Image retrieval is a hot and hard technology in the field of computing science. In this paper, a method named r/KPSO (Particle Swarm Optimization with r- and K-selection) is applied in relevance feedback (RF) of image retrieval. The main idea of r/KPSO is inspired by the r- and K-selection of Ecology. r-selection can be characterized as: quantitative, little parent care, large growth rate and rapid development and K-selection as: qualitative, much parent care, small growth rate and slow development. Based on r/KPSO, we define the positive and negative feedback samples as study principle, and optimize weightings according to user's retrieval requirement. Experiments show that both the recall and precision are improved effectively.
图像检索是计算机科学领域的一个热点和难点技术。本文将r/KPSO (Particle Swarm Optimization with r- and K-selection)方法应用于图像检索的相关反馈。r/KPSO的主要思想受到生态学r-和k -选择的启发。r-选择表现为数量多、亲本照顾少、生长率大、发育快;k -选择表现为质量多、亲本照顾多、生长率小、发育慢。在r/KPSO的基础上,定义正负反馈样本作为研究原则,并根据用户的检索需求优化权重。实验表明,该方法有效地提高了查全率和查准率。
{"title":"An Image Retrieval Method Based on r/KPSO","authors":"Xu Zhang, B. Guo, Guiyue Zhang, Yunyi Yan","doi":"10.1109/IBICA.2011.22","DOIUrl":"https://doi.org/10.1109/IBICA.2011.22","url":null,"abstract":"Image retrieval is a hot and hard technology in the field of computing science. In this paper, a method named r/KPSO (Particle Swarm Optimization with r- and K-selection) is applied in relevance feedback (RF) of image retrieval. The main idea of r/KPSO is inspired by the r- and K-selection of Ecology. r-selection can be characterized as: quantitative, little parent care, large growth rate and rapid development and K-selection as: qualitative, much parent care, small growth rate and slow development. Based on r/KPSO, we define the positive and negative feedback samples as study principle, and optimize weightings according to user's retrieval requirement. Experiments show that both the recall and precision are improved effectively.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116866271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional machine learning methods for intrusiondetection can only detect known attacks since these methodsclassify data based on what they have learned. New attacks areunknown and are difficult to detect because they have notlearned. In this paper, we present an improved k-meansclustering-based intrusion detection method, which trains onunlabeled data in order to detect new attacks. The result ofexperiments run on the KDD Cup 1999 data set shows theimprovement in detection rate and decrease in false positiverate and the ability to detect unknown intrusions.
用于入侵检测的传统机器学习方法只能检测已知的攻击,因为这些方法基于它们所学到的内容对数据进行分类。新的攻击是未知的,很难检测到,因为它们没有学习。在本文中,我们提出了一种改进的基于k均值聚类的入侵检测方法,该方法对未标记的数据进行训练以检测新的攻击。在KDD Cup 1999数据集上运行的实验结果表明,该方法提高了检测率,减少了误报,并能够检测未知入侵。
{"title":"Research of Intrusion Detection Based on an Improved K-means Algorithm","authors":"Shenghui Wang","doi":"10.1109/IBICA.2011.72","DOIUrl":"https://doi.org/10.1109/IBICA.2011.72","url":null,"abstract":"Traditional machine learning methods for intrusiondetection can only detect known attacks since these methodsclassify data based on what they have learned. New attacks areunknown and are difficult to detect because they have notlearned. In this paper, we present an improved k-meansclustering-based intrusion detection method, which trains onunlabeled data in order to detect new attacks. The result ofexperiments run on the KDD Cup 1999 data set shows theimprovement in detection rate and decrease in false positiverate and the ability to detect unknown intrusions.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a significant biometric technique, 3D palm print authentication is better than 2D palm print authentication in several aspects. Previous work on 3D palm print recognition has concentrated on two aspects: (1) extracting the texture and line features using the binary image of 3D palm print, (2) extracting the orientation features using the Gabor filter and competitive code. In this paper we extract, for the first time, the 3D palm print features using the appearance-based linear discriminant analysis (LDA) method. The appearance-based LDA method can extract the global algebraic features of the biometrics. These features have been proven to have strong discriminability. We also investigated the relationship between the recognition accuracy and the resolution of the 3D palm print image. The experimental results show that the 3D palm print images with resolution and are better for 3D palm print recognition. The experiment results also show the feasibility of our method.
