下的性能。将计算结果与实验数据进行了比较,表明计算结果较好地满足了工程要求。为风力发电系统的设计和分析提供了有益的参考
{"title":"Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance","authors":"P. Cheng, Weili Li, Wenbiao Chen, D. Xia","doi":"10.1109/CIS.2007.119","DOIUrl":"https://doi.org/10.1109/CIS.2007.119","url":null,"abstract":"By using electromagnetic field theory and calculus of variations, the mathematic model of double-fed variable-speed constant-frequency(VSCF) wind generators was established firstly in this paper, and the two-dimensional transient electromagnetic field finite element method(FEM) was presented. To satisfy the requirement of VSCF, the electromagnetic field was coupled with the outside circuit in FEM calculation, and the stator terminal voltage was taken as the convergence condition. Rotor exciting current was iterating calculated, and the performance of double-fed wind generators at different speed and different load was analyzed. Then the obtained results were compared with the experimental data, from which it could be seen that the calculated results satisfy the engineering requirements well. All these provide some useful reference for the design and analysis of wind power generation system","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123433030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm 利用多目标进化算法预测MHC II类结合肽
Wang Lian, Liu Juan, Luo Fei
The identification of T-cell epitopes is important for vaccine development. An epitope is a peptide segment that can bind to both a T-cell receptor and a major histocompatibility complex (MHC) molecule. The prediction of MHC binding peptides is a crucial part of the epitopes identification. This paper presents a novel Multi-Objective Evolutionary Algorithm (MOEA) to predict MHC class II binding peptides. The optimal search strategy of MOEA is used to find a position specific scoring matrix which can present MHC class II binding peptides quantitative motif. The performance of the new algorithm has been evaluated with benchmark datasets
t细胞表位的鉴定对疫苗的研制具有重要意义。表位是一个肽段,可以结合t细胞受体和主要组织相容性复合体(MHC)分子。MHC结合肽的预测是表位鉴定的重要组成部分。提出了一种新的多目标进化算法(MOEA)来预测MHC II类结合肽。利用MOEA的最优搜索策略,寻找能够呈现MHC II类结合肽定量基序的位置特异性评分矩阵。用基准数据集对新算法的性能进行了评价
{"title":"Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm","authors":"Wang Lian, Liu Juan, Luo Fei","doi":"10.1109/CIS.2007.180","DOIUrl":"https://doi.org/10.1109/CIS.2007.180","url":null,"abstract":"The identification of T-cell epitopes is important for vaccine development. An epitope is a peptide segment that can bind to both a T-cell receptor and a major histocompatibility complex (MHC) molecule. The prediction of MHC binding peptides is a crucial part of the epitopes identification. This paper presents a novel Multi-Objective Evolutionary Algorithm (MOEA) to predict MHC class II binding peptides. The optimal search strategy of MOEA is used to find a position specific scoring matrix which can present MHC class II binding peptides quantitative motif. The performance of the new algorithm has been evaluated with benchmark datasets","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123499804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Step-Size Optimization EASI Algorithm for Blind Source Separation 盲源分离的步长优化EASI算法
Weihong Fu, Xiaoniu Yang, Naian Liu
Aiming at the problem of blind source separation of the communication signals, we propose a step size optimization equivariant adaptive source separation via independence (SO-EASI) algorithm basing on the EASI block based algorithm. This algorithm adjusts the step-size by the steepest descent method and thereby greatly increases its convergence speed whatever value the step-size is initialized. Simulation results show that SO-EASI algorithm can effectively blindly separate the communication signals and these results also support the expected improvement in convergence speed of the approach.
针对通信信号的盲源分离问题,在基于EASI分块算法的基础上,提出了一种步长优化等变独立自适应信源分离(SO-EASI)算法。该算法采用最陡下降法调整步长,无论初始化步长为多少,都大大提高了收敛速度。仿真结果表明,SO-EASI算法可以有效地对通信信号进行盲分离,并支持了算法收敛速度的预期提高。
{"title":"Step-Size Optimization EASI Algorithm for Blind Source Separation","authors":"Weihong Fu, Xiaoniu Yang, Naian Liu","doi":"10.1109/CIS.2007.15","DOIUrl":"https://doi.org/10.1109/CIS.2007.15","url":null,"abstract":"Aiming at the problem of blind source separation of the communication signals, we propose a step size optimization equivariant adaptive source separation via independence (SO-EASI) algorithm basing on the EASI block based algorithm. This algorithm adjusts the step-size by the steepest descent method and thereby greatly increases its convergence speed whatever value the step-size is initialized. Simulation results show that SO-EASI algorithm can effectively blindly separate the communication signals and these results also support the expected improvement in convergence speed of the approach.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Facial Feature Points Calibration Algorithm Based on ASM 基于ASM的改进人脸特征点标定算法
Liming Dai, Miao Liu, Yuanyuan Chen
The matching results of traditional ASM are greatly affected by the model initial position. An improper position will lead algorithm to fail. To enhance the accuracy of feature detection, a Quick Rough Positioning Model(QRPM) algorithm is proposed, which makes use of the image and model gray information to calculate the similar coefficient between the model and the region detected. Coarse and fine explorations are adopted to extract the rough region, where the initial model will be set. Experimental results show that the improved algorithm can effectively enhance the accuracy in facial feature points' calibration, and avoid the ASM results falling into the local minimum.
