首页 > 最新文献

2009 IEEE International Conference on Granular Computing最新文献

英文 中文
A fast and accurate collaborative filter 快速准确的协同过滤
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255149
W. Deng, Qinghua Zheng, Lin Chen
There are two key issues for collaborative filtering: curse of dimension and long-consuming training. In our proposed algorithm, the curse of dimension problem is resolved by the proposed Reduced-SVD technique effectively and long-consuming training is addressed by Extreme Learning Machine (ELM) which is hundreds of times faster than iterative algorithms (e.g. BP). This will enable the algorithm more accurate and faster.
协同过滤存在两个关键问题:维度诅咒和训练耗时长。在本文提出的算法中,提出的svd技术有效地解决了维数诅咒问题,并采用极限学习机(ELM)解决了耗时长的训练问题,其速度比迭代算法(如BP)快数百倍。这将使算法更加准确和快速。
{"title":"A fast and accurate collaborative filter","authors":"W. Deng, Qinghua Zheng, Lin Chen","doi":"10.1109/GRC.2009.5255149","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255149","url":null,"abstract":"There are two key issues for collaborative filtering: curse of dimension and long-consuming training. In our proposed algorithm, the curse of dimension problem is resolved by the proposed Reduced-SVD technique effectively and long-consuming training is addressed by Extreme Learning Machine (ELM) which is hundreds of times faster than iterative algorithms (e.g. BP). This will enable the algorithm more accurate and faster.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"19 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human facial expression mining based on cloud model 基于云模型的人脸表情挖掘
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255059
Shuliang Wang, He-hua Chi, Xiao Feng, Jinfei Yin
In order to make the human facial expression recognition and analysis effectively, cloud model is used to mine the knowledge of human facial expression in this paper. Backward cloud generator without certainty degree treats the original input image as a cloud droplet image. The outputs are used to describe the three numerical characteristics-(Ex, En, He). How the three numerical characteristics of the cloud model (Ex, En, He) to embody the knowledge of facial expression? With two different sets of original images, two experiments are made to explain the specific meaning of the three numerical characteristics (Ex, En, He). Under the experiments, the profound knowledge may be extracted on the facial expression, i.e. Ex is the common of standard face, En is the difference, and He is the range of the difference.
为了有效地对人类面部表情进行识别和分析,本文采用云模型对人类面部表情知识进行挖掘。不确定度的后向云生成器将原始输入图像视为云滴图像。输出用于描述三个数值特征-(Ex, En, He)。云模型的三个数值特征(Ex、En、He)如何体现面部表情的知识?利用两组不同的原始图像,通过两个实验来解释三个数值特征(Ex, En, He)的具体含义。在实验中,可以对人脸表情进行深刻的认识,即Ex为标准人脸的共性,En为差异,He为差异的范围。
{"title":"Human facial expression mining based on cloud model","authors":"Shuliang Wang, He-hua Chi, Xiao Feng, Jinfei Yin","doi":"10.1109/GRC.2009.5255059","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255059","url":null,"abstract":"In order to make the human facial expression recognition and analysis effectively, cloud model is used to mine the knowledge of human facial expression in this paper. Backward cloud generator without certainty degree treats the original input image as a cloud droplet image. The outputs are used to describe the three numerical characteristics-(Ex, En, He). How the three numerical characteristics of the cloud model (Ex, En, He) to embody the knowledge of facial expression? With two different sets of original images, two experiments are made to explain the specific meaning of the three numerical characteristics (Ex, En, He). Under the experiments, the profound knowledge may be extracted on the facial expression, i.e. Ex is the common of standard face, En is the difference, and He is the range of the difference.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formal theory of granular computing, and two major applications 颗粒计算的形式化理论,以及两个主要应用
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255091
T. Lin
The term granular computing (GrC), roughly speaking, is jointly coined by Lin and Zadeh in the fall of 1996 (Zadeh, 1998). Since then, special interest group conferences, workshops, special sessions and special issues have gradually flourished. Many opinions have been expressed. We shall mentioned our initial idea: Zadeh gave an intuitive definition in (Zadeh, 1996) and outline his seminal paper (Zadeh, 1997), where he said “TFIG (which is GrC) • • • • are mathematics in nature.” While we share his view, but took an incremental approach. The First GrC Model (neighborhood systems or pre-topology) was investigated (Lin, 1989, 1998) from the view of topological spaces, rough sets, databases and computer security.
