Clustering or data grouping is a key initial procedure in image processing. This paper deals with the application of standard and genetic k-means clustering algorithms in the area of image segmentation. In order to assess and compare both versions of k-means algorithm and its variants, appropriate procedures and software have been designed and implemented. Experimental results point that genetically optimized k-means algorithms proved their usefulness in the area of image analysis, yielding comparable and even better segmentation results.
{"title":"Standard and Genetic k-means Clustering Techniques in Image Segmentation","authors":"D. Malyszko, S. Wierzchon","doi":"10.1109/CISIM.2007.63","DOIUrl":"https://doi.org/10.1109/CISIM.2007.63","url":null,"abstract":"Clustering or data grouping is a key initial procedure in image processing. This paper deals with the application of standard and genetic k-means clustering algorithms in the area of image segmentation. In order to assess and compare both versions of k-means algorithm and its variants, appropriate procedures and software have been designed and implemented. Experimental results point that genetically optimized k-means algorithms proved their usefulness in the area of image analysis, yielding comparable and even better segmentation results.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121530097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper some modern methods of physiological identification of people, the importance of biometrics in company management, and technical resources used in this field are presented. Authors describe the achievements of biometrics and its efficiency in ensuring the security of data and equipment resources from industrial management point of view. Also given the advantages of the solutions that are based on biometric methods, and evidence showing their increasing significance in company activity and its development.
{"title":"A Study on the Importance of Biometric Technique Selection in the Protection of Company Resources","authors":"A. Zajkowska, Wojciech Zimnoch, K. Saeed","doi":"10.1109/CISIM.2007.7","DOIUrl":"https://doi.org/10.1109/CISIM.2007.7","url":null,"abstract":"In this paper some modern methods of physiological identification of people, the importance of biometrics in company management, and technical resources used in this field are presented. Authors describe the achievements of biometrics and its efficiency in ensuring the security of data and equipment resources from industrial management point of view. Also given the advantages of the solutions that are based on biometric methods, and evidence showing their increasing significance in company activity and its development.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
If we want to break someone else's PIN (personal identification number) of, say, an ATM (automated teller machine), how many trials would be necessary when we want to be efficient? This is a sort of what we call a-needle-in-a-hay-stack problem. In 1987, in their wonderful paper, Hinton & Nowlan proposed a genetic algorithm with a needle being a unique configuration of 20-bit binary string while all other configurations being a haystack. What they proposed was to exploit a lifetime learning of individuals in their genetic algorithm, calling it the Baldwin effect in a computer. Since then there has been a fair amount of exploration of this effect, claiming, "this is a-needle-in-a-hay-stack problem, and we've found a more efficient algorithm than a random search." Some of them, however, were found to be the results of an effect of like-to-hear-what-we-would-like-to- hear. In this talk, we will try a bird's eye view on a few examples we have had so far, and how they were explored, including the approach by means of quantum computation which claims, "The steps to find a needle are O(radicN) while those of exhaustive search by a traditional computer are O(N) where N is the number of search points."
{"title":"Finding a Needle in a Haystack: From Baldwin Effect to Quantum Computation","authors":"A. Imada","doi":"10.1109/CISIM.2007.29","DOIUrl":"https://doi.org/10.1109/CISIM.2007.29","url":null,"abstract":"If we want to break someone else's PIN (personal identification number) of, say, an ATM (automated teller machine), how many trials would be necessary when we want to be efficient? This is a sort of what we call a-needle-in-a-hay-stack problem. In 1987, in their wonderful paper, Hinton & Nowlan proposed a genetic algorithm with a needle being a unique configuration of 20-bit binary string while all other configurations being a haystack. What they proposed was to exploit a lifetime learning of individuals in their genetic algorithm, calling it the Baldwin effect in a computer. Since then there has been a fair amount of exploration of this effect, claiming, \"this is a-needle-in-a-hay-stack problem, and we've found a more efficient algorithm than a random search.\" Some of them, however, were found to be the results of an effect of like-to-hear-what-we-would-like-to- hear. In this talk, we will try a bird's eye view on a few examples we have had so far, and how they were explored, including the approach by means of quantum computation which claims, \"The steps to find a needle are O(radicN) while those of exhaustive search by a traditional computer are O(N) where N is the number of search points.\"","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124765526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today's perpetually improving industrial automation technology brings new equipment, systems, solutions and semantics. Project requirements become greater and the level of complexity, cost, documentation, and humbug tend to increase. Managing information becomes critical for project success. This paper offers solutions based on the use of 'nutshell' learning models that are simplified presentations of complex or vague concepts, designed to accelerate the learning process and extend retention of the acquired knowledge. A brief review of some aspects of automation technologies follows. Some traps and urban myths surrounding industrial projects and automation are unveiled. Needs for integration of technical and nontechnical content, as well as an investment in project's zz hi capital" are stressed. Pragmatic management si__k and practices are pointed out. Case study stories address data integration challenges and lead to a 'meta consulting' concept where technical and non-technical aspects are quickly assessed to form a basis for the powerful, rapid-engagement, priority-based solutions.
