首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
Defaults Assessment of Mortgage Loan with Rough Set and SVM 基于粗糙集和支持向量机的抵押贷款违约评估
Bo Wang, Yongkui Liu, Yanyou Hao, Shuang Liu
Credit risk is the primary source of risk to financial institutions. Support vector machine (SVM) is a good classifier to solve binary classification problem. The learning results of SVM possess stronger robustness. We adjust these penalty parameters to achieve better generalization performances with using grid-search method in our application. In this paper the attribute reduction of rough set has been applied as preprocessor so that we can delete redundant attributes, then default prediction model of the housing mortgage loan is established by using SVM. Classification performance is better than some other classification algorithms.
信用风险是金融机构的主要风险来源。支持向量机是解决二值分类问题的一种很好的分类器。SVM的学习结果具有较强的鲁棒性。我们通过调整这些惩罚参数,在应用中使用网格搜索方法来获得更好的泛化性能。本文采用粗糙集的属性约简作为预处理,去除冗余属性,然后利用支持向量机建立住房抵押贷款的默认预测模型。分类性能优于其他分类算法。
{"title":"Defaults Assessment of Mortgage Loan with Rough Set and SVM","authors":"Bo Wang, Yongkui Liu, Yanyou Hao, Shuang Liu","doi":"10.1109/CIS.2007.159","DOIUrl":"https://doi.org/10.1109/CIS.2007.159","url":null,"abstract":"Credit risk is the primary source of risk to financial institutions. Support vector machine (SVM) is a good classifier to solve binary classification problem. The learning results of SVM possess stronger robustness. We adjust these penalty parameters to achieve better generalization performances with using grid-search method in our application. In this paper the attribute reduction of rough set has been applied as preprocessor so that we can delete redundant attributes, then default prediction model of the housing mortgage loan is established by using SVM. Classification performance is better than some other classification algorithms.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"19 4-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Extraction of Semantic Keyframes Based on Visual Attention and Affective Models 基于视觉注意和情感模型的语义关键帧提取
Zhicheng Zhao, A. Cai
The Extraction of video keyframe is convenient for browsing and retrieving of video content. However, since the "keyframe" is a subjective concept which involves in vision and psychology, it is difficult to be described by low-level features of video. In this paper, we propose a method of keyframe extraction based on visual attention and affective models. To be concrete, film elements such as character, lighting and camera motion, crucial to human attention, are fused into a visual attention model, and the film is segmented into scenes according to a short-time memory model. The "scene importance" is then computed by using the affective arousal which determines audience's excitability in the 2D emotion space. Finally, according to the attention model and the scene importance, scene keyframes are extracted. Experimental results indicate that keyframes extracted by our approach are coincident with human perception, and would be in favor of further semantic analysis.
视频关键帧的提取方便了视频内容的浏览和检索。然而,由于“关键帧”是一个涉及视觉和心理学的主观概念,很难用视频的低级特征来描述。本文提出了一种基于视觉注意和情感模型的关键帧提取方法。具体来说,将人物、灯光、镜头运动等对人的注意力至关重要的电影元素融合到视觉注意力模型中,并根据短时记忆模型将电影分割成场景。然后通过情感唤醒来计算“场景重要性”,情感唤醒决定了观众在2D情感空间中的兴奋性。最后,根据注意力模型和场景重要性提取场景关键帧。实验结果表明,该方法提取的关键帧与人类感知一致,有利于进一步的语义分析。
{"title":"Extraction of Semantic Keyframes Based on Visual Attention and Affective Models","authors":"Zhicheng Zhao, A. Cai","doi":"10.1109/CIS.2007.9","DOIUrl":"https://doi.org/10.1109/CIS.2007.9","url":null,"abstract":"The Extraction of video keyframe is convenient for browsing and retrieving of video content. However, since the \"keyframe\" is a subjective concept which involves in vision and psychology, it is difficult to be described by low-level features of video. In this paper, we propose a method of keyframe extraction based on visual attention and affective models. To be concrete, film elements such as character, lighting and camera motion, crucial to human attention, are fused into a visual attention model, and the film is segmented into scenes according to a short-time memory model. The \"scene importance\" is then computed by using the affective arousal which determines audience's excitability in the 2D emotion space. Finally, according to the attention model and the scene importance, scene keyframes are extracted. Experimental results indicate that keyframes extracted by our approach are coincident with human perception, and would be in favor of further semantic analysis.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition 人脸与掌纹识别的后处理LDA理论研究
Jian-jun Hao, W. Zuo, Kuanquan Wang
Recently, a class of post-processing approaches has been proposed to improve the recognition performance of LDA in face recognition. In-depth analysis, however, has not been presented to reveal the effectiveness of the post-processing approach. In this paper, we investigate the rationale of the post-processing approach, and demonstrate the interrelationship of the post-processing approach and the image Euclidean distance method (IMED). We then use the FERET face and the PolyU palmprint databases to evaluate the post-processed LDA method. Experimental results indicate the effectiveness of the post-processing approach and reveal its relation to IMED.
