首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
The Architecture of Fast H.264 CAVLC Decoder and its FPGA Implementation 快速H.264 CAVLC解码器体系结构及其FPGA实现
T. George, N. Malmurugan
In this paper, we present a fast architecture of realtime CAVLC decoder (CAVLD) implemented in a FPGA. The real-time performance is achieved by exploring the pipelining possibilities between the sub- modules and multi sub-symbol decoding. The implemented fast CAVLD architecture, when integrated with H264 decoder was capable of parsing at 30 fps for 1080 p streams for an encoded bit stream at a bit rate of 200 Mbps to achieve the real-time performance, while the clock is operated at 74.25 MHz. The result numbers of ALUs are 3266 and the critical path is within 10.5 ns.
本文提出了一种在FPGA上实现的快速实时CAVLC解码器(CAVLD)结构。通过探索子模块和多子符号解码之间的流水线化可能性,实现了实时性。当与H264解码器集成时,实现的快速CAVLD架构能够以30fps的速度解析1080p流,以200mbps的比特率解析编码比特流,以实现实时性能,而时钟工作在74.25 MHz。结果alu个数为3266个,关键路径在10.5 ns以内。
{"title":"The Architecture of Fast H.264 CAVLC Decoder and its FPGA Implementation","authors":"T. George, N. Malmurugan","doi":"10.1109/IIH-MSP.2007.291","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.291","url":null,"abstract":"In this paper, we present a fast architecture of realtime CAVLC decoder (CAVLD) implemented in a FPGA. The real-time performance is achieved by exploring the pipelining possibilities between the sub- modules and multi sub-symbol decoding. The implemented fast CAVLD architecture, when integrated with H264 decoder was capable of parsing at 30 fps for 1080 p streams for an encoded bit stream at a bit rate of 200 Mbps to achieve the real-time performance, while the clock is operated at 74.25 MHz. The result numbers of ALUs are 3266 and the critical path is within 10.5 ns.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation 具有动态变异的距离引导粒子群优化算法
Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong
This paper presents a distance-guided particle swarm optimizer with dynamic mutation (PSODM). Two characteristics are proposed in the PSODM: distance-guided and dynamic mutation. The goal of these characteristics is to overcome premature convergence of the swarm and accelerating the convergence velocity. With distance-guided operation, some particles too intense can be separated, while with dynamic mutation operation, the particles mutated can find a better position more easily by effectively using the foregone experience. The PSODM is compared to other four types of improved PSO, and the experimental results show that the PSODM performances better on a six-function test suite with different dimensions.
提出了一种带动态变异的距离引导粒子群优化算法(PSODM)。提出了PSODM的两个特征:距离引导和动态突变。这些特性的目的是克服群体的过早收敛,加快收敛速度。距离引导操作可以分离一些强度过大的粒子,而动态突变操作可以有效地利用先验经验,使突变的粒子更容易找到更好的位置。将改进的PSODM与其他四种改进的PSODM进行了比较,实验结果表明,PSODM在不同维度的六功能测试套件上表现更好。
{"title":"The Distance-Guided Particle Swarm Optimizer with Dynamic Mutation","authors":"Chunhe Song, Hai Zhao, Wei Cai, Haohua Zhang, Ming Zhao, Wei Gao, Xuanjie Ning, Xudong Han, Peng Zhu, Jie Gao, Tianyu Qi, Hongyan Gong","doi":"10.1109/IIH-MSP.2007.292","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.292","url":null,"abstract":"This paper presents a distance-guided particle swarm optimizer with dynamic mutation (PSODM). Two characteristics are proposed in the PSODM: distance-guided and dynamic mutation. The goal of these characteristics is to overcome premature convergence of the swarm and accelerating the convergence velocity. With distance-guided operation, some particles too intense can be separated, while with dynamic mutation operation, the particles mutated can find a better position more easily by effectively using the foregone experience. The PSODM is compared to other four types of improved PSO, and the experimental results show that the PSODM performances better on a six-function test suite with different dimensions.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Cryptography in reversible style 可逆样式的视觉密码术
W. Fang
We proposed in this paper a brand new type of visual cryptography (VC), namely, the VC in reversible style. For any two given secret images, two corresponding transparencies S1 and S2, also known as shares, can be produced. Both transparencies look noisy. However, if we stack the front views of both transparencies, then the first secret image is unveiled. On the other hand, if we stack the front view of S1 with the back view (the turn-over) of S2, then the second secret image is unveiled.
