首页 > 最新文献

2006 International Conference on Advanced Computing and Communications最新文献

英文 中文
Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher 万维网中的消息完整性:嵌套哈希函数和快速流密码的使用
Pub Date : 2006-12-20 DOI: 10.1109/ADCOM.2006.4289872
S. Mathew, K. P. Jacob
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.
这项工作的重点是以一种快速和经济有效的方式提供消息的身份验证和机密性,以适应快速增长的Internet应用程序。设计了一个具有较低计算和存储需求的嵌套哈希函数,目的是提供身份验证,并使用具有128位或256位可变密钥大小的快速流密码MAJE4加密消息和哈希码,以实现机密性。嵌套哈希函数和MAJE4流密码算法都使用微处理器中常见的原始计算运算符;这使得该方法在硬件和软件上实现简单、快速。由于内存需求较少,因此可以用于出于安全目的的手持设备。
{"title":"Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher","authors":"S. Mathew, K. P. Jacob","doi":"10.1109/ADCOM.2006.4289872","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289872","url":null,"abstract":"The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124801662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Neuro - Genetic approaches to classification of Face Images with effective feature selection using hybrid classifiers 基于混合分类器的有效特征选择的人脸图像神经遗传分类方法
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289901
K. Umamaheswari, S. Sumathi, S. Sivanandam
The ever-increasing volume in the collection of image data in various fields of science, medicine, security and other fields has brought the necessity to extract knowledge. Face classification/recognition is one of the challenging problems of computer vision. The use of Data mining techniques has a legitimate and enabling ways to explore these large image collections using neuro-genetic approaches. A novel Symmetric Based Algorithm is proposed for face detection in still gray level images, which acts as a selective attentional mechanism. The three face classifiers/recognizers, Linear Discriminant Analysis (LDA), Line Based Algorithm (LBA) and Kernel Direct Discriminant Analysis (KDDA) are fused using Radial Basis network for efficient feature extraction of the face images. The use of Genetic algorithm approach optimizes the weights of neural network to extract only the essential features that effectively and successively improves the classification/recognition accuracy. A total of 1024 images for 22 subjects taken from BioID Laboratory, Texas, USA are used for analysis.
科学、医学、安防等各个领域的图像数据收集量的不断增加,带来了提取知识的必要性。人脸分类/识别是计算机视觉中具有挑战性的问题之一。数据挖掘技术的使用是一种合法且可行的方法,可以使用神经遗传学方法来探索这些大型图像集。提出了一种新的基于对称的静态灰度图像人脸检测算法,作为一种选择性注意机制。利用径向基网络将线性判别分析(LDA)、基于线的算法(LBA)和核直接判别分析(KDDA)这三种人脸分类/识别方法融合在一起,对人脸图像进行有效的特征提取。利用遗传算法方法优化神经网络的权值,只提取有效且连续提高分类/识别精度的基本特征。分析使用来自美国德克萨斯州BioID实验室的22名受试者的1024张图像。
{"title":"Neuro - Genetic approaches to classification of Face Images with effective feature selection using hybrid classifiers","authors":"K. Umamaheswari, S. Sumathi, S. Sivanandam","doi":"10.1109/ADCOM.2006.4289901","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289901","url":null,"abstract":"The ever-increasing volume in the collection of image data in various fields of science, medicine, security and other fields has brought the necessity to extract knowledge. Face classification/recognition is one of the challenging problems of computer vision. The use of Data mining techniques has a legitimate and enabling ways to explore these large image collections using neuro-genetic approaches. A novel Symmetric Based Algorithm is proposed for face detection in still gray level images, which acts as a selective attentional mechanism. The three face classifiers/recognizers, Linear Discriminant Analysis (LDA), Line Based Algorithm (LBA) and Kernel Direct Discriminant Analysis (KDDA) are fused using Radial Basis network for efficient feature extraction of the face images. The use of Genetic algorithm approach optimizes the weights of neural network to extract only the essential features that effectively and successively improves the classification/recognition accuracy. A total of 1024 images for 22 subjects taken from BioID Laboratory, Texas, USA are used for analysis.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Decision Tree Classifier for Human Protein Function Prediction 人类蛋白质功能预测的决策树分类器
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289955
M. Singh, P. Singh, Hardeep Singh
Drug discoverers need to predict the functions of proteins which are responsible for various diseases in human body. The proposed method is to use priority based packages of SDFs (Sequence Derived Features) so that decision tree may be created by their depth exploration rather than exclusion. This research work develops a new decision tree induction technique in which uncertainty measure is used for best attribute selection. The model creates better decision tree in terms of depth than the existing C4.5 technique. The tree with greater depth ensures more number of tests before functional class assignment and thus results in more accurate predictions than the existing prediction technique. For the same test data, the percentage accuracy of the new HPF (human protein function) predictor is 72% and that of the existing prediction technique is 44%.