粗略地说,颗粒计算(GrC)这个术语是由Lin和Zadeh在1996年秋天共同创造的(Zadeh, 1998)。此后,专题兴趣小组会议、专题研讨、专题会议、专题问题逐渐兴起。人们表达了许多意见。我们将提到我们最初的想法:Zadeh在(Zadeh, 1996)中给出了一个直观的定义,并概述了他的开创性论文(Zadeh, 1997),他说“TFIG(即GrC)•••••本质上是数学。”虽然我们赞同他的观点,但采取了循序渐进的方式。从拓扑空间、粗糙集、数据库和计算机安全的角度研究了第一种GrC模型(邻域系统或预拓扑)(Lin, 1989,1998)。
{"title":"Formal theory of granular computing, and two major applications","authors":"T. Lin","doi":"10.1109/GRC.2009.5255091","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255091","url":null,"abstract":"The term granular computing (GrC), roughly speaking, is jointly coined by Lin and Zadeh in the fall of 1996 (Zadeh, 1998). Since then, special interest group conferences, workshops, special sessions and special issues have gradually flourished. Many opinions have been expressed. We shall mentioned our initial idea: Zadeh gave an intuitive definition in (Zadeh, 1996) and outline his seminal paper (Zadeh, 1997), where he said “TFIG (which is GrC) • • • • are mathematics in nature.” While we share his view, but took an incremental approach. The First GrC Model (neighborhood systems or pre-topology) was investigated (Lin, 1989, 1998) from the view of topological spaces, rough sets, databases and computer security.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough 3-valued Lukasiewicz algebras and BCI-algebras 粗糙3值Lukasiewicz代数与bci -代数
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255151
Jianhua Dai
The collection of all the rough sets of an approximation space can be made into a 3-valued Lukasiewicz algebra called rough 3-valued Lukasiewcz algebras. BCI-algebras and BCK-algebras are two important classes of logical algebras. In this paper, it is shown that a rough 3-valued Lukasiewicz algebra is a BCI-algebra and a BCK-algebra. The direct relation between rough set theory and BCI-algebras/BCK-algebras is constructed. The definition of rough BCI-algebras and rough BCK-algebras are also given.
一个近似空间的所有粗糙集的集合可以构成一个3值Lukasiewicz代数,称为粗糙3值Lukasiewicz代数。bci -代数和bck -代数是两类重要的逻辑代数。本文证明了粗糙3值Lukasiewicz代数是bci -代数和bck -代数。建立了粗糙集理论与bci -代数/ bck -代数的直接关系。给出了粗糙bci -代数和粗糙bck -代数的定义。
{"title":"Rough 3-valued Lukasiewicz algebras and BCI-algebras","authors":"Jianhua Dai","doi":"10.1109/GRC.2009.5255151","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255151","url":null,"abstract":"The collection of all the rough sets of an approximation space can be made into a 3-valued Lukasiewicz algebra called rough 3-valued Lukasiewcz algebras. BCI-algebras and BCK-algebras are two important classes of logical algebras. In this paper, it is shown that a rough 3-valued Lukasiewicz algebra is a BCI-algebra and a BCK-algebra. The direct relation between rough set theory and BCI-algebras/BCK-algebras is constructed. The definition of rough BCI-algebras and rough BCK-algebras are also given.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of tolerant fuzzy c-means clustering with L2- and L1-regularization L2正则化与l1正则化容错模糊c均值聚类的比较
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255128
Y. Hamasuna, Y. Endo, S. Miyamoto
In this paper, we will propose two types of tolerant fuzzy c-means clustering with regularization terms. One is L2-regularization term and the other is L1-regularization one for tolerance vector. Introducing a concept of clusterwise tolerance, we have proposed tolerant fuzzy c-means clustering from the viewpoint of handling data more flexibly. In tolerant fuzzy c-means clustering, a constraint for tolerance vector which restricts the upper bound of tolerance vector is used. In this paper, regularization terms for tolerance vector are used instead of the constraint. First, the concept of clusterwise tolerance is introduced. Second, optimization problems for tolerant fuzzy c-means clustering with regularization term are formulated. Third, optimal solutions of these optimization problems are derived. Fourth, new clustering algorithms are constructed based on the explicit optimal solutions. Finally, effectiveness of proposed algorithms is verified through numerical examples.