{"title":"Three Dimensional Palmprint Recognition Using Linear Discriminant Analysis Method","authors":"Jinrong Cui, Yong Xu","doi":"10.1109/IBICA.2011.31","DOIUrl":"https://doi.org/10.1109/IBICA.2011.31","url":null,"abstract":"As a significant biometric technique, 3D palm print authentication is better than 2D palm print authentication in several aspects. Previous work on 3D palm print recognition has concentrated on two aspects: (1) extracting the texture and line features using the binary image of 3D palm print, (2) extracting the orientation features using the Gabor filter and competitive code. In this paper we extract, for the first time, the 3D palm print features using the appearance-based linear discriminant analysis (LDA) method. The appearance-based LDA method can extract the global algebraic features of the biometrics. These features have been proven to have strong discriminability. We also investigated the relationship between the recognition accuracy and the resolution of the 3D palm print image. The experimental results show that the 3D palm print images with resolution and are better for 3D palm print recognition. The experiment results also show the feasibility of our method.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper is presented an approach of preventive maintenance that improves and enhances downside production efficiencies based on the non-stop maintenance. The approach focuses on reconfiguration and rerouting; besides, to prepare alternative configurations according to different reliability for each machine. In addition reliable probability of machines, there exist critical factors such as intercellular part movement, machine reallocation, machine utilization, part loading/unloading, and alternative routings that affect seriouslyproduction result. The important point that the so-greatperformance of my approach compared to others (e.g.machines are stopped to maintain) would be offset by theadvantages in terms of flexibility and limited use of resources.There are two objectives as follows, to achieve a condition ofnonstop maintenance, and to decrease drop of theperformances. Furthermore, the approach meaningfully notonly enhances production capabilities but also intelligentlyeliminate unexpected events. Finally, the impact of anapproach is illustrated through a small example.
{"title":"Performance Optimization of Reconfigurable Manufacturing Cell with Flexible Routing Capacity in Presence of Unreliable Machines","authors":"Wan-Ling Li, Muhammed Hafidz Fazli, T. Murata","doi":"10.1109/IBICA.2011.58","DOIUrl":"https://doi.org/10.1109/IBICA.2011.58","url":null,"abstract":"The paper is presented an approach of preventive maintenance that improves and enhances downside production efficiencies based on the non-stop maintenance. The approach focuses on reconfiguration and rerouting; besides, to prepare alternative configurations according to different reliability for each machine. In addition reliable probability of machines, there exist critical factors such as intercellular part movement, machine reallocation, machine utilization, part loading/unloading, and alternative routings that affect seriouslyproduction result. The important point that the so-greatperformance of my approach compared to others (e.g.machines are stopped to maintain) would be offset by theadvantages in terms of flexibility and limited use of resources.There are two objectives as follows, to achieve a condition ofnonstop maintenance, and to decrease drop of theperformances. Furthermore, the approach meaningfully notonly enhances production capabilities but also intelligentlyeliminate unexpected events. Finally, the impact of anapproach is illustrated through a small example.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127602600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Previous literature has suggested that psychological state may be changed via drinking coke, however, studies empirically documenting the link between coke and blood pressure wave (BPW) are scant. Therefore, the current article attempts to explore how coke intervene the mental condition with the assessment of pulse signal recordings. The quantitative analysis of the data was conducted through SAS, EXCEL and MATLAB package software in order to find a specific pattern of pulse spectrum. Results of this study showed the high frequency of heart rate variability increased from 34.83 to 43.83, and that of beat-to-beat pulse variability was enhanced from 7.67 to 35.5. The value of beat-to beat pulse variability in time-domain also went up. The relationship between sd1 and sd2 of RRI and HRV are positively correlated.
