This paper discusses the relationship between Danger Theory and image object detection, and interprets the produce of the image object detection using Danger Theory. In the paper, the image object detection is mimiced as the produce that biology immune system detects danger antigens, where the interested object are regarded as ldquodanger antigensrdquo and object detectors are regarded as antigen present cells. The architecture of Danger Perception Network (DPNET) and learning algorithms are described in the paper, and the approach of applying Danger Theory in image target detection is also presented. Experiments of vehicle and airplane detection in high resolution satellite images are given to illustrate the feasibility and effectively of proposed method.
{"title":"A Novel Object Detection Approach for Satellite Imagery Based on Danger Theory","authors":"Hong Zheng, Xuemin Hu, Xiaoshu Si, Wenbiao Yang","doi":"10.1109/ICINIS.2008.26","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.26","url":null,"abstract":"This paper discusses the relationship between Danger Theory and image object detection, and interprets the produce of the image object detection using Danger Theory. In the paper, the image object detection is mimiced as the produce that biology immune system detects danger antigens, where the interested object are regarded as ldquodanger antigensrdquo and object detectors are regarded as antigen present cells. The architecture of Danger Perception Network (DPNET) and learning algorithms are described in the paper, and the approach of applying Danger Theory in image target detection is also presented. Experiments of vehicle and airplane detection in high resolution satellite images are given to illustrate the feasibility and effectively of proposed method.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"49 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116319787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A low computational complexity instantaneous linear mixture signals blind separation algorithm was proposed, which is based on the character that Signal Noise Ratio (SNR) is maximal when statistically independent source signals are completely separated, and it is used as a separation contrast. Source signals are replaced by moving average of estimate signals. The function of covariance matrixes of the source signals and noises was expressed by the generalized eigenvalue (GE) problem, and unmixing matrix was achieved by solving the generalized eigenvalue problem without any iterative. Compared to the typical information-theoretical approaches, the merit of this algorithm is effectively and low complexity in computation.
{"title":"Blind Source Separation Algorithm Based on Maximum Signal Noise Ratio","authors":"Jiancang Ma, Xiaobing Zhang","doi":"10.1109/ICINIS.2008.109","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.109","url":null,"abstract":"A low computational complexity instantaneous linear mixture signals blind separation algorithm was proposed, which is based on the character that Signal Noise Ratio (SNR) is maximal when statistically independent source signals are completely separated, and it is used as a separation contrast. Source signals are replaced by moving average of estimate signals. The function of covariance matrixes of the source signals and noises was expressed by the generalized eigenvalue (GE) problem, and unmixing matrix was achieved by solving the generalized eigenvalue problem without any iterative. Compared to the typical information-theoretical approaches, the merit of this algorithm is effectively and low complexity in computation.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a fast view scheme of mass remote sensing images based on image pyramid is described and implemented. The key techniques in this scheme are tiling, image pyramid, and cache scheduling management. This scheme employs tiling to break the limit of the Windows process memory and improve the I/O speed of hard disk. A wavelet based image pyramid is built for multi-resolution displaying. Cache scheduling management is used for reducing the time latency of image loading. In the case of dragging an image, the viewer uses the existing tile in cache to quickly update the view and replaces the tiles in cache corresponding to the updated view. The experiment results show that this scheme is effective in fast view of mass images.
{"title":"Fast View of Mass Remote Sensing Images Based-on Image Pyramid","authors":"Xiyan Wei, Xin Lu, Hong Sun","doi":"10.1109/ICINIS.2008.75","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.75","url":null,"abstract":"In this paper, a fast view scheme of mass remote sensing images based on image pyramid is described and implemented. The key techniques in this scheme are tiling, image pyramid, and cache scheduling management. This scheme employs tiling to break the limit of the Windows process memory and improve the I/O speed of hard disk. A wavelet based image pyramid is built for multi-resolution displaying. Cache scheduling management is used for reducing the time latency of image loading. In the case of dragging an image, the viewer uses the existing tile in cache to quickly update the view and replaces the tiles in cache corresponding to the updated view. The experiment results show that this scheme is effective in fast view of mass images.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A flexible inclination measurement system based on wireless sensor network (WSN) is proposed, and the structure of the system, the principle of inclination measurement and the hardware design of the system are described in details. The system that includes accelerometer, MCU, A/D converter and 2.4G wireless transceiver has achieved inclination measurement of high precision in a wide range. Two practical application examples are suggested.