在本文中,我们将提出两种带有正则化项的容错模糊c均值聚类。一个是l2正则化项,另一个是l1正则化项。引入聚类容忍的概念,从更灵活地处理数据的角度提出了容忍模糊c均值聚类。在容差模糊c均值聚类中,利用容差向量约束约束容差向量的上界。本文用正则化项来代替约束条件。首先,介绍了集群容忍的概念。其次,提出了带有正则化项的容忍模糊c均值聚类的优化问题。第三,导出了这些优化问题的最优解。第四,基于显式最优解构造新的聚类算法。最后,通过数值算例验证了算法的有效性。
{"title":"Comparison of tolerant fuzzy c-means clustering with L2- and L1-regularization","authors":"Y. Hamasuna, Y. Endo, S. Miyamoto","doi":"10.1109/GRC.2009.5255128","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255128","url":null,"abstract":"In this paper, we will propose two types of tolerant fuzzy c-means clustering with regularization terms. One is L2-regularization term and the other is L1-regularization one for tolerance vector. Introducing a concept of clusterwise tolerance, we have proposed tolerant fuzzy c-means clustering from the viewpoint of handling data more flexibly. In tolerant fuzzy c-means clustering, a constraint for tolerance vector which restricts the upper bound of tolerance vector is used. In this paper, regularization terms for tolerance vector are used instead of the constraint. First, the concept of clusterwise tolerance is introduced. Second, optimization problems for tolerant fuzzy c-means clustering with regularization term are formulated. Third, optimal solutions of these optimization problems are derived. Fourth, new clustering algorithms are constructed based on the explicit optimal solutions. Finally, effectiveness of proposed algorithms is verified through numerical examples.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122964314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Random forest for relational classification with application to terrorist profiling 随机森林的关系分类及其在恐怖分子特征分析中的应用
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255041
Jian Xu, Jianhua Chen, Bin Li
We study the problem of detecting and profiling terrorists using a combination of an ensemble classifier, namely random forest and relational information. Given a database for a set of individuals characterized by both “local” attributes such as age and criminal background, and “relational” information such as communications among a subset of the individuals, with a subset of the individuals labeled as terrorist or normal people, our task is to design a classifier that captures the patterns of terrorists and achieves good accuracy in predicting the labels of the remaining part of the database. In previous work, a hybrid approach was presented that iteratively applies a flat classifier (such as decision trees, fuzzy clustering) augmented with flattened relational attributes for learning and classification. In the current work, our approach is to use random forest as the “flat” classifier in the terrorist detection setting. Random forest is known to have advantage in handling tasks with high dimensionality in input data. This merit of random forest method is very useful for relational learning if the number of “flattened” relational attributes is quite large, which is indeed the case for the terrorist detection task. We report our experiments on a synthetic terrorist database that compare the prediction accuracy of random forest with two other “flat” classifiers, namely, ordinary decision tree and fuzzy clustering. The experimental results show that random forest outperforms both ordinary decision tree and fuzzy clustering. random forest
我们使用集成分类器,即随机森林和关系信息的组合来研究检测和分析恐怖分子的问题。给定一个数据库,其中包含一组具有“本地”属性(如年龄和犯罪背景)和“关系”信息(如一组个体之间的通信)特征的个体,其中一组个体被标记为恐怖分子或正常人,我们的任务是设计一个分类器,该分类器捕获恐怖分子的模式,并在预测数据库其余部分的标签方面达到良好的准确性。在之前的工作中,提出了一种混合方法,迭代地应用平面分类器(如决策树,模糊聚类),增强平面关系属性进行学习和分类。在目前的工作中,我们的方法是在恐怖分子检测设置中使用随机森林作为“平面”分类器。随机森林在处理输入数据的高维任务方面具有优势。随机森林方法的这一优点对于关系学习非常有用,如果“扁平”的关系属性的数量相当大,这确实是恐怖分子检测任务的情况。我们报告了我们在一个合成恐怖分子数据库上的实验,将随机森林的预测精度与另外两种“平面”分类器(即普通决策树和模糊聚类)进行了比较。实验结果表明,随机森林优于普通决策树和模糊聚类。随机森林