{"title":"What's Happening to Our Body after Drinking Coke? The Characteristic of the Blood Pressure Wave in Radial Artery","authors":"Sheng-Chieh Huang, Yung-Pin Lee, Min-Hua Hsieh, Hui-Min Wang, M. C. Hou, Shih-Chun Chao, Cheng-Lung Tseng, Wei-Ta Hsiao, Chung-Hung Hong, Kai-Yu Shao, Shi-Han Luo, Wei-Chun Chiu, Wei-Yu Chen","doi":"10.1109/IBICA.2011.15","DOIUrl":"https://doi.org/10.1109/IBICA.2011.15","url":null,"abstract":"Previous literature has suggested that psychological state may be changed via drinking coke, however, studies empirically documenting the link between coke and blood pressure wave (BPW) are scant. Therefore, the current article attempts to explore how coke intervene the mental condition with the assessment of pulse signal recordings. The quantitative analysis of the data was conducted through SAS, EXCEL and MATLAB package software in order to find a specific pattern of pulse spectrum. Results of this study showed the high frequency of heart rate variability increased from 34.83 to 43.83, and that of beat-to-beat pulse variability was enhanced from 7.67 to 35.5. The value of beat-to beat pulse variability in time-domain also went up. The relationship between sd1 and sd2 of RRI and HRV are positively correlated.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao-Ho Chen, Tsong-Yi Chen, Jeremy Lin, Da-Jinn Wang
This paper is dedicated to people tracking and identification in the multi-camera surveillance system. In the proposed method, each people-image is extracted among each camera and then is labeled with its color vector. Color vector provides a similar probability for each person appeared in different camera¡¦s surveillance frame. By combining the pedestrian¡¦s trajectory with relations among different surveillance areas, people identification can be achieved substantially. The experimental results show that the proposed method can effectively track and identify the moving people for normal situations in the multi-camera surveillance system.
{"title":"People Tracking in the Multi-camera Surveillance System","authors":"Chao-Ho Chen, Tsong-Yi Chen, Jeremy Lin, Da-Jinn Wang","doi":"10.1109/IBICA.2011.5","DOIUrl":"https://doi.org/10.1109/IBICA.2011.5","url":null,"abstract":"This paper is dedicated to people tracking and identification in the multi-camera surveillance system. In the proposed method, each people-image is extracted among each camera and then is labeled with its color vector. Color vector provides a similar probability for each person appeared in different camera¡¦s surveillance frame. By combining the pedestrian¡¦s trajectory with relations among different surveillance areas, people identification can be achieved substantially. The experimental results show that the proposed method can effectively track and identify the moving people for normal situations in the multi-camera surveillance system.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image recognition technologies have been used in many areas, and feature extraction of image is key step for image recognition. A novel feature extraction method using kernel self-optimized learning for image recognition. The scheme of image feature extraction includes textural extraction using Gabor wavelet, textural features reduction based on class-wise locality preserving projection with the nearest neighbor graph and common kernel discriminant vector. The nearest neighbor classifier is applied to image classification. The feasibility and performance of the algorithm are testified in the public image databases.
{"title":"Image Recognition Based on Kernel Self-Optimized Learning","authors":"S. Bu, Xun-Fei Liu, S. Chu, J. Roddick","doi":"10.1109/IBICA.2011.23","DOIUrl":"https://doi.org/10.1109/IBICA.2011.23","url":null,"abstract":"Image recognition technologies have been used in many areas, and feature extraction of image is key step for image recognition. A novel feature extraction method using kernel self-optimized learning for image recognition. The scheme of image feature extraction includes textural extraction using Gabor wavelet, textural features reduction based on class-wise locality preserving projection with the nearest neighbor graph and common kernel discriminant vector. The nearest neighbor classifier is applied to image classification. The feasibility and performance of the algorithm are testified in the public image databases.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper analyzes the situation while the SAP HR system is running independently, its personal information, department information, and the relationship between them need to be referenced by multiple peripheral systems. So the target systems need to synchronize the HR data with SAP periodically. Currently, most databases are accessed directly by ODBC/JDBC, which are much more expensive, except oriented databases. To resolve these problems, the paper introduces a new method , using SAP-SFU-BIMS to be the data interface between SAP HR system and peripheral systems. The result shows that the method can improve the performance while reducing the number of interfaces between SAP system and peripheral systems. It provides a good reference for the design of data transfer interface.