传统ASM的匹配结果受模型初始位置的影响较大。位置不当会导致算法失效。为了提高特征检测的精度,提出了一种快速粗糙定位模型(QRPM)算法,该算法利用图像和模型灰度信息计算模型与检测区域之间的相似系数。采用粗勘探和细勘探两种方法提取粗区,并在粗区设置初始模型。实验结果表明,改进后的算法可以有效地提高人脸特征点的标定精度,避免ASM结果陷入局部最小值。
{"title":"Improved Facial Feature Points Calibration Algorithm Based on ASM","authors":"Liming Dai, Miao Liu, Yuanyuan Chen","doi":"10.1109/CIS.2007.206","DOIUrl":"https://doi.org/10.1109/CIS.2007.206","url":null,"abstract":"The matching results of traditional ASM are greatly affected by the model initial position. An improper position will lead algorithm to fail. To enhance the accuracy of feature detection, a Quick Rough Positioning Model(QRPM) algorithm is proposed, which makes use of the image and model gray information to calculate the similar coefficient between the model and the region detected. Coarse and fine explorations are adopted to extract the rough region, where the initial model will be set. Experimental results show that the improved algorithm can effectively enhance the accuracy in facial feature points' calibration, and avoid the ASM results falling into the local minimum.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Attribute Reduction Algorithm in Continuous Information Systems 连续信息系统中一种新的属性约简算法
Yuejin Lv, Hong-yun Zhang, Fen Quan, Zhi-cheng Chen
This paper puts forward a new method of discretizing continuous attributes. Compared with the traditional approach, the method, proposed in this paper, can make the number of the obtained classes be more moderate, as well as the lost information be fewer. And then a simple attribute reduction algorithm is developed in continuous information systems. Finally, a real example is used to illustrate its feasibility and effectiveness, respectively.
提出了一种离散连续属性的新方法。与传统方法相比,本文提出的方法可以使得到的类的数量更加适中,丢失的信息也更少。然后,在连续信息系统中提出了一种简单的属性约简算法。最后,通过实例分别说明了该方法的可行性和有效性。
{"title":"A New Attribute Reduction Algorithm in Continuous Information Systems","authors":"Yuejin Lv, Hong-yun Zhang, Fen Quan, Zhi-cheng Chen","doi":"10.1109/CIS.2007.191","DOIUrl":"https://doi.org/10.1109/CIS.2007.191","url":null,"abstract":"This paper puts forward a new method of discretizing continuous attributes. Compared with the traditional approach, the method, proposed in this paper, can make the number of the obtained classes be more moderate, as well as the lost information be fewer. And then a simple attribute reduction algorithm is developed in continuous information systems. Finally, a real example is used to illustrate its feasibility and effectiveness, respectively.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126175420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
P2P Traffic Identification Technique P2P流量识别技术
Li Jun, Shunyi Zhang, Shidong Liu, Xuan Ye
Accurate traffic classification for different P2P applications is fundamental to numerous network activities, from security monitoring, capacity planning and provisioning to service differentiation. However, current P2P applications use dynamic port numbers, HTTP masquerading and inaccessible payload to prevent being identified. The paper proposed an accurate P2P identification system using Decision Tree algorithms (J48 and REPTree) on the basis of effective feature selection. The experimental results show that our scheme is of better accuracy, less computational complexity and it is robust enough to deal with the unknown P2P traffic. With the merits, the scheme can suit the real-time active detection environment, such as monitoring network attacks camouflaged with P2P traffic and service differentiation.