{"title":"Random forest for relational classification with application to terrorist profiling","authors":"Jian Xu, Jianhua Chen, Bin Li","doi":"10.1109/GRC.2009.5255041","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255041","url":null,"abstract":"We study the problem of detecting and profiling terrorists using a combination of an ensemble classifier, namely random forest and relational information. Given a database for a set of individuals characterized by both “local” attributes such as age and criminal background, and “relational” information such as communications among a subset of the individuals, with a subset of the individuals labeled as terrorist or normal people, our task is to design a classifier that captures the patterns of terrorists and achieves good accuracy in predicting the labels of the remaining part of the database. In previous work, a hybrid approach was presented that iteratively applies a flat classifier (such as decision trees, fuzzy clustering) augmented with flattened relational attributes for learning and classification. In the current work, our approach is to use random forest as the “flat” classifier in the terrorist detection setting. Random forest is known to have advantage in handling tasks with high dimensionality in input data. This merit of random forest method is very useful for relational learning if the number of “flattened” relational attributes is quite large, which is indeed the case for the terrorist detection task. We report our experiments on a synthetic terrorist database that compare the prediction accuracy of random forest with two other “flat” classifiers, namely, ordinary decision tree and fuzzy clustering. The experimental results show that random forest outperforms both ordinary decision tree and fuzzy clustering. random forest","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125725978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-attribute based analysis of stability of strategic alliance among liner shipping companies 基于多属性的班轮航运企业战略联盟稳定性分析
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255094
Jian-li Li, Hong Zhen, Kai Xu
Strategic alliance among liner-shipping companies is one of the key factors for enterprises to realize win-win strategy, but there also exists huge crises. We mainly utilize method of attribute coordinate to analyze the dynamic alliance behavior among shipping companies, in which relationships between cooperation and such aspects as trade-off cost and repeated gaming is discussed. We further expatriate the psychological changing process of strategic alliance in bilateral manner among enterprises.
班轮运输企业之间的战略联盟是企业实现共赢战略的关键因素之一,但同时也存在着巨大的危机。本文主要利用属性坐标的方法分析航运企业之间的动态联盟行为,讨论了合作与权衡成本、重复博弈等方面的关系。在此基础上,进一步归纳了企业间双边战略联盟的心理变化过程。
{"title":"Multi-attribute based analysis of stability of strategic alliance among liner shipping companies","authors":"Jian-li Li, Hong Zhen, Kai Xu","doi":"10.1109/GRC.2009.5255094","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255094","url":null,"abstract":"Strategic alliance among liner-shipping companies is one of the key factors for enterprises to realize win-win strategy, but there also exists huge crises. We mainly utilize method of attribute coordinate to analyze the dynamic alliance behavior among shipping companies, in which relationships between cooperation and such aspects as trade-off cost and repeated gaming is discussed. We further expatriate the psychological changing process of strategic alliance in bilateral manner among enterprises.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prerequisites to authentication protocols proved by binding theory 绑定理论证明认证协议的前提条件
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255038
HaiFeng Xue
The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.