{"title":"Managing Information on Industrial Automation Projects","authors":"J. Jekielek","doi":"10.1109/CISIM.2007.46","DOIUrl":"https://doi.org/10.1109/CISIM.2007.46","url":null,"abstract":"Today's perpetually improving industrial automation technology brings new equipment, systems, solutions and semantics. Project requirements become greater and the level of complexity, cost, documentation, and humbug tend to increase. Managing information becomes critical for project success. This paper offers solutions based on the use of 'nutshell' learning models that are simplified presentations of complex or vague concepts, designed to accelerate the learning process and extend retention of the acquired knowledge. A brief review of some aspects of automation technologies follows. Some traps and urban myths surrounding industrial projects and automation are unveiled. Needs for integration of technical and nontechnical content, as well as an investment in project's zz hi capital\" are stressed. Pragmatic management si__k and practices are pointed out. Case study stories address data integration challenges and lead to a 'meta consulting' concept where technical and non-technical aspects are quickly assessed to form a basis for the powerful, rapid-engagement, priority-based solutions.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authentication of people using iris-based recognition is a widely developing technology. Iris recognition is feasible for use in differentiating between identical twins. Though the iris color and the overall statistical quality of the iris texture may be dependent on genetic factors, the textural details are independent and uncorrelated for genetically identical iris pairs. The feature extraction and classification are heavily based on the rich textural details of the iris.
{"title":"Iris Image Recognition","authors":"R. Choras","doi":"10.1109/CISIM.2007.44","DOIUrl":"https://doi.org/10.1109/CISIM.2007.44","url":null,"abstract":"The authentication of people using iris-based recognition is a widely developing technology. Iris recognition is feasible for use in differentiating between identical twins. Though the iris color and the overall statistical quality of the iris texture may be dependent on genetic factors, the textural details are independent and uncorrelated for genetically identical iris pairs. The feature extraction and classification are heavily based on the rich textural details of the iris.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of the paper was the identification of frequency synchronization phenomenon occurring between different groups of e-learning system users. The changes in time of daily logs of: administration workers, teachers and students have been analyzed. The following analyses: correlation, Fourier and wavelet have been used to identify the nature of data. Basing on the wavelet analysis it has been proposed the new criterion of evaluation of frequency synchronization of two chaotic systems. The modified wavelet power spectrum has been used to identify the frequency synchronization between chaotic behaviors of three groups of users of e-learning web system. Obtained results have shown that the proposed method is useful for analyzing the phenomena of frequency synchronization of user groups of e-learning system.
{"title":"On Frequency Synchronization of e-Learning Web System Users","authors":"R. Mosdorf, B. Ignatowska","doi":"10.1109/CISIM.2007.52","DOIUrl":"https://doi.org/10.1109/CISIM.2007.52","url":null,"abstract":"The aim of the paper was the identification of frequency synchronization phenomenon occurring between different groups of e-learning system users. The changes in time of daily logs of: administration workers, teachers and students have been analyzed. The following analyses: correlation, Fourier and wavelet have been used to identify the nature of data. Basing on the wavelet analysis it has been proposed the new criterion of evaluation of frequency synchronization of two chaotic systems. The modified wavelet power spectrum has been used to identify the frequency synchronization between chaotic behaviors of three groups of users of e-learning web system. Obtained results have shown that the proposed method is useful for analyzing the phenomena of frequency synchronization of user groups of e-learning system.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Finite difference flow modelling of runoff on a terrain surface has usually been done using a regular grid. This has various disadvantages, as the regular pattern does not conform well to observed features such as watersheds, the runoff pattern is biased to the grid axes, and original data points are lost. We propose a flow modelling method using TIN models. A random Voronoi pattern is added to the original data. This avoids the issues of grid based methods, as there is no axis bias, points may be added anywhere and original data points may be retained. Our flow model simply requires a set of "buckets " to hold the water (the Voronoi cells) and slope information to provide the local runoff rate (the Delaunay edges).
{"title":"Finite Difference Runoff Modelling Using \"Voronoi Buckets\"","authors":"M. Dakowicz, C. Gold","doi":"10.1109/CISIM.2007.30","DOIUrl":"https://doi.org/10.1109/CISIM.2007.30","url":null,"abstract":"Finite difference flow modelling of runoff on a terrain surface has usually been done using a regular grid. This has various disadvantages, as the regular pattern does not conform well to observed features such as watersheds, the runoff pattern is biased to the grid axes, and original data points are lost. We propose a flow modelling method using TIN models. A random Voronoi pattern is added to the original data. This avoids the issues of grid based methods, as there is no axis bias, points may be added anywhere and original data points may be retained. Our flow model simply requires a set of \"buckets \" to hold the water (the Voronoi cells) and slope information to provide the local runoff rate (the Delaunay edges).","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125740349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents the classification performance of an automatic classifier of the electrocardiogram (ECG) for the detection abnormal beats with new concept of feature extraction stage. Feature sets were based on ECG morphology and RR-intervals. Configuration adopted a Kohonen self-organizing maps (SOM) for analysis of signal features and clustering. In this study, a classifier was developed with SOM and learning vector quantization (LVQ) algorithms using the data from the records recommended by ANSI/AAMI EC57 standard. This paper compares two strategies for classification of annotated QRS complexes: based on original ECG morphology features and proposed new approach - based on preprocessed ECG morphology features. The mathematical morphology filtering is used for the preprocessing of ECG signal. The problem of choosing an appropriate structuring element of mathematical morphology filtering for ECG signal processing was studied. The performance of the algorithm is evaluated on the MIT-BIH Arrhythmia Database following the AAMI recommendations. Using this method the results of recognition beats either as normal or arrhythmias was improved.