对不同的P2P应用程序进行准确的流量分类是许多网络活动的基础,从安全监控、容量规划和供应到服务区分。然而,当前的P2P应用程序使用动态端口号、HTTP伪装和不可访问的有效负载来防止被识别。本文在有效特征选择的基础上,利用决策树算法(J48和REPTree)提出了一种准确的P2P识别系统。实验结果表明,该方案具有较高的准确率、较低的计算复杂度和较强的鲁棒性,能够处理未知的P2P流量。该方案能够适应实时主动检测环境,如监控利用P2P流量和业务分化伪装的网络攻击。
{"title":"P2P Traffic Identification Technique","authors":"Li Jun, Shunyi Zhang, Shidong Liu, Xuan Ye","doi":"10.1109/CIS.2007.178","DOIUrl":"https://doi.org/10.1109/CIS.2007.178","url":null,"abstract":"Accurate traffic classification for different P2P applications is fundamental to numerous network activities, from security monitoring, capacity planning and provisioning to service differentiation. However, current P2P applications use dynamic port numbers, HTTP masquerading and inaccessible payload to prevent being identified. The paper proposed an accurate P2P identification system using Decision Tree algorithms (J48 and REPTree) on the basis of effective feature selection. The experimental results show that our scheme is of better accuracy, less computational complexity and it is robust enough to deal with the unknown P2P traffic. With the merits, the scheme can suit the real-time active detection environment, such as monitoring network attacks camouflaged with P2P traffic and service differentiation.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On Fuzzy Modulator for the PMSM Step Motion Control 模糊调制器在永磁同步电机步进运动控制中的应用
Zhao-ming Lei, Hexu Sun, Yanzong Dong, Yi Zheng
The paper presents a fuzzy modulator for the PMSM step motion control to modulate the current vector duration to improve the response speed and reduce the torque ripple of the system, on the basis of analyzing the principle of step motion control and introducing the fuzzy logic in. The results of simulation and experiment suggest that the presented approach can cut down the torque ripple and improve the control performance and the positioning precision.
在分析步进运动控制原理的基础上,引入模糊逻辑,提出了一种用于永磁同步电机步进运动控制的模糊调制器,通过调制电流矢量持续时间来提高系统的响应速度,减小系统的转矩脉动。仿真和实验结果表明,该方法可以减小转矩脉动,提高控制性能和定位精度。
{"title":"On Fuzzy Modulator for the PMSM Step Motion Control","authors":"Zhao-ming Lei, Hexu Sun, Yanzong Dong, Yi Zheng","doi":"10.1109/CIS.2007.36","DOIUrl":"https://doi.org/10.1109/CIS.2007.36","url":null,"abstract":"The paper presents a fuzzy modulator for the PMSM step motion control to modulate the current vector duration to improve the response speed and reduce the torque ripple of the system, on the basis of analyzing the principle of step motion control and introducing the fuzzy logic in. The results of simulation and experiment suggest that the presented approach can cut down the torque ripple and improve the control performance and the positioning precision.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Zaps and Signatures of Knowledge 知识的有效攻击和签名
Chunming Tang, D. Pei, Z. Yao
The concept of Zaps, two-round witness indistinguish- able proofs, was introduced by Dwork and Naor in 2000. They constructed Zaps based on non-interactive zero- knowledge proof. This left open the following problem: does there exist a non-interactive Zaps? Barak et al. and Groth et al. answered this question affirmatively under the assumption of the existence of Hitting Set Generators against co-nondeterministic circuits and Decisional Linear Assumption, respectively. In this paper, we will construct ef- ficient non-interactive Zaps under the existence of one-way function. In 2006, Chase and Lysyanskaya defined and con- structed signatures of knowledge based on non-interactive zero-knowledge proof. We prove that their signature is not secure and point out that they exist under the existence of trapdoor permutation. Feige and Shamir stated that digi- tal signature cannot be zero-knowledge(otherwise they are forgeable) and it can be witness hiding. In this paper, we will revise the definition of the signatures of knowledge by using witness hiding protocol and construct them under the existence of one-way function.