近年来,为了提高LDA在人脸识别中的识别性能,提出了一系列的后处理方法。然而,深入的分析尚未提出,以揭示后处理方法的有效性。在本文中,我们研究了后处理方法的基本原理,并证明了后处理方法和图像欧几里得距离方法(IMED)的相互关系。然后,我们使用FERET人脸和理大掌纹数据库来评估后处理的LDA方法。实验结果表明了后处理方法的有效性,并揭示了后处理方法与IMED的关系。
{"title":"Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition","authors":"Jian-jun Hao, W. Zuo, Kuanquan Wang","doi":"10.1109/CIS.2007.106","DOIUrl":"https://doi.org/10.1109/CIS.2007.106","url":null,"abstract":"Recently, a class of post-processing approaches has been proposed to improve the recognition performance of LDA in face recognition. In-depth analysis, however, has not been presented to reveal the effectiveness of the post-processing approach. In this paper, we investigate the rationale of the post-processing approach, and demonstrate the interrelationship of the post-processing approach and the image Euclidean distance method (IMED). We then use the FERET face and the PolyU palmprint databases to evaluate the post-processed LDA method. Experimental results indicate the effectiveness of the post-processing approach and reveal its relation to IMED.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Robust Estimator for Evaluating Internet Worm Infection Rate 一种评估网络蠕虫感染率的鲁棒估计
Y. Deng, Guanzhong Dai, Shuxin Chen
The Internet worm is a menace for the security of the Internet users. To detect and protect the Internet worm becomes an important research topic in the field of Internet security. A robust estimation method for evaluating worm infection rate is proposed in this paper. The robust estimator of worm infection rate is derived based on the robust maximum likelihood estimation principle at first; The corresponding elements of the equivalent weight matrix constructed by the residuals and some chosen weight functions are given; The error influence functions related to the robust estimator and the least squares estimator are respectively analyzed; At last, a simulated example is carried out. It is shown that the robust estimation is effective and reliable in resisting the bad influence of the outlying scan data on the estimated worm infection rate with high computation convergence speed.
网络蠕虫对互联网用户的安全构成威胁。对网络蠕虫进行检测和防护已成为网络安全领域的一个重要研究课题。提出了一种评估蠕虫感染率的鲁棒估计方法。首先基于鲁棒极大似然估计原理推导了蠕虫感染率的鲁棒估计;给出了由残差构造的等效权矩阵的相应元素和所选择的权函数;分别分析了与鲁棒估计量和最小二乘估计量相关的误差影响函数;最后进行了仿真算例。结果表明,鲁棒估计能够有效、可靠地抵抗外围扫描数据对蠕虫感染率估计的不良影响,且具有较高的计算收敛速度。
{"title":"A Robust Estimator for Evaluating Internet Worm Infection Rate","authors":"Y. Deng, Guanzhong Dai, Shuxin Chen","doi":"10.1109/CIS.2007.116","DOIUrl":"https://doi.org/10.1109/CIS.2007.116","url":null,"abstract":"The Internet worm is a menace for the security of the Internet users. To detect and protect the Internet worm becomes an important research topic in the field of Internet security. A robust estimation method for evaluating worm infection rate is proposed in this paper. The robust estimator of worm infection rate is derived based on the robust maximum likelihood estimation principle at first; The corresponding elements of the equivalent weight matrix constructed by the residuals and some chosen weight functions are given; The error influence functions related to the robust estimator and the least squares estimator are respectively analyzed; At last, a simulated example is carried out. It is shown that the robust estimation is effective and reliable in resisting the bad influence of the outlying scan data on the estimated worm infection rate with high computation convergence speed.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles 基于邻域粗糙集的基因表达谱基因选择
Shulin Wang, Huowang Chen, Shutao Li
Although adopting feature reduction in classic rough set theory to select informative genes is an effective method, its classification accuracy rate is usually not higher compared with other tumor-related gene selection and tumor classification approaches; for gene expression values must be discretized before gene reduction, which leads to information loss in tumor classification. Therefore, the neighborhood rough set model proposed by Hu Qing-Hua is introduced to tumor classification, which omits the discretization procedure, so no information loss occurs before gene reduction. Experiments on two well-known tumor datasets show that gene selection using neighborhood rough set model obviously outperforms using classic rough set theory and experiment results also prove that the most of the selected gene subset not only has higher accuracy rate but also are related to tumor.