{"title":"Design and Realization of Distinctive Data Interface Based on SAP HR System","authors":"Wei Zhou, Xiao-Qian Zhu, Li-Xuan Ye","doi":"10.1109/IBICA.2011.73","DOIUrl":"https://doi.org/10.1109/IBICA.2011.73","url":null,"abstract":"The paper analyzes the situation while the SAP HR system is running independently, its personal information, department information, and the relationship between them need to be referenced by multiple peripheral systems. So the target systems need to synchronize the HR data with SAP periodically. Currently, most databases are accessed directly by ODBC/JDBC, which are much more expensive, except oriented databases. To resolve these problems, the paper introduces a new method , using SAP-SFU-BIMS to be the data interface between SAP HR system and peripheral systems. The result shows that the method can improve the performance while reducing the number of interfaces between SAP system and peripheral systems. It provides a good reference for the design of data transfer interface.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Yuan Lien, Chien-Chuan Huang, Pei-Yin Chen, Hung-Yu Yang
An efficient edge-preserving algorithm for removal of random-valued impulse noise from corrupted images is proposed in this paper. We employ an efficient impulse noise detector to detect the noisy pixels, and an edge-preserving filter to reconstruct the intensity values of noisy pixels. Extensive experimental results show that the proposed technique not only preserves the edge features, but also obtains excellent performances in terms of quantitative evaluation and visual quality. Since our algorithm requires only low computational complexity, it is very suitable to be applied to many real-time applications.
{"title":"An Efficient Denoising Approach for Random-Valued Impulse Noise in Digital Images","authors":"Chih-Yuan Lien, Chien-Chuan Huang, Pei-Yin Chen, Hung-Yu Yang","doi":"10.1109/IBICA.2011.8","DOIUrl":"https://doi.org/10.1109/IBICA.2011.8","url":null,"abstract":"An efficient edge-preserving algorithm for removal of random-valued impulse noise from corrupted images is proposed in this paper. We employ an efficient impulse noise detector to detect the noisy pixels, and an edge-preserving filter to reconstruct the intensity values of noisy pixels. Extensive experimental results show that the proposed technique not only preserves the edge features, but also obtains excellent performances in terms of quantitative evaluation and visual quality. Since our algorithm requires only low computational complexity, it is very suitable to be applied to many real-time applications.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Wey, Te-Hsuan Liu, Min-Chuan Lin, Ruey-Lue Wang, C.-M. Yeh, Chen-Wei Yu, Chen-Fu Lin, H. Tsai, Y. Juang
In this paper, a CMOS temperature sensor using cascaded PNP transistors was designed and measured. The commonly used band gap reference current source, which used bipolar junction transistors (BJTs) to implement output current components with negative and positive temperature coefficients, was adopted to generate a temperature-insensitive reference current source. The base-emitter voltage (VEB), i.e. output voltage, of a PNP BJT under a constant collector biasing current demonstrates a negative temperature coefficient. To enhance sensitivity of transfer characteristics of the output voltage versus temperature, two PNP BJTs under a constant collector biasing current were arranged into a Darlington-pair topology and were used as a temperature sensor. Temperature sensor has the sensitivity of-3.93 mV/„aC with the temperature error of „b0.6„aC or so for the calibrated temperature ranging from-15„aC to 110„aC.
{"title":"A CMOS Temperature Sensor Using Cascoded PNP Transistors","authors":"T. Wey, Te-Hsuan Liu, Min-Chuan Lin, Ruey-Lue Wang, C.-M. Yeh, Chen-Wei Yu, Chen-Fu Lin, H. Tsai, Y. Juang","doi":"10.1109/IBICA.2011.61","DOIUrl":"https://doi.org/10.1109/IBICA.2011.61","url":null,"abstract":"In this paper, a CMOS temperature sensor using cascaded PNP transistors was designed and measured. The commonly used band gap reference current source, which used bipolar junction transistors (BJTs) to implement output current components with negative and positive temperature coefficients, was adopted to generate a temperature-insensitive reference current source. The base-emitter voltage (VEB), i.e. output voltage, of a PNP BJT under a constant collector biasing current demonstrates a negative temperature coefficient. To enhance sensitivity of transfer characteristics of the output voltage versus temperature, two PNP BJTs under a constant collector biasing current were arranged into a Darlington-pair topology and were used as a temperature sensor. Temperature sensor has the sensitivity of-3.93 mV/„aC with the temperature error of „b0.6„aC or so for the calibrated temperature ranging from-15„aC to 110„aC.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}