Zaps的概念是由Dwork和Naor在2000年提出的,它是两轮证人不可区分的证明。他们基于非交互式零知识证明构造了Zaps。这留下了以下问题:是否存在非交互式的Zaps?Barak et al.和growth et al.分别在针对共不确定性电路和决策线性假设的hit Set Generators存在的假设下肯定地回答了这个问题。本文将构造单向函数存在下的高效非交互zap。2006年,Chase和Lysyanskaya定义并构造了基于非交互式零知识证明的知识签名。我们证明了它们的签名是不安全的,并指出它们存在于活门排列的存在条件下。Feige和Shamir指出,数字签名不能是零知识(否则它们是可伪造的),它可以是证人隐藏。本文将利用证人隐藏协议修改知识签名的定义,并在单向函数存在的条件下构造知识签名。
{"title":"Efficient Zaps and Signatures of Knowledge","authors":"Chunming Tang, D. Pei, Z. Yao","doi":"10.1109/CIS.2007.108","DOIUrl":"https://doi.org/10.1109/CIS.2007.108","url":null,"abstract":"The concept of Zaps, two-round witness indistinguish- able proofs, was introduced by Dwork and Naor in 2000. They constructed Zaps based on non-interactive zero- knowledge proof. This left open the following problem: does there exist a non-interactive Zaps? Barak et al. and Groth et al. answered this question affirmatively under the assumption of the existence of Hitting Set Generators against co-nondeterministic circuits and Decisional Linear Assumption, respectively. In this paper, we will construct ef- ficient non-interactive Zaps under the existence of one-way function. In 2006, Chase and Lysyanskaya defined and con- structed signatures of knowledge based on non-interactive zero-knowledge proof. We prove that their signature is not secure and point out that they exist under the existence of trapdoor permutation. Feige and Shamir stated that digi- tal signature cannot be zero-knowledge(otherwise they are forgeable) and it can be witness hiding. In this paper, we will revise the definition of the signatures of knowledge by using witness hiding protocol and construct them under the existence of one-way function.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New MRF Framework with Dual Adaptive Contexts for Image Segmentation 一种新的具有双自适应背景的MRF图像分割框架
P. Zhong, Fangchen Liu, Runsheng Wang
This work presents a new Markov random field (MRF) framework for image segmentation by incorporating exact contexts in the label field as well as the observed data. On the one hand, the new framework presents MRF with adaptive neighborhood (MRF-AN) system to model adaptively the contextual information of the hidden label field. On the other hand, the new framework models observations via a conditional random field (CRF), which incorporates the contextual information in observed data. The new MRF framework with the dual adaptive contextual information offers several advantages over the conventional framework. In this work, we demonstrate the advantages in an application of detail preservation in image segmentation.
这项工作提出了一种新的马尔可夫随机场(MRF)框架,通过在标签领域以及观测数据中结合精确的上下文来进行图像分割。一方面,该框架提出了带有自适应邻域(MRF- an)系统的MRF,对隐藏标签域的上下文信息进行自适应建模。另一方面,新框架通过条件随机场(CRF)对观测数据进行建模,该模型将观测数据中的上下文信息纳入其中。具有双重自适应上下文信息的新MRF框架与传统框架相比具有许多优点。在这项工作中,我们展示了在图像分割中应用细节保留的优势。
{"title":"A New MRF Framework with Dual Adaptive Contexts for Image Segmentation","authors":"P. Zhong, Fangchen Liu, Runsheng Wang","doi":"10.1109/CIS.2007.192","DOIUrl":"https://doi.org/10.1109/CIS.2007.192","url":null,"abstract":"This work presents a new Markov random field (MRF) framework for image segmentation by incorporating exact contexts in the label field as well as the observed data. On the one hand, the new framework presents MRF with adaptive neighborhood (MRF-AN) system to model adaptively the contextual information of the hidden label field. On the other hand, the new framework models observations via a conditional random field (CRF), which incorporates the contextual information in observed data. The new MRF framework with the dual adaptive contextual information offers several advantages over the conventional framework. In this work, we demonstrate the advantages in an application of detail preservation in image segmentation.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Parallel Models for Face Recognition 人脸识别的新并行模型
Heng Fui Liau, K. Seng, Yee Wan Wong, L. Ang
Subspace methods such as principal component analysis (PCA) and linear discriminant analysis (LDA) extract the features based on space domain. Transformation such as discrete cosine transform (DCT) extracts features based on frequency domain. In this paper, we present two parallel models which intend to utilize the features extracted from frequency and space domain of facial images. Both features are combined under a fusion based scheme. FERET database is chosen to evaluate the performance of the proposed method. Simulation results indicate that the proposed method outperforms other traditional methods and enhance the representation of facial image under low-dimensional features.
子空间方法如主成分分析(PCA)和线性判别分析(LDA)基于空间域提取特征。离散余弦变换(DCT)等变换基于频域提取特征。在本文中,我们提出了两个并行模型,旨在利用从人脸图像的频率域和空间域提取的特征。这两个特征在基于融合的方案下结合起来。选择FERET数据库来评估该方法的性能。仿真结果表明,该方法优于其他传统方法,增强了低维特征下人脸图像的表征。
{"title":"New Parallel Models for Face Recognition","authors":"Heng Fui Liau, K. Seng, Yee Wan Wong, L. Ang","doi":"10.1109/CIS.2007.221","DOIUrl":"https://doi.org/10.1109/CIS.2007.221","url":null,"abstract":"Subspace methods such as principal component analysis (PCA) and linear discriminant analysis (LDA) extract the features based on space domain. Transformation such as discrete cosine transform (DCT) extracts features based on frequency domain. In this paper, we present two parallel models which intend to utilize the features extracted from frequency and space domain of facial images. Both features are combined under a fusion based scheme. FERET database is chosen to evaluate the performance of the proposed method. Simulation results indicate that the proposed method outperforms other traditional methods and enhance the representation of facial image under low-dimensional features.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1