虽然采用经典粗糙集理论中的特征约简来选择信息基因是一种有效的方法,但与其他肿瘤相关基因选择和肿瘤分类方法相比,其分类准确率通常并不高;由于基因表达值在进行基因还原前必须进行离散化处理,导致了肿瘤分类信息的丢失。因此,将胡庆华提出的邻域粗糙集模型引入到肿瘤分类中,该模型省略了离散化过程,在基因约简之前不会发生信息丢失。在两个知名肿瘤数据集上的实验表明,邻域粗糙集模型的基因选择效果明显优于经典粗糙集理论,实验结果也证明了所选择的大部分基因子集不仅具有较高的准确率,而且与肿瘤相关。
{"title":"Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles","authors":"Shulin Wang, Huowang Chen, Shutao Li","doi":"10.1109/CIS.2007.169","DOIUrl":"https://doi.org/10.1109/CIS.2007.169","url":null,"abstract":"Although adopting feature reduction in classic rough set theory to select informative genes is an effective method, its classification accuracy rate is usually not higher compared with other tumor-related gene selection and tumor classification approaches; for gene expression values must be discretized before gene reduction, which leads to information loss in tumor classification. Therefore, the neighborhood rough set model proposed by Hu Qing-Hua is introduced to tumor classification, which omits the discretization procedure, so no information loss occurs before gene reduction. Experiments on two well-known tumor datasets show that gene selection using neighborhood rough set model obviously outperforms using classic rough set theory and experiment results also prove that the most of the selected gene subset not only has higher accuracy rate but also are related to tumor.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem 一种新的基于Schnorr密码体制的前向安全门限签名方案
Guosheng Cheng, Cuilan Yun
Based on Schnorr cryptosystem, this paper proposes a new forward-secure threshold signature scheme. It ensures that both the signature's secret key and the signature are forward-secure through efficiently hiding the current secret key in the signature phase and using the time-parameter effectively in the verification phase. This scheme has the new property that it is infeasible for an attacker to forge any valid signature pertaining to the past even if he has corrupted up to more than or equal to the threshold members and has obtained the current key. It is also proven to be forward secure based on the hardness of factoring in the random oracle model.
基于Schnorr密码体制,提出了一种新的前向安全门限签名方案。通过在签名阶段有效地隐藏当前密钥,在验证阶段有效地利用时间参数,保证了签名的秘密密钥和签名的前向安全。该方案具有新的特性,即攻击者即使损坏了超过或等于阈值成员并获得了当前密钥,也无法伪造任何属于过去的有效签名。基于随机oracle模型的分解难度,证明了该算法的前向安全性。
{"title":"A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem","authors":"Guosheng Cheng, Cuilan Yun","doi":"10.1109/CIS.2007.18","DOIUrl":"https://doi.org/10.1109/CIS.2007.18","url":null,"abstract":"Based on Schnorr cryptosystem, this paper proposes a new forward-secure threshold signature scheme. It ensures that both the signature's secret key and the signature are forward-secure through efficiently hiding the current secret key in the signature phase and using the time-parameter effectively in the verification phase. This scheme has the new property that it is infeasible for an attacker to forge any valid signature pertaining to the past even if he has corrupted up to more than or equal to the threshold members and has obtained the current key. It is also proven to be forward secure based on the hardness of factoring in the random oracle model.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Credential-Based Scheme for Cross-Domain File Sharing 一种高效的基于凭证的跨域文件共享方案
Lanxiang Chen, D. Feng
As cross-domain file sharing is important and existing schemes have some shortcomings, an efficient credential-based scheme is proposed in this paper. Symmetric-key credential, delegation without intervention of any centralized administrator, no need for traditional ACL and mapping remote group names to local identifiers are the features of the scheme. Symmetric-key credential is flexible, computationally efficient and can provide some useful revocation means. The way of no centralized administrator can ease management and administration overheads, and also avoid center point failure. The features of no need for traditional ACL and mapping remote group names to local identifiers have the advantage of reducing the burden of storage server. The processes of cross- domain delegation, authentication and revocation are discussed. And the security analysis indicates that the scheme is good.