药物发现者需要预测导致人体各种疾病的蛋白质的功能。提出的方法是使用基于优先级的sdf(序列衍生特征)包,这样可以通过深度探索而不是排除来创建决策树。本文提出了一种新的决策树归纳法,利用不确定性测度进行最优属性选择。该模型在深度方面比现有的C4.5技术创建了更好的决策树。深度更大的树确保在功能类分配之前进行更多的测试,从而产生比现有预测技术更准确的预测。对于相同的测试数据,新的HPF(人类蛋白质功能)预测器的百分比准确度为72%,现有预测技术的百分比准确度为44%。
{"title":"Decision Tree Classifier for Human Protein Function Prediction","authors":"M. Singh, P. Singh, Hardeep Singh","doi":"10.1109/ADCOM.2006.4289955","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289955","url":null,"abstract":"Drug discoverers need to predict the functions of proteins which are responsible for various diseases in human body. The proposed method is to use priority based packages of SDFs (Sequence Derived Features) so that decision tree may be created by their depth exploration rather than exclusion. This research work develops a new decision tree induction technique in which uncertainty measure is used for best attribute selection. The model creates better decision tree in terms of depth than the existing C4.5 technique. The tree with greater depth ensures more number of tests before functional class assignment and thus results in more accurate predictions than the existing prediction technique. For the same test data, the percentage accuracy of the new HPF (human protein function) predictor is 72% and that of the existing prediction technique is 44%.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Methodology To Assess Security Risks Involved In Networked Systems 评估网络系统安全风险的方法
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289970
P. Nandini, K. Sarukesi
The security risks associated with network systems is a topic that has become increasingly significant in this millennium. The increased visibility, the catastrophic financial effects of a number of corporate security breaches have made the management of risk of all types is the front-burner issue of all corporate sectors. This paper assesses Information Security that commences with a statement of the problem of information security risks and presents a comprehensive methodology to analyze security risks along with suitable parameters and areas of risks involved. The final outcome of this research is assessing security that is practical enough to be used in real applications with acceptable results, without having to be an expert in the security arena. It is built upon the concepts drawn from the computer security leaders in the industry and are tested.
与网络系统相关的安全风险是一个在新世纪变得越来越重要的话题。随着可见性的提高,许多企业安全漏洞造成的灾难性财务影响使得所有类型的风险管理成为所有企业部门的首要问题。本文评估信息安全,从信息安全风险问题的陈述开始,并提出了一个综合的方法来分析安全风险,以及适当的参数和涉及的风险领域。这项研究的最终结果是评估足够实用的安全性,以便在实际应用程序中使用并获得可接受的结果,而不必成为安全领域的专家。它建立在业界计算机安全领导者的概念之上,并经过了测试。
{"title":"Methodology To Assess Security Risks Involved In Networked Systems","authors":"P. Nandini, K. Sarukesi","doi":"10.1109/ADCOM.2006.4289970","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289970","url":null,"abstract":"The security risks associated with network systems is a topic that has become increasingly significant in this millennium. The increased visibility, the catastrophic financial effects of a number of corporate security breaches have made the management of risk of all types is the front-burner issue of all corporate sectors. This paper assesses Information Security that commences with a statement of the problem of information security risks and presents a comprehensive methodology to analyze security risks along with suitable parameters and areas of risks involved. The final outcome of this research is assessing security that is practical enough to be used in real applications with acceptable results, without having to be an expert in the security arena. It is built upon the concepts drawn from the computer security leaders in the industry and are tested.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125386138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Multicast Congestion Control using Asymmetric Paths 基于非对称路径的组播拥塞控制新方法
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289922
C. Kalaiarasan, S. Selvan
This paper introduces an efficient and new multicast congestion control algorithm for asymmetric paths. In the current Internet scenario streaming applications becomes popular and which uses multicast approach. Congestion control in multicast protocol is a difficult task and lot of research is going in this area. To enhance the bandwidth utilization, instead of symmetric path, an asymmetric path is a viable alternate. But the existing algorithms are not directly applicable for such application. Using new approach protocol the receiver explicitly adjusts its reception rate according to the network conditions using TCP throughput equation and Packet-Pair probe. Its effectiveness has been checked using simulation techniques. The most popular network simulator (NS2) was used in this analysis. It is found that the new approach protocol passes the basic requirements for an effective internet multicast protocol such as responsiveness, efficiency in network utilization, scalability, fairness and TCP-friendliness.
