Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599306
Z. Qiang, Li Panchi
Aiming at the problems that the Structural Formula Process Neural Network (SFPNN) model has more study parameters, compute complexly after orthogonal basis expanding, and is difficult to converge. A quantum evolutionary algorithm is presented based on the quantum theory. The algorithm used the Pauli matrices to establish the axis of rotation, used qubits in Bloch sphere to rotate around the axis method to carry out optimal search, each particle represents three optimal solution to be updated at the same time, using the Hadamard gate achieve individual variability to avoid premature, enhancing the ergodicity of the solution space, expanding the search range of solution space, and approaching global optimal solution faster Taking network traffic and sunspot number prediction as an application, the simulation results show that the algorithm is validity.
针对结构公式过程神经网络(Structural Formula Process Neural Network, SFPNN)模型研究参数多、正交基展开后计算复杂、难以收敛等问题。提出了一种基于量子理论的量子进化算法。该算法利用泡利矩阵建立旋转轴,利用布洛赫球中的量子比特绕轴旋转的方法进行最优搜索,每个粒子代表三个需要同时更新的最优解,利用Hadamard门实现个体可变性,避免了早熟,增强了解空间的遍历性,扩大了解空间的搜索范围。以网络流量和太阳黑子数预测为例,仿真结果表明该算法是有效的。
{"title":"Design and application of Structural Formula Process Neural Network based on quantum evolutionary algorithm","authors":"Z. Qiang, Li Panchi","doi":"10.1109/ICWAPR.2013.6599306","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599306","url":null,"abstract":"Aiming at the problems that the Structural Formula Process Neural Network (SFPNN) model has more study parameters, compute complexly after orthogonal basis expanding, and is difficult to converge. A quantum evolutionary algorithm is presented based on the quantum theory. The algorithm used the Pauli matrices to establish the axis of rotation, used qubits in Bloch sphere to rotate around the axis method to carry out optimal search, each particle represents three optimal solution to be updated at the same time, using the Hadamard gate achieve individual variability to avoid premature, enhancing the ergodicity of the solution space, expanding the search range of solution space, and approaching global optimal solution faster Taking network traffic and sunspot number prediction as an application, the simulation results show that the algorithm is validity.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599334
Yan Zheng, A. Rinoshika
The three-dimensional orthogonal wavelet multi-resolution technique was applied to analyze flow structures of various scales behind a dune model The three-dimensional dune wake flow was evaluated by using large eddy simulation (LES) at a Reynolds number of 5530. The instantaneous velocity and vorticity were decomposed into the large-, intermediate- and relatively small-scale components by the wavelet multi-resolution technique. The coherent structure are visualized by Q-criterion. It is found that the rollers and horse-shoe structure in the separation bubble are mainly contributed from large-scale structures, furthermore, some horse-shoe structures can be clearly identified by intermediate-scale structures, the coherent structures are the combined effect of large-scale and intermediate-scale structures. The velocity and vorticity of large-scale structure dominate the dune wake flow and the vorticity concentration makes main contribution, and the intermediate-scale as well as the relatively small-scale ones tends to become more active as the flow flows downstream.