针对跨域文件共享的重要性和现有方案的不足,本文提出了一种高效的基于证书的跨域文件共享方案。对称密钥凭证、无需任何集中管理员干预的委托、不需要传统的ACL以及将远程组名映射到本地标识符是该方案的特点。对称密钥证书灵活、计算效率高,可以提供一些有用的撤销手段。无集中管理员的方式可以简化管理和管理开销,也可以避免中心点故障。不需要传统的ACL,可以将远程组名映射到本地标识符,这样可以减少存储服务器的负担。讨论了跨域授权、认证和撤销的过程。安全性分析表明,该方案是良好的。
{"title":"An Efficient Credential-Based Scheme for Cross-Domain File Sharing","authors":"Lanxiang Chen, D. Feng","doi":"10.1109/CIS.2007.66","DOIUrl":"https://doi.org/10.1109/CIS.2007.66","url":null,"abstract":"As cross-domain file sharing is important and existing schemes have some shortcomings, an efficient credential-based scheme is proposed in this paper. Symmetric-key credential, delegation without intervention of any centralized administrator, no need for traditional ACL and mapping remote group names to local identifiers are the features of the scheme. Symmetric-key credential is flexible, computationally efficient and can provide some useful revocation means. The way of no centralized administrator can ease management and administration overheads, and also avoid center point failure. The features of no need for traditional ACL and mapping remote group names to local identifiers have the advantage of reducing the burden of storage server. The processes of cross- domain delegation, authentication and revocation are discussed. And the security analysis indicates that the scheme is good.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132745515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs 基于免疫进化算法的混合核参数选择方法及其在ids中的应用
Chun Yang, Haidong Yang, F. Deng
Supervised anomaly intrusion detection systems (IDSs) based on Support Vector Machines (SVMs) classification technique have attracted much more attention today. In these systems, the characteristics of kernels have great in- fluence on learning and prediction results for IDSs. How- ever, selecting feasible parameters can be time-consuming as the number of parameters and the size of the dataset in- crease. In this paper, an immune evolutionary based ker- nel parameter selection approach is proposed. Through the simulation of the denial of service attacks in mobile ad-hoc networks (MANETs), the result dataset is used for compar- ing the prediction performance using different types of ker- nels. At the same time, the parameter selection efficiency of the proposed approach is also compared with the differen- tial evolution algorithm.
基于支持向量机(svm)分类技术的监督异常入侵检测系统(ids)受到了越来越多的关注。在这些系统中,核的特性对ids的学习和预测结果有很大的影响。然而,随着参数数量和数据集大小的增加,选择可行的参数会耗费大量时间。提出了一种基于免疫进化的核参数选择方法。通过对移动自组织网络(manet)中拒绝服务攻击的仿真,比较了不同类型内核的预测性能。同时,将该方法的参数选择效率与差分进化算法进行了比较。
{"title":"A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs","authors":"Chun Yang, Haidong Yang, F. Deng","doi":"10.1109/CIS.2007.188","DOIUrl":"https://doi.org/10.1109/CIS.2007.188","url":null,"abstract":"Supervised anomaly intrusion detection systems (IDSs) based on Support Vector Machines (SVMs) classification technique have attracted much more attention today. In these systems, the characteristics of kernels have great in- fluence on learning and prediction results for IDSs. How- ever, selecting feasible parameters can be time-consuming as the number of parameters and the size of the dataset in- crease. In this paper, an immune evolutionary based ker- nel parameter selection approach is proposed. Through the simulation of the denial of service attacks in mobile ad-hoc networks (MANETs), the result dataset is used for compar- ing the prediction performance using different types of ker- nels. At the same time, the parameter selection efficiency of the proposed approach is also compared with the differen- tial evolution algorithm.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation 基于简单不变特征的分层均匀分割图像检索
Ming-xin Zhang, Zhaogan Lu, Junyi Shen
According to local information of images, region- based image retrieval is the focus of recent research works, as the approaches based global features can not achieve the expectation querying results. The objects of interest generally occupy only one small part of images, so the image segmentation with different object regions must be conducted for the region-based image retrieval schemes. However, accurate object segmentation is still beyond current computer vision technique. Here, we proposed one feasible image retrieval scheme based the hierarchical uniform segmentations, which avoid the complexity of image segmentations. Firstly, the querying image is segmented into equal blocks at different hierarchical levels, and the more blocks with larger hierarchical levels. Then, according to the similar metrics of these different size blocks to the expectation image into segmentations, the images containing querying objects can be retrieved with information about scales and locations of query objects in retrieved images. Finally, the proposed image retrieval schemes are tested by experiments via database with 500 images, and the retrieval accuracy can achieve 78% for the optimal similar metric threshold, and is comparable to that of region-based schemes.