介绍了一种新的高效的非对称路径组播拥塞控制算法。在当前的互联网场景中,流媒体应用越来越流行,它采用多播方式。组播协议中的拥塞控制是一个难点问题,目前在这方面的研究较多。为了提高带宽利用率,采用非对称路径代替对称路径是可行的替代方案。但是现有的算法并不能直接适用于这种应用。该协议利用TCP吞吐量方程和Packet-Pair探测,根据网络条件明确调整接收速率。利用仿真技术对其有效性进行了验证。在本分析中使用了最流行的网络模拟器(NS2)。结果表明,该协议在响应性、网络利用率、可扩展性、公平性和tcp友好性等方面满足了一个有效的互联网组播协议的基本要求。
{"title":"A New Approach for Multicast Congestion Control using Asymmetric Paths","authors":"C. Kalaiarasan, S. Selvan","doi":"10.1109/ADCOM.2006.4289922","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289922","url":null,"abstract":"This paper introduces an efficient and new multicast congestion control algorithm for asymmetric paths. In the current Internet scenario streaming applications becomes popular and which uses multicast approach. Congestion control in multicast protocol is a difficult task and lot of research is going in this area. To enhance the bandwidth utilization, instead of symmetric path, an asymmetric path is a viable alternate. But the existing algorithms are not directly applicable for such application. Using new approach protocol the receiver explicitly adjusts its reception rate according to the network conditions using TCP throughput equation and Packet-Pair probe. Its effectiveness has been checked using simulation techniques. The most popular network simulator (NS2) was used in this analysis. It is found that the new approach protocol passes the basic requirements for an effective internet multicast protocol such as responsiveness, efficiency in network utilization, scalability, fairness and TCP-friendliness.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Stochastic Characteristics of Traffic on a High Speed Network 高速网络流量的随机特性研究
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289980
P. Bhattacharjee, G. Sanyal
With the ever increasing backbone bandwidth, the design and planning of networks are usually done by simulating the influence of various traffic type on the network. Accurate traffic classification is the key stone of numerous network activities. The research in this paper results from a study and analysis of packet trace obtained from a backbone link in NITNET. Millions of packets are passed through the link that makes the traffic measurement difficult or even impossible. An attempt has been made to study the online inbound and outbound packet trace analysis. Poisson based sampling methodology has been used to estimate the characteristics and distribution of packets.