{"title":"Wavelet multi-resolution analysis on vortical structures of a dune wake based on large eddy simulation","authors":"Yan Zheng, A. Rinoshika","doi":"10.1109/ICWAPR.2013.6599334","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599334","url":null,"abstract":"The three-dimensional orthogonal wavelet multi-resolution technique was applied to analyze flow structures of various scales behind a dune model The three-dimensional dune wake flow was evaluated by using large eddy simulation (LES) at a Reynolds number of 5530. The instantaneous velocity and vorticity were decomposed into the large-, intermediate- and relatively small-scale components by the wavelet multi-resolution technique. The coherent structure are visualized by Q-criterion. It is found that the rollers and horse-shoe structure in the separation bubble are mainly contributed from large-scale structures, furthermore, some horse-shoe structures can be clearly identified by intermediate-scale structures, the coherent structures are the combined effect of large-scale and intermediate-scale structures. The velocity and vorticity of large-scale structure dominate the dune wake flow and the vorticity concentration makes main contribution, and the intermediate-scale as well as the relatively small-scale ones tends to become more active as the flow flows downstream.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599304
M. Zhang, Liyuan Xu, Su-juan Wang, Yulin He
Gaussian kernel is a continous kernel which is always used in the re-substitution entropy estimator (RSEE) to estimate the underlying entropy for the continuous random variable. Meanwhile, there are also some other discontinuous kernels that can be used to conduct the probability density function estimation and kernel regression analysis. The theoretical study indicates that some of these discontinuous kernels can obtain higher estimation efficiencies than Gaussian kernel. Thus, in this paper, we introduce six discontinuous kernels, i.e. Uniform, Triangular, Epanechnikov, Biweight, Triweight and Cosine, to establish the RESS. Firstly, we analyses mathematical properties of employed discontinuous kernels. Then, RESSs based discontinuous kernels are designed. Finally, extensive experiments are carried out to compare discontinuous kernels based RESSs with the Gaussian kernel based RESS in terms of estimation accuracy and stability. Experimental results show that discontinuous kernels can obtain better performances than Gaussian kernel.
{"title":"Constructing re-substitution entropy estimator with discontinuous kernels","authors":"M. Zhang, Liyuan Xu, Su-juan Wang, Yulin He","doi":"10.1109/ICWAPR.2013.6599304","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599304","url":null,"abstract":"Gaussian kernel is a continous kernel which is always used in the re-substitution entropy estimator (RSEE) to estimate the underlying entropy for the continuous random variable. Meanwhile, there are also some other discontinuous kernels that can be used to conduct the probability density function estimation and kernel regression analysis. The theoretical study indicates that some of these discontinuous kernels can obtain higher estimation efficiencies than Gaussian kernel. Thus, in this paper, we introduce six discontinuous kernels, i.e. Uniform, Triangular, Epanechnikov, Biweight, Triweight and Cosine, to establish the RESS. Firstly, we analyses mathematical properties of employed discontinuous kernels. Then, RESSs based discontinuous kernels are designed. Finally, extensive experiments are carried out to compare discontinuous kernels based RESSs with the Gaussian kernel based RESS in terms of estimation accuracy and stability. Experimental results show that discontinuous kernels can obtain better performances than Gaussian kernel.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599283
Yi Tang, Yi Ding, Ting-ting Zhou
Based on the assumption of sparse representation and the theory of compressed sensing, Yang et al. propose an excellent super-resolution algorithm. However, the process of training coupled dictionaries cannot be perfectly connected with the process of reconstructing super-resolution images in theory. Therefore, a novel dictionary-based super-resolution algorithm is proposed in this paper. Different from Yang's algorithm, the low- and high-resolution dictionaries are separately trained by employing an L2-Boosting algorithm. Extensive experiments validate that our algorithm can surpass Yang's algorithm in both visual perception and statistical performance.
{"title":"L2-Boosting-based dictionary learning for super-resolution","authors":"Yi Tang, Yi Ding, Ting-ting Zhou","doi":"10.1109/ICWAPR.2013.6599283","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599283","url":null,"abstract":"Based on the assumption of sparse representation and the theory of compressed sensing, Yang et al. propose an excellent super-resolution algorithm. However, the process of training coupled dictionaries cannot be perfectly connected with the process of reconstructing super-resolution images in theory. Therefore, a novel dictionary-based super-resolution algorithm is proposed in this paper. Different from Yang's algorithm, the low- and high-resolution dictionaries are separately trained by employing an L2-Boosting algorithm. Extensive experiments validate that our algorithm can surpass Yang's algorithm in both visual perception and statistical performance.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599301
Jia Duan, Yuanyan Tang, C. Guo, Chi Fang, Xian Chuan Hu
This paper analyzes the traditional hidden surface removal methods and makes a comparison. And for the discrete spatial points, it proposes a new approach to remove the hidden line/surface. Then describe the idea, main steps and every methods used in each step in details. Thus, the boundary detection which learns from the edge detection algorithm comes into being. Finally, the experimental result testifies the availability of this algorithm.