本文提出了一种全新的可视密码,即可逆式可视密码。对于任意两个给定的秘密图像,可以产生两个对应的透明片S1和S2,也称为份额。两张透明照片看起来都很嘈杂。然而,如果我们叠加两个透明的正面视图,那么第一个秘密图像就揭晓了。另一方面,如果我们将S1的前视图与S2的后视图(翻转)叠加在一起,那么第二个秘密图像就会揭晓。
{"title":"Visual Cryptography in reversible style","authors":"W. Fang","doi":"10.1109/IIH-MSP.2007.325","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.325","url":null,"abstract":"We proposed in this paper a brand new type of visual cryptography (VC), namely, the VC in reversible style. For any two given secret images, two corresponding transparencies S1 and S2, also known as shares, can be produced. Both transparencies look noisy. However, if we stack the front views of both transparencies, then the first secret image is unveiled. On the other hand, if we stack the front view of S1 with the back view (the turn-over) of S2, then the second secret image is unveiled.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127215742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Integrating Multiple Knowledge Sources by Genetic Programming 基于遗传规划的多知识源集成
Chan-Sheng Kuo, T. Hong, Chuen-Lung Chen
In this paper, we have proposed a GP-based knowledge-integration framework that automatically combines multiple rule sets into one integrated knowledge base. The proposed framework consists of three phases: knowledge collection and translation, knowledge integration, and knowledge output. Two new genetic operators, abridgement and compromise, are designed in the proposed approach. Experimental results from diagnosis of breast cancer also show the feasibility of the proposed algorithm.
在本文中,我们提出了一个基于gp的知识集成框架,该框架可以自动地将多个规则集组合成一个集成的知识库。该框架包括三个阶段:知识收集和转化、知识整合和知识输出。该方法设计了两种新的遗传算子:删节算子和妥协算子。乳腺癌诊断的实验结果也证明了该算法的可行性。
{"title":"Integrating Multiple Knowledge Sources by Genetic Programming","authors":"Chan-Sheng Kuo, T. Hong, Chuen-Lung Chen","doi":"10.1109/IIH-MSP.2007.216","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.216","url":null,"abstract":"In this paper, we have proposed a GP-based knowledge-integration framework that automatically combines multiple rule sets into one integrated knowledge base. The proposed framework consists of three phases: knowledge collection and translation, knowledge integration, and knowledge output. Two new genetic operators, abridgement and compromise, are designed in the proposed approach. Experimental results from diagnosis of breast cancer also show the feasibility of the proposed algorithm.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127803109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy 基于LSB替换的隐写术中像素值差异方案分析
Cheng-Hsing Yang, Shiuh-Jeng Wang, C. Weng
This paper shows that a steganographic scheme based on Wu et al. 's pixel-value differencing (PVD) and least-significant-bit (LSB) replacement method is too conformable to the LSB approach. Their PVD+LSB method can embed secret data larger than the PVD method, however, it is detectable by Fridrich et al. 's method but PVD method is not. Some of the shortcomings of the PVD+LSB method are shown in this paper. At the same time, some techniques are proposed for improving the image quality of the PVD+LSB method without sacrificing the capacity. All proposed techniques are demonstrated by experimental results.
本文提出了一种基于Wu等人的隐写方案。像素值差分(PVD)和最低有效位(LSB)替换方法过于符合LSB方法。他们的PVD+LSB方法可以嵌入比PVD方法更大的秘密数据,但是Fridrich等人可以检测到。而PVD法则不是。本文指出了PVD+LSB方法的一些缺点。同时,提出了在不牺牲容量的前提下提高PVD+LSB方法图像质量的一些技术。实验结果验证了所提出的技术。
{"title":"Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy","authors":"Cheng-Hsing Yang, Shiuh-Jeng Wang, C. Weng","doi":"10.1109/IIH-MSP.2007.334","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.334","url":null,"abstract":"This paper shows that a steganographic scheme based on Wu et al. 's pixel-value differencing (PVD) and least-significant-bit (LSB) replacement method is too conformable to the LSB approach. Their PVD+LSB method can embed secret data larger than the PVD method, however, it is detectable by Fridrich et al. 's method but PVD method is not. Some of the shortcomings of the PVD+LSB method are shown in this paper. At the same time, some techniques are proposed for improving the image quality of the PVD+LSB method without sacrificing the capacity. All proposed techniques are demonstrated by experimental results.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127422851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path Diversity 基于覆盖组播的高效负载均衡路径分集视频流
Jeng-Wei Lee, Jia-Ming Yang, Chao-Lieh Chen, Y. Kuo
An overlay multicast is proposed to solve the scalability and deployment problems in IP Multicast. We propose a scheme, Topology-oriented Load- balance Hierarchical Independent Tree (TLHIT) to improve the performance of overlay multicast. Compared to traditional methods, the proposed TLHIT constructs not only node-disjoint but also path-disjoint multicast trees where each node serves as an interior node in only one tree and different trees do not contain the same path. Moreover, TLHIT ensures load-balance property by building the multicast trees based on n-ary full tree. It ensures that each node serves almost the same amount of child nodes. Simulation results show that the reliability, efficiency, and load-balance properties of the proposed TLHIT are assured.