随着骨干网带宽的不断增加,网络的设计和规划通常是通过模拟各种流量类型对网络的影响来完成的。准确的流量分类是众多网络活动的基石。本文的研究是通过对NITNET骨干链路的数据包跟踪进行研究和分析得出的。这条链路上有数以百万计的数据包通过,这使得流量测量变得困难甚至不可能。对在线入出站数据包跟踪分析进行了研究。基于泊松的抽样方法被用来估计包的特征和分布。
{"title":"Study of Stochastic Characteristics of Traffic on a High Speed Network","authors":"P. Bhattacharjee, G. Sanyal","doi":"10.1109/ADCOM.2006.4289980","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289980","url":null,"abstract":"With the ever increasing backbone bandwidth, the design and planning of networks are usually done by simulating the influence of various traffic type on the network. Accurate traffic classification is the key stone of numerous network activities. The research in this paper results from a study and analysis of packet trace obtained from a backbone link in NITNET. Millions of packets are passed through the link that makes the traffic measurement difficult or even impossible. An attempt has been made to study the online inbound and outbound packet trace analysis. Poisson based sampling methodology has been used to estimate the characteristics and distribution of packets.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Mining of Frequent Rooted Continuous Directed Subgraphs 频繁根连续有向子图的高效挖掘
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289953
G J Sreenivasa, V. S. Ananthanarayana
Mining frequent rooted continuous directed (RCD) subgraphs is very useful in Web usage mining domain. We formulate the problem of mining RCD subgraphs in a database of rooted labeled continuous directed graphs. We propose a novel approach of merging like RCD subgraphs. This approach builds a Pattern Super Graph (PSG) structure.This PSG is a compact structure and ideal for extracting frequent patterns in the form of RCD subgraphs. The PSG based mine avoids costly, repeated database scans and there is no generation of candidates. Results obtained are appreciating the approach proposed.
频繁根连续有向(RCD)子图的挖掘在Web使用挖掘领域是非常有用的。提出了在有根标记连续有向图数据库中挖掘RCD子图的问题。我们提出了一种新的类似RCD子图的合并方法。这种方法构建了一个模式超级图(PSG)结构。该PSG结构紧凑,非常适合提取RCD子图形式的频繁模式。基于PSG的地雷避免了昂贵的、重复的数据库扫描,并且没有生成候选数据。所得结果对所提出的方法表示赞赏。
{"title":"Efficient Mining of Frequent Rooted Continuous Directed Subgraphs","authors":"G J Sreenivasa, V. S. Ananthanarayana","doi":"10.1109/ADCOM.2006.4289953","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289953","url":null,"abstract":"Mining frequent rooted continuous directed (RCD) subgraphs is very useful in Web usage mining domain. We formulate the problem of mining RCD subgraphs in a database of rooted labeled continuous directed graphs. We propose a novel approach of merging like RCD subgraphs. This approach builds a Pattern Super Graph (PSG) structure.This PSG is a compact structure and ideal for extracting frequent patterns in the form of RCD subgraphs. The PSG based mine avoids costly, repeated database scans and there is no generation of candidates. Results obtained are appreciating the approach proposed.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Uneven Background Extraction And Segmentation Of Good, Normal And Bad Quality Fingerprint Images 优质、正常和劣质指纹图像的不均匀背景提取与分割
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289887
S. Jambhorkar, S. Gornale, V. Humbe, R. Manza, K V Kale
In this paper, we have considered a problem of uneven background extraction and segmentation of good, normal and bad quality fingerprint images, though we propose an algorithm based on morphological transformations. Our result shows that the proposed algorithm can successfully extract the background of good, normal and bad quality images of fingerprint and well segment the foreground area. The algorithm has been tested and executed on FVC2002 database and the performance of proposed algorithm is evaluated through subjective and objective quality measures. This algorithm gives good and promising result and found suitable to remove superfluous information without affecting the structure of fingerprint image as well as reduces the storage space for the resultant image upto 77%. Our results will be useful for precise feature extraction in automatic fingerprint recognition system.