{"title":"A Flexible Inclination Measurement System Based on Wireless Sensor Network","authors":"Kaiming Xi, S. Liang, B. Pang, Qin Zhu","doi":"10.1109/ICINIS.2008.141","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.141","url":null,"abstract":"A flexible inclination measurement system based on wireless sensor network (WSN) is proposed, and the structure of the system, the principle of inclination measurement and the hardware design of the system are described in details. The system that includes accelerometer, MCU, A/D converter and 2.4G wireless transceiver has achieved inclination measurement of high precision in a wide range. Two practical application examples are suggested.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Resilient function was widely applied in fields like fault-tolerance distributed computing, key distribution in the quantum cryptography and the generation of random sequence in the stream cipher. Resilient function is a static fault-tolerance distributed computing system which has a strong fault-tolerance and intrusion-tolerance ability. A fragmentating algorithm based resilient function was presented in this paper which aims at dealing the fragmentating problem in resilience system. It includes the selection of resilient functions, the description of fragmentating algorithm and the comparison with the Rabin algorithm. This algorithm is convenient and feasible via the analysis of its capability.
{"title":"An Information Fragmentating Algorithm Based Resilient Function in Computing Resiliency","authors":"Sun Jingjing, Wang Xiangpei, Oyang Lujun","doi":"10.1109/ICINIS.2008.175","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.175","url":null,"abstract":"Resilient function was widely applied in fields like fault-tolerance distributed computing, key distribution in the quantum cryptography and the generation of random sequence in the stream cipher. Resilient function is a static fault-tolerance distributed computing system which has a strong fault-tolerance and intrusion-tolerance ability. A fragmentating algorithm based resilient function was presented in this paper which aims at dealing the fragmentating problem in resilience system. It includes the selection of resilient functions, the description of fragmentating algorithm and the comparison with the Rabin algorithm. This algorithm is convenient and feasible via the analysis of its capability.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ZigBee offers a practical application solution coupled with low rate, low cost, low energy consumption characteristics for WSNs. There are many ZigBee monitoring systems which have been developed based on ZigBee. Energy consumption and latency are two critical performance measurements in most monitoring systems. The design of routing strategy in network layer may affect these two performance measurements. Energy consumption and latency of different routing algorithms are given based on analysis about ZigBee routing strategy including AODVjr and the hierarchical routing algorithm. This paper describes an improved ZigBee routing strategy for monitoring system and gives the realization about it. This paper is meant to aid researchers in developing their own monitoring system based on ZigBee and assist users in determining the ZigBee routing strategy that best fits their needs.
{"title":"An Improved ZigBee Routing Strategy for Monitoring System","authors":"Xiaohui Li, K. Fang, Jinguang Gu, L. Zhang","doi":"10.1109/ICINIS.2008.118","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.118","url":null,"abstract":"ZigBee offers a practical application solution coupled with low rate, low cost, low energy consumption characteristics for WSNs. There are many ZigBee monitoring systems which have been developed based on ZigBee. Energy consumption and latency are two critical performance measurements in most monitoring systems. The design of routing strategy in network layer may affect these two performance measurements. Energy consumption and latency of different routing algorithms are given based on analysis about ZigBee routing strategy including AODVjr and the hierarchical routing algorithm. This paper describes an improved ZigBee routing strategy for monitoring system and gives the realization about it. This paper is meant to aid researchers in developing their own monitoring system based on ZigBee and assist users in determining the ZigBee routing strategy that best fits their needs.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126281596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, on the basis of management information systems (MIS) evaluation index system, a integrated evaluation model is established by using support vector machine. The method has advantages of accuracy, convenience, reliability and rapidity. It can simulate evaluation made by experts and avoid subjective mistakes. The comparison between simulation and empirical analysis proves this method is effective.