{"title":"Mathematical Morphology Based ECG Feature Extraction for the Purpose of Heartbeat Classification","authors":"P. Tadejko, W. Rakowski","doi":"10.1109/CISIM.2007.47","DOIUrl":"https://doi.org/10.1109/CISIM.2007.47","url":null,"abstract":"The paper presents the classification performance of an automatic classifier of the electrocardiogram (ECG) for the detection abnormal beats with new concept of feature extraction stage. Feature sets were based on ECG morphology and RR-intervals. Configuration adopted a Kohonen self-organizing maps (SOM) for analysis of signal features and clustering. In this study, a classifier was developed with SOM and learning vector quantization (LVQ) algorithms using the data from the records recommended by ANSI/AAMI EC57 standard. This paper compares two strategies for classification of annotated QRS complexes: based on original ECG morphology features and proposed new approach - based on preprocessed ECG morphology features. The mathematical morphology filtering is used for the preprocessing of ECG signal. The problem of choosing an appropriate structuring element of mathematical morphology filtering for ECG signal processing was studied. The performance of the algorithm is evaluated on the MIT-BIH Arrhythmia Database following the AAMI recommendations. Using this method the results of recognition beats either as normal or arrhythmias was improved.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133855213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Issues of business intelligence applications are discussed. Main parts of business intelligence tools are briefly described. The attention is paid to the data warehouses and to a new tool in this field, to the operational data stores. These technologies enable to get the data of first-rate quality. Some new features of operational data stores' applications are proposed. The role of users in the design of metadata is explained and its influence on the efficiency of information systems is emphasized. Business intelligence tools are the necessary conditions for applications of data mining, an efficient tool for getting new information from large datasets.
{"title":"Support of Decision Making by Business Intelligence Tools","authors":"Milena Tvrdíková","doi":"10.1109/CISIM.2007.64","DOIUrl":"https://doi.org/10.1109/CISIM.2007.64","url":null,"abstract":"Issues of business intelligence applications are discussed. Main parts of business intelligence tools are briefly described. The attention is paid to the data warehouses and to a new tool in this field, to the operational data stores. These technologies enable to get the data of first-rate quality. Some new features of operational data stores' applications are proposed. The role of users in the design of metadata is explained and its influence on the efficiency of information systems is emphasized. Business intelligence tools are the necessary conditions for applications of data mining, an efficient tool for getting new information from large datasets.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the paper we try to answer, whether the Gaussian distribution - called widely the 'normal' distribution - is really basic, natural and normal. In particular, we investigate how the above statement conforms with the distribution of real data, namely daily returns of some stock indexes. It was the authors former experience that, when looking at the distributions of real data, it was very difficult to find there a 'normal', i.e. Gaussian distribution. The data, by their nature, are heterogeneous. If so, then the data should be modelled taking into account their possible heterogeneity. This can be done using mixture models - with mixtures composed from finite or infinite number of components. Students' T (univariate or multivariate) is one prominent example of distributions which may be obtained as a mixture of infinitesimal number of Gaussian distributions. The considerations are illustrated by an example of application to financial time series, namely daily returns of the indexes WIG20 and S&P500. We show, why the normality (i.e. 'Gaussianity') should be rejected and why the 't' distribution is plausible.
{"title":"Should Normal Distribution be Normal? The Student's T Alternative","authors":"A. Bartkowiak","doi":"10.1109/CISIM.2007.59","DOIUrl":"https://doi.org/10.1109/CISIM.2007.59","url":null,"abstract":"In the paper we try to answer, whether the Gaussian distribution - called widely the 'normal' distribution - is really basic, natural and normal. In particular, we investigate how the above statement conforms with the distribution of real data, namely daily returns of some stock indexes. It was the authors former experience that, when looking at the distributions of real data, it was very difficult to find there a 'normal', i.e. Gaussian distribution. The data, by their nature, are heterogeneous. If so, then the data should be modelled taking into account their possible heterogeneity. This can be done using mixture models - with mixtures composed from finite or infinite number of components. Students' T (univariate or multivariate) is one prominent example of distributions which may be obtained as a mixture of infinitesimal number of Gaussian distributions. The considerations are illustrated by an example of application to financial time series, namely daily returns of the indexes WIG20 and S&P500. We show, why the normality (i.e. 'Gaussianity') should be rejected and why the 't' distribution is plausible.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}