本文提出了一种基于形态学变换的指纹图像提取和分割算法,研究了优质、正常和劣质指纹图像的背景不均匀问题。实验结果表明,该算法能较好地提取出质量好的、正常的和质量差的指纹图像的背景,并能很好地分割出前景区域。该算法在FVC2002数据库上进行了测试和执行,并通过主观和客观质量指标对算法的性能进行了评价。该算法能够在不影响指纹图像结构的情况下去除多余信息,并将生成图像的存储空间减少了77%。研究结果将为指纹自动识别系统的精确特征提取提供参考。
{"title":"Uneven Background Extraction And Segmentation Of Good, Normal And Bad Quality Fingerprint Images","authors":"S. Jambhorkar, S. Gornale, V. Humbe, R. Manza, K V Kale","doi":"10.1109/ADCOM.2006.4289887","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289887","url":null,"abstract":"In this paper, we have considered a problem of uneven background extraction and segmentation of good, normal and bad quality fingerprint images, though we propose an algorithm based on morphological transformations. Our result shows that the proposed algorithm can successfully extract the background of good, normal and bad quality images of fingerprint and well segment the foreground area. The algorithm has been tested and executed on FVC2002 database and the performance of proposed algorithm is evaluated through subjective and objective quality measures. This algorithm gives good and promising result and found suitable to remove superfluous information without affecting the structure of fingerprint image as well as reduces the storage space for the resultant image upto 77%. Our results will be useful for precise feature extraction in automatic fingerprint recognition system.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"744 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Feature Extraction Learning for Stereovision Based Robot Navigation System 基于立体视觉的机器人导航系统特征提取学习
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289917
V. Rajpurohit, M. M. Manohara Pai
Stereovision based systems represent the real-world information in the form of a gray scale image known as depth-map with intensity of each pixel representing the distance of that pixel from the cameras. For static indoor environment where the surface is smooth, the ground information remains constant and can be removed to locate and identify the boundaries of the obstacles of interest in a better way. This paper proposes a novel approach for ground surface removal using a trained multilayer neural network and a novel object-clustering algorithm to reconstruct the objects of interest from the depth-map generated by the stereovision algorithm. Histogram analysis and the object reconstruction algorithm are used to test the results.
基于立体视觉的系统以灰度图像的形式表示现实世界的信息,称为深度图,每个像素的强度代表该像素与相机的距离。对于表面光滑的静态室内环境,地面信息保持不变,可以去除地面信息,从而更好地定位和识别感兴趣障碍物的边界。本文提出了一种新的地面去除方法,利用训练好的多层神经网络和一种新的目标聚类算法,从立体视觉算法生成的深度图中重建感兴趣的目标。利用直方图分析和目标重构算法对结果进行了检验。
{"title":"Feature Extraction Learning for Stereovision Based Robot Navigation System","authors":"V. Rajpurohit, M. M. Manohara Pai","doi":"10.1109/ADCOM.2006.4289917","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289917","url":null,"abstract":"Stereovision based systems represent the real-world information in the form of a gray scale image known as depth-map with intensity of each pixel representing the distance of that pixel from the cameras. For static indoor environment where the surface is smooth, the ground information remains constant and can be removed to locate and identify the boundaries of the obstacles of interest in a better way. This paper proposes a novel approach for ground surface removal using a trained multilayer neural network and a novel object-clustering algorithm to reconstruct the objects of interest from the depth-map generated by the stereovision algorithm. Histogram analysis and the object reconstruction algorithm are used to test the results.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"2002 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Classification with Hybrid Evolutionary Techniques 基于混合进化技术的有效分类
Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289911
P. Jaganathan, K. Thangavel, Pethalakshmi A, M. V. M. Govt
Ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. More recently, Parpinelli et al have applied ACO to data mining classification problems, where they introduced a classification algorithm called Ant Miner. In this paper, we present a hybrid system that combines both the proposed Enhanced Quickreduct algorithm for data preprocessing and ant miner. The system was tested on standard data set and its performance is better than the original Ant Miner algorithm.
蚁群优化算法已成功地应用于组合优化问题。最近,Parpinelli等人将蚁群算法应用于数据挖掘分类问题,他们引入了一种称为蚂蚁矿工的分类算法。在本文中,我们提出了一种混合系统,结合了所提出的用于数据预处理的增强快速约简算法和蚂蚁挖掘算法。该系统在标准数据集上进行了测试,其性能优于原有的蚂蚁矿机算法。
{"title":"Effective Classification with Hybrid Evolutionary Techniques","authors":"P. Jaganathan, K. Thangavel, Pethalakshmi A, M. V. M. Govt","doi":"10.1109/ADCOM.2006.4289911","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289911","url":null,"abstract":"Ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. More recently, Parpinelli et al have applied ACO to data mining classification problems, where they introduced a classification algorithm called Ant Miner. In this paper, we present a hybrid system that combines both the proposed Enhanced Quickreduct algorithm for data preprocessing and ant miner. The system was tested on standard data set and its performance is better than the original Ant Miner algorithm.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 International Conference on Advanced Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1