{"title":"Boundary expansion: An hidden surface removal method based on boundary detection for discrete points","authors":"Jia Duan, Yuanyan Tang, C. Guo, Chi Fang, Xian Chuan Hu","doi":"10.1109/ICWAPR.2013.6599301","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599301","url":null,"abstract":"This paper analyzes the traditional hidden surface removal methods and makes a comparison. And for the discrete spatial points, it proposes a new approach to remove the hidden line/surface. Then describe the idea, main steps and every methods used in each step in details. Thus, the boundary detection which learns from the edge detection algorithm comes into being. Finally, the experimental result testifies the availability of this algorithm.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599321
Hui-lan Luo, Kai Peng
The paper proposes an capable approach of handling partial occlusion and local pose variation. Part detectors which contain position information for half of the sliding window are learned from the training data using the HOG feature and Adaboost. For each testing window, the response of each part detector is summed as a final response. With multi-part-detector approach which only need to compute gradient of the window once, better performance is achieved than whole window detector on the INRIA dataset.
{"title":"Multi-part-detector for human detection","authors":"Hui-lan Luo, Kai Peng","doi":"10.1109/ICWAPR.2013.6599321","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599321","url":null,"abstract":"The paper proposes an capable approach of handling partial occlusion and local pose variation. Part detectors which contain position information for half of the sliding window are learned from the training data using the HOG feature and Adaboost. For each testing window, the response of each part detector is summed as a final response. With multi-part-detector approach which only need to compute gradient of the window once, better performance is achieved than whole window detector on the INRIA dataset.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125195835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599290
Yan-Xin Xu, Zuoxian Fu, Siqi Li
In this paper, a tight single-orthogonal wavelet support on the basis of its translation as a number of wavelet functions to construct the two-tight support symmetric multi-wavelet is given. The method which constructs multi-wavelet smooth approximation is simple and easy. The support length is shorter than the single wavelet. The proposed method in this paper has a better practical value.
{"title":"A special of construction of multi-wavelet","authors":"Yan-Xin Xu, Zuoxian Fu, Siqi Li","doi":"10.1109/ICWAPR.2013.6599290","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599290","url":null,"abstract":"In this paper, a tight single-orthogonal wavelet support on the basis of its translation as a number of wavelet functions to construct the two-tight support symmetric multi-wavelet is given. The method which constructs multi-wavelet smooth approximation is simple and easy. The support length is shorter than the single wavelet. The proposed method in this paper has a better practical value.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134478515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599318
Rui Wang, Xing Shen, Yuehua Li, Yuemin Zhu, Chun Hui, Su Zhang
In the diagnosis and treatment of acute cerebral infarction, it will be helpful for doctors to implement disease assessment and develop treatment plans if infarct and cytotoxic brain edema around the infarct can be observed and distinguished. In this paper, a method of fuzzy c-means clustering combined with Dempster-Shafter theory is used to achieve lesion segmentation by combining information from two different modalities of magnetic resonance imaging. The basic probability assignment function of each image type is obtained from membership degrees of all image pixels in image using fuzzy c-means clustering method. Dempster-Shafer combination rule is then applied on different basic probability functions corresponding to the modal images to decrease uncertainty and conflicting information. The results show that infarct and cytotoxic brain edema around the infarct can be distinguished in the final segmentation map, and that the size and outline of the edema area are accurate, which will help doctors diagnose and assess situation of patients with acute cerebral infarction.