根据图像的局部信息,基于区域的图像检索是近年来的研究热点,但基于全局特征的检索方法无法达到预期的检索结果。感兴趣的目标通常只占图像的一小部分,因此基于区域的图像检索方案必须对不同目标区域的图像进行分割。然而,目前的计算机视觉技术仍然无法实现准确的目标分割。本文提出了一种可行的基于分层均匀分割的图像检索方案,避免了图像分割的复杂性。首先,将查询图像在不同层次上分割成相等的块,层次越高的块越多;然后,根据这些不同大小块的相似度量将期望图像分割成块,检索包含查询对象的图像,检索图像中查询对象的尺度和位置信息。最后,通过500幅图像的数据库实验验证了所提出的图像检索方案,在最优相似度量阈值下,检索精度可达到78%,与基于区域的方案相当。
{"title":"Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation","authors":"Ming-xin Zhang, Zhaogan Lu, Junyi Shen","doi":"10.1109/CIS.2007.139","DOIUrl":"https://doi.org/10.1109/CIS.2007.139","url":null,"abstract":"According to local information of images, region- based image retrieval is the focus of recent research works, as the approaches based global features can not achieve the expectation querying results. The objects of interest generally occupy only one small part of images, so the image segmentation with different object regions must be conducted for the region-based image retrieval schemes. However, accurate object segmentation is still beyond current computer vision technique. Here, we proposed one feasible image retrieval scheme based the hierarchical uniform segmentations, which avoid the complexity of image segmentations. Firstly, the querying image is segmented into equal blocks at different hierarchical levels, and the more blocks with larger hierarchical levels. Then, according to the similar metrics of these different size blocks to the expectation image into segmentations, the images containing querying objects can be retrieved with information about scales and locations of query objects in retrieved images. Finally, the proposed image retrieval schemes are tested by experiments via database with 500 images, and the retrieval accuracy can achieve 78% for the optimal similar metric threshold, and is comparable to that of region-based schemes.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131095821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System 一种考虑电子经纪人系统中买卖双方信誉度和联系的新方法
Shaomin Zhang, Wei Wang
In the situation that there is not enough consideration about the trust level of the buyers and sellers in the existing connection methods which considers buyers' attributes more, a connection method based on the buyers and sellers is proposed, which heightens the importance of the trust level of the users in the computing of the transaction success probability. In this paper, we propose a material computing method for the attribute value, which is used in the new connection method. We use an improved trust model based on multiple factors for computing the users' creditability degree, which heightens the validity of the user's creditability degree. Theory and experiments all show that this method is more objective.
针对现有连接方法中对买卖双方信任程度考虑不足、更多考虑买方属性的情况,提出了一种基于买卖双方的连接方法,提高了用户信任程度在交易成功概率计算中的重要性。本文提出了一种属性值的材料计算方法,并将其应用于新连接方法中。我们采用改进的基于多因素的信任模型来计算用户的可信度,提高了用户可信度的有效性。理论和实验均表明,该方法更加客观。
{"title":"A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System","authors":"Shaomin Zhang, Wei Wang","doi":"10.1109/CIS.2007.147","DOIUrl":"https://doi.org/10.1109/CIS.2007.147","url":null,"abstract":"In the situation that there is not enough consideration about the trust level of the buyers and sellers in the existing connection methods which considers buyers' attributes more, a connection method based on the buyers and sellers is proposed, which heightens the importance of the trust level of the users in the computing of the transaction success probability. In this paper, we propose a material computing method for the attribute value, which is used in the new connection method. We use an improved trust model based on multiple factors for computing the users' creditability degree, which heightens the validity of the user's creditability degree. Theory and experiments all show that this method is more objective.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1