提出了认证协议的绑定理论和安全前提条件。绑定理论构建了一个形式化的理论模型,通过该模型可以快速推断出一些安全属性。绑定理论来源于加密协议中使用的密钥是安全协议的核心组件这一基本思想。基于绑定理论,对认证协议的安全前提命题进行了建模和证明。当认证协议对认证属性存在安全弱点时,绑定理论和安全前提命题可以简单有效地决定认证协议的安全属性。以一些经典的安全协议为例,通过绑定理论和安全前提命题来推断和发现它们的一些安全属性。
{"title":"Prerequisites to authentication protocols proved by binding theory","authors":"HaiFeng Xue","doi":"10.1109/GRC.2009.5255038","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255038","url":null,"abstract":"The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric feature based facial expression recognition using multiclass support vector machines 基于几何特征的多类支持向量机面部表情识别
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255106
Gang Lei, Xiaohua Li, Jiliu Zhou, Xiao-gang Gong
In this paper, a novel Geometric features extraction method for facial expression recognition is proposed. ASM automatic fiducial point location algorithm is firstly applied to a facial expression image, and then calculating the Euclidean distances between the center of gravity coordinate and the annotated fiducial points' coordinates of the face image. In order to extract the discriminate deformable geometric information, the system extracts the geometric deformation difference features between a person's neural expression and the other seven basic expressions. A multiclass Support Vector Machine (SVM) classifier is used to recognize the facial expressions. Experiments indicate that our proposed method can obtain good classification accuracy.
提出了一种新的面部表情识别几何特征提取方法。首先将ASM自动基准点定位算法应用于人脸表情图像,然后计算人脸图像重心坐标与标注基准点坐标之间的欧氏距离。为了提取可区分变形的几何信息,系统提取人的神经表情与其他七种基本表情的几何变形差异特征。采用多类支持向量机(SVM)分类器对面部表情进行识别。实验表明,该方法能获得较好的分类精度。
{"title":"Geometric feature based facial expression recognition using multiclass support vector machines","authors":"Gang Lei, Xiaohua Li, Jiliu Zhou, Xiao-gang Gong","doi":"10.1109/GRC.2009.5255106","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255106","url":null,"abstract":"In this paper, a novel Geometric features extraction method for facial expression recognition is proposed. ASM automatic fiducial point location algorithm is firstly applied to a facial expression image, and then calculating the Euclidean distances between the center of gravity coordinate and the annotated fiducial points' coordinates of the face image. In order to extract the discriminate deformable geometric information, the system extracts the geometric deformation difference features between a person's neural expression and the other seven basic expressions. A multiclass Support Vector Machine (SVM) classifier is used to recognize the facial expressions. Experiments indicate that our proposed method can obtain good classification accuracy.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
An incremental updating principle for computing approximations in information systems while the object set varies with time 当对象集随时间变化时,用于计算信息系统中近似值的增量更新原理
Pub Date : 2009-09-22 DOI: 10.1109/GRC.2009.5255157
Hongmei Chen, Tianrui Li, Chengxiang Hu, Xiaolan Ji
Approximations of a concept in the variable precision rough set model will change when an information system varies with time. Usually, it is an effective method to carry out incremental updating approximations by using existing information in the dynamic environment. This paper focuses on the incremental updating principle of computing approximations while objects in information systems dynamically change. The properties of approximations and approaches for updating approximations are provided while objects in the universe evolve over time.
当信息系统随时间变化时,变精度粗糙集模型中概念的近似值会发生变化。通常,在动态环境中利用已有信息进行增量更新逼近是一种有效的方法。研究了信息系统中对象动态变化时逼近计算的增量更新原理。当宇宙中的物体随时间演化时,提供了近似值的属性和更新近似值的方法。
{"title":"An incremental updating principle for computing approximations in information systems while the object set varies with time","authors":"Hongmei Chen, Tianrui Li, Chengxiang Hu, Xiaolan Ji","doi":"10.1109/GRC.2009.5255157","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255157","url":null,"abstract":"Approximations of a concept in the variable precision rough set model will change when an information system varies with time. Usually, it is an effective method to carry out incremental updating approximations by using existing information in the dynamic environment. This paper focuses on the incremental updating principle of computing approximations while objects in information systems dynamically change. The properties of approximations and approaches for updating approximations are provided while objects in the universe evolve over time.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2009 IEEE International Conference on Granular Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1