{"title":"Lesion segmentation in acute cerebral infarction based on Dempster-Shafer theory","authors":"Rui Wang, Xing Shen, Yuehua Li, Yuemin Zhu, Chun Hui, Su Zhang","doi":"10.1109/ICWAPR.2013.6599318","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599318","url":null,"abstract":"In the diagnosis and treatment of acute cerebral infarction, it will be helpful for doctors to implement disease assessment and develop treatment plans if infarct and cytotoxic brain edema around the infarct can be observed and distinguished. In this paper, a method of fuzzy c-means clustering combined with Dempster-Shafter theory is used to achieve lesion segmentation by combining information from two different modalities of magnetic resonance imaging. The basic probability assignment function of each image type is obtained from membership degrees of all image pixels in image using fuzzy c-means clustering method. Dempster-Shafer combination rule is then applied on different basic probability functions corresponding to the modal images to decrease uncertainty and conflicting information. The results show that infarct and cytotoxic brain edema around the infarct can be distinguished in the final segmentation map, and that the size and outline of the edema area are accurate, which will help doctors diagnose and assess situation of patients with acute cerebral infarction.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126443562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599291
Yafeng Zhou, W. W. Ng
Researches about steganography and watermark mostly focus on either field separately. However, their correlation is ignored while they apply highly similar techniques to hide information in images. Watermark is commonly added in some websites after an image is uploaded. In this work, we study the influence of steganalysis caused by watermarking. Several watermarking and steganography algorithms, both classical and recent, are implemented and tested using an L-GEM based RBFNN. Experimental results show a degradation of steganalysis when the watermarking and steganography use similar embedding techniques. Moreover, the steganalysis accuracies depend on the use of embedding techniques in training datasets. If training images do not have watermarks while testing images have, the detection rates decrease significantly. This creates a new and easy steganography method to avoid steganalysis.
{"title":"A study of influence between digital watermarking and steganography","authors":"Yafeng Zhou, W. W. Ng","doi":"10.1109/ICWAPR.2013.6599291","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599291","url":null,"abstract":"Researches about steganography and watermark mostly focus on either field separately. However, their correlation is ignored while they apply highly similar techniques to hide information in images. Watermark is commonly added in some websites after an image is uploaded. In this work, we study the influence of steganalysis caused by watermarking. Several watermarking and steganography algorithms, both classical and recent, are implemented and tested using an L-GEM based RBFNN. Experimental results show a degradation of steganalysis when the watermarking and steganography use similar embedding techniques. Moreover, the steganalysis accuracies depend on the use of embedding techniques in training datasets. If training images do not have watermarks while testing images have, the detection rates decrease significantly. This creates a new and easy steganography method to avoid steganalysis.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-14DOI: 10.1109/ICWAPR.2013.6599333
T. Kato, Zhong Zhang, H. Toda, T. Imamura, T. Miyake
Previously, Discrete wavelet Transform(DWT) is well known for useful image processing method. Complex Discrete Wavelet Transform(CDWT) is one of the DWT and has the function called directional selection. This is the expected to be applied into shape and texture analysis. But the principle of directional selection is still not clear. In this paper, we consider the principle of directional selection. After that, we propose the evaluation method for directional selection based on the principle. Finally, we confirm the validity of evaluation method.
{"title":"The principle and evaluation method of directional selection of complex wavelet transform","authors":"T. Kato, Zhong Zhang, H. Toda, T. Imamura, T. Miyake","doi":"10.1109/ICWAPR.2013.6599333","DOIUrl":"https://doi.org/10.1109/ICWAPR.2013.6599333","url":null,"abstract":"Previously, Discrete wavelet Transform(DWT) is well known for useful image processing method. Complex Discrete Wavelet Transform(CDWT) is one of the DWT and has the function called directional selection. This is the expected to be applied into shape and texture analysis. But the principle of directional selection is still not clear. In this paper, we consider the principle of directional selection. After that, we propose the evaluation method for directional selection based on the principle. Finally, we confirm the validity of evaluation method.","PeriodicalId":236156,"journal":{"name":"2013 International Conference on Wavelet Analysis and Pattern Recognition","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}