为了解决IP组播的可扩展性和部署问题,提出了一种覆盖组播。为了提高覆盖组播的性能,提出了一种基于拓扑的负载平衡分层独立树(TLHIT)方案。与传统方法相比,该方法不仅构建了节点不相交的组播树,而且还构建了路径不相交的组播树,其中每个节点仅作为一棵树的内部节点,不同的树不包含相同的路径。此外,TLHIT通过构建基于n元全树的组播树来保证负载均衡特性。它确保每个节点为几乎相同数量的子节点服务。仿真结果表明,该算法具有较好的可靠性、高效性和负载均衡性。
{"title":"Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path Diversity","authors":"Jeng-Wei Lee, Jia-Ming Yang, Chao-Lieh Chen, Y. Kuo","doi":"10.1109/IIH-MSP.2007.324","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.324","url":null,"abstract":"An overlay multicast is proposed to solve the scalability and deployment problems in IP Multicast. We propose a scheme, Topology-oriented Load- balance Hierarchical Independent Tree (TLHIT) to improve the performance of overlay multicast. Compared to traditional methods, the proposed TLHIT constructs not only node-disjoint but also path-disjoint multicast trees where each node serves as an interior node in only one tree and different trees do not contain the same path. Moreover, TLHIT ensures load-balance property by building the multicast trees based on n-ary full tree. It ensures that each node serves almost the same amount of child nodes. Simulation results show that the reliability, efficiency, and load-balance properties of the proposed TLHIT are assured.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial Expression Recognition with Discriminative Common Vector 基于判别公共向量的面部表情识别
Yuan-Kai Wang, Chun-Hao Huang
Extracting stable features from face images is very important for automatic recognition of facial expression. In this paper, we apply a face feature extraction approach, namely discriminative common vectors, for the recognition of the six expressions including happy, sad, angry, disgust, fear and surprise. By applying discriminative common vector, we can reduce the dimensionality of image feature and classify them in a lower dimension. Then we use HMM as our classifier to find the time series information of the feature vector projected by common vector. Experimental results on the Cohn-Kanade database demonstrate the validity and efficiency of our approach.
从人脸图像中提取稳定特征是人脸表情自动识别的重要内容。本文采用一种人脸特征提取方法,即判别公共向量,对快乐、悲伤、愤怒、厌恶、恐惧和惊讶六种表情进行识别。利用判别公共向量,将图像特征降维,在较低的维度上进行分类。然后利用隐马尔可夫模型作为分类器,寻找由公共向量投影的特征向量的时间序列信息。在Cohn-Kanade数据库上的实验结果证明了该方法的有效性和高效性。
{"title":"Facial Expression Recognition with Discriminative Common Vector","authors":"Yuan-Kai Wang, Chun-Hao Huang","doi":"10.1109/IIH-MSP.2007.403","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.403","url":null,"abstract":"Extracting stable features from face images is very important for automatic recognition of facial expression. In this paper, we apply a face feature extraction approach, namely discriminative common vectors, for the recognition of the six expressions including happy, sad, angry, disgust, fear and surprise. By applying discriminative common vector, we can reduce the dimensionality of image feature and classify them in a lower dimension. Then we use HMM as our classifier to find the time series information of the feature vector projected by common vector. Experimental results on the Cohn-Kanade database demonstrate the validity and efficiency of our approach.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131407468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy Belief Reasoning for Intrusion Detection Design 入侵检测设计中的模糊信念推理
T. Chou, K. Yen, N. Pissinou, K. Makki
In this paper, we propose a method to resolve uncertainty problems by incorporating fuzzy clustering technique and Dempster-Shafer theory. Also, the k-nearest neighbors (k-NN) technique is applied to speed up the detection process and C4.5 decision tree algorithm is used to improve the classification accuracy. For verifying the performance of our classifier, DARPA KDD99 intrusion detection evaluation data set is used. We compare the results of our proposed approach with those of k-NN classifier, fuzzy k-NN classifier and evidence-theoretic k-NN classifier. The result indicates that our approach has a better performance than these from the other three classifiers.