{"title":"The Application of SVM in Integrated Evaluation for MIS","authors":"Yang Qisheng, Zhang Yanfei, Tong Huaishui","doi":"10.1109/ICINIS.2008.88","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.88","url":null,"abstract":"In this paper, on the basis of management information systems (MIS) evaluation index system, a integrated evaluation model is established by using support vector machine. The method has advantages of accuracy, convenience, reliability and rapidity. It can simulate evaluation made by experts and avoid subjective mistakes. The comparison between simulation and empirical analysis proves this method is effective.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposed a topology clustering scheme based on genetic algorithm (GACluster) to improve the topology clustering performance in the course of constructing the hierarchical overlay multicast. The scheme firstly constructed the clustering feature space by normalizing the two routing metrics (overlay path delay and overlay node access bandwidth), and then implemented genetic algorithm for the topology clustering operation. The experiments illustrated, compared with the common clustering method HCM, that the proposed scheme performs better in both the clustering performance and the topology optimization.
{"title":"A GA-Based Clustering Scheme for Overlay Multicast Topology Optimization","authors":"Jun Lu, Bing Qi","doi":"10.1109/ICINIS.2008.112","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.112","url":null,"abstract":"This paper proposed a topology clustering scheme based on genetic algorithm (GACluster) to improve the topology clustering performance in the course of constructing the hierarchical overlay multicast. The scheme firstly constructed the clustering feature space by normalizing the two routing metrics (overlay path delay and overlay node access bandwidth), and then implemented genetic algorithm for the topology clustering operation. The experiments illustrated, compared with the common clustering method HCM, that the proposed scheme performs better in both the clustering performance and the topology optimization.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image registration has been widely used in many works of image processing. But it is difficult to find the accuracy information such as translation, rotation, and scaling between images. This paper proposes an algorithm that Fourier based image registration using the pyramid edge detection and line fitting. It is possible to find the registration information of sub-pixel. So, we can find more accurate registration information. The proposed algorithm can be used for image registrations which high efficiency is required such as GIS, or MRI, CT, image mosaicing, weather forecasting, etc.
{"title":"Fourier Based Image Registration for Sub-Pixel Using Pyramid Edge Detection and Line Fitting","authors":"Kee-Baek Kim, Jong Soo Kim, Jongsoo Choi","doi":"10.1109/ICINIS.2008.178","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.178","url":null,"abstract":"Image registration has been widely used in many works of image processing. But it is difficult to find the accuracy information such as translation, rotation, and scaling between images. This paper proposes an algorithm that Fourier based image registration using the pyramid edge detection and line fitting. It is possible to find the registration information of sub-pixel. So, we can find more accurate registration information. The proposed algorithm can be used for image registrations which high efficiency is required such as GIS, or MRI, CT, image mosaicing, weather forecasting, etc.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Printed document examination plays an important role in public security. A printer identification system is presented for the purpose of identifying the printer which created a suspect printed document. It is composed of image acquisition, image preprocessing and character matching. An optical instrument is developed for document image observation and acquisition under high resolution. Normalized printed characters are obtained and recognized in preprocessing. Distance transform algorithm is applied to character image matching and distance between printed documents is calculated. Finally the minimum distance classifier is applied to printer identification. Experiments are carried out in a database including 45 laser printers and very promising results are achieved.
{"title":"Printer Identification Based on Distance Transform","authors":"Wei Deng, Qinghu Chen, Feng Yuan, Yuchen Yan","doi":"10.1109/ICINIS.2008.158","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.158","url":null,"abstract":"Printed document examination plays an important role in public security. A printer identification system is presented for the purpose of identifying the printer which created a suspect printed document. It is composed of image acquisition, image preprocessing and character matching. An optical instrument is developed for document image observation and acquisition under high resolution. Normalized printed characters are obtained and recognized in preprocessing. Distance transform algorithm is applied to character image matching and distance between printed documents is calculated. Finally the minimum distance classifier is applied to printer identification. Experiments are carried out in a database including 45 laser printers and very promising results are achieved.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}