本文提出了一种结合模糊聚类技术和Dempster-Shafer理论来解决不确定性问题的方法。采用k近邻(k-NN)技术加快检测过程,采用C4.5决策树算法提高分类精度。为了验证分类器的性能,使用了DARPA KDD99入侵检测评估数据集。我们将该方法与k-NN分类器、模糊k-NN分类器和证据理论k-NN分类器的结果进行了比较。结果表明,我们的方法比其他三种分类器具有更好的性能。
{"title":"Fuzzy Belief Reasoning for Intrusion Detection Design","authors":"T. Chou, K. Yen, N. Pissinou, K. Makki","doi":"10.1109/IIH-MSP.2007.416","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.416","url":null,"abstract":"In this paper, we propose a method to resolve uncertainty problems by incorporating fuzzy clustering technique and Dempster-Shafer theory. Also, the k-nearest neighbors (k-NN) technique is applied to speed up the detection process and C4.5 decision tree algorithm is used to improve the classification accuracy. For verifying the performance of our classifier, DARPA KDD99 intrusion detection evaluation data set is used. We compare the results of our proposed approach with those of k-NN classifier, fuzzy k-NN classifier and evidence-theoretic k-NN classifier. The result indicates that our approach has a better performance than these from the other three classifiers.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Spline Interpolation Curve Modeling 高效样条插值曲线建模
Ningping Sun, Toru Ayabe, T. Nishizaki
We present an approach to model handwriting like curves with the cubic spline interpolation function. Different from NURBS such as Bezier and B-spline curve modeling, the huge complexity of the traditional spline interpolation have been obstructed and limited the application of spline curve modeling. We propose an efficient local cubic spline interpolation curve modeling algorithm and provide an approach to apply the algorithm to model arbitrary shape built from free form curves.
提出了一种用三次样条插值函数对手写曲线建模的方法。与Bezier和b样条曲线建模等NURBS不同,传统样条插值的巨大复杂性阻碍和限制了样条曲线建模的应用。提出了一种高效的局部三次样条插值曲线建模算法,并提供了一种将该算法应用于由自由曲线构建的任意形状建模的方法。
{"title":"Efficient Spline Interpolation Curve Modeling","authors":"Ningping Sun, Toru Ayabe, T. Nishizaki","doi":"10.1109/IIH-MSP.2007.393","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.393","url":null,"abstract":"We present an approach to model handwriting like curves with the cubic spline interpolation function. Different from NURBS such as Bezier and B-spline curve modeling, the huge complexity of the traditional spline interpolation have been obstructed and limited the application of spline curve modeling. We propose an efficient local cubic spline interpolation curve modeling algorithm and provide an approach to apply the algorithm to model arbitrary shape built from free form curves.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133942065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Image Retrieval with Long-Term Memory Learning and Short-Time Relevance Feedback 基于长时记忆学习和短时相关反馈的图像检索
Zhen Sun, Zhe-ming Lu, Hai Jin
This paper presents a framework for effective image retrieval by employing long-term memory learning together with short time relevance feedback. Considering the fuzzy characteristic of the human's semantic knowledge, the proposed retrieval framework is associated with a novel matrix named fuzzy semantic relevance matrix (FSRM), which is used for remembering the semantic information obtained from user-provided interactions. Experimental results demonstrate the effectiveness of the proposed scheme.
本文提出了一种利用长时记忆学习与短时相关反馈相结合的有效图像检索框架。考虑到人类语义知识的模糊性,本文提出的检索框架与模糊语义关联矩阵(FSRM)相关联,该矩阵用于记忆从用户提供的交互中获得的语义信息。实验结果证明了该方案的有效性。
{"title":"Image Retrieval with Long-Term Memory Learning and Short-Time Relevance Feedback","authors":"Zhen Sun, Zhe-ming Lu, Hai Jin","doi":"10.1109/IIH-MSP.2007.436","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.436","url":null,"abstract":"This paper presents a framework for effective image retrieval by employing long-term memory learning together with short time relevance feedback. Considering the fuzzy characteristic of the human's semantic knowledge, the proposed retrieval framework is associated with a novel matrix named fuzzy semantic relevance matrix (FSRM), which is used for remembering the semantic information obtained from user-provided interactions. Experimental results demonstrate the effectiveness of the proposed scheme.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1