2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems最新文献

筛选
英文 中文
A Method to Control Parameters of Evolutionary Algorithms by Using Reinforcement Learning 基于强化学习的进化算法参数控制方法
Yoshitaka Sakurai, K. Takada, Takashi Kawabe, S. Tsuruta
{"title":"A Method to Control Parameters of Evolutionary Algorithms by Using Reinforcement Learning","authors":"Yoshitaka Sakurai, K. Takada, Takashi Kawabe, S. Tsuruta","doi":"10.1109/SITIS.2010.22","DOIUrl":"https://doi.org/10.1109/SITIS.2010.22","url":null,"abstract":"A search method using an evolutionary algorithm such as a genetic algorithm (GA) is very effective if the parameter is appropriately set. However, the optimum parameter setting was so difficult that each optimal method depending on each problem pattern must be developed one by one. Therefore, this has required special expertise and large amounts of verification experiment. In order to solve this problem, a new method called gadaptive parameter controlh is proposed, which adaptively controls parameters of an evolutionary algorithm. However, since this method just increases the selection probability of a search operator that generated a well evaluated individual, this is apt to be a shortsighted optimization method. On the contrary, a method is proposed to realize longsighted optimal parameter control of GA using reinforcement learning. However, this method does neither consider the calculation cost of search operators nor multipoint search characteristics of GA. This paper proposes a method to efficiently control parameters of an evolutionary algorithm by using the reinforcement learning where the reward decision rules are elaborately incorporated under the consideration of GAfs multipoint search characteristics and calculation cost of the search operator. It is expected that this method can efficiently learn parameters to optimally select search operators of GA for approximately solving Travelling Salesman Problems (TSPs).","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Fractal-based Impressionist Style Rendering 基于分形的印象派风格渲染
Farès Belhadj, V. Boyer
{"title":"Fractal-based Impressionist Style Rendering","authors":"Farès Belhadj, V. Boyer","doi":"10.1109/SITIS.2010.20","DOIUrl":"https://doi.org/10.1109/SITIS.2010.20","url":null,"abstract":"We propose a novel image processing model that produces impressionist style paintings from photographs. Characteristics, here called impressionist constraints, are extracted from photographs and expressed as height map data. We use a constrained fractal model to generate a new image that satisfies the initial height map data constraints. Then, we enhance the characteristics extraction model and present the new resulting images. Other results are presented and illustrate the ability of our model to produce impressionist effects on a large variety of photographs.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Native XML Document Fragmentation Model 原生XML文档碎片模型
Leykun Birhanu, Solomon Atnafu, Fekade Getahun Taddesse
{"title":"Native XML Document Fragmentation Model","authors":"Leykun Birhanu, Solomon Atnafu, Fekade Getahun Taddesse","doi":"10.1109/SITIS.2010.47","DOIUrl":"https://doi.org/10.1109/SITIS.2010.47","url":null,"abstract":"As XML document is distributed across the web, it can be considered like a distributed repository of XML documents and is subjected to distribution design. However, there is no adequate works on XML document distribution design. To address the shortcomings in XML document fragmentation design, in this work, we have focused on the vertical fragmentation design of the XML documents. Two fragmentation models have been proposed: query based fragmentation and structure-and size-based fragmentation. For the query based fragmentation model, vertical fragmentation techniques are proposed using the bond energy algorithm and graphical based algorithm. We have implemented both algorithms and evaluated their performance. The performance of our fragmentation algorithms are compared with centralized and fully replicated XML documents, where better results are obtained. The Structure- and size-based Fragmentation model and its implementation algorithms are also evaluated and encouraging results are achieved.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Integrating Ontologies in Database Scheme: Ontology-Based Views Conceptual Modeling 数据库方案中本体的集成:基于本体的视图概念建模
Oumar Sy, Moussa Lo, Denio Duarte
{"title":"Integrating Ontologies in Database Scheme: Ontology-Based Views Conceptual Modeling","authors":"Oumar Sy, Moussa Lo, Denio Duarte","doi":"10.1109/SITIS.2010.52","DOIUrl":"https://doi.org/10.1109/SITIS.2010.52","url":null,"abstract":"In this paper, we propose an approach to integrate the domain ontology life cycle in database scheme process design. To this end, we lay down that: (i) the ANSI/X3/SPARC architecture is used as modeling framework, (ii) ontology and data semantics are both captured into external schema and propagated to lower level schema, and (iii) ontology-based knowledge is stored in database. As a result, our approach, called Onto Views CM (Ontology-based Views Conceptual Modeling), builds a database having two schemata: a domain ontology schema and a data dimension schema both stored in a single system catalog. We also propose a high level algorithm to access this database.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Can Mean Shift Trackers Perform Better? Mean Shift追踪器能表现得更好吗?
Huiyu Zhou, G. Schaefer, Yuan Yuan, M. E. Celebi
{"title":"Can Mean Shift Trackers Perform Better?","authors":"Huiyu Zhou, G. Schaefer, Yuan Yuan, M. E. Celebi","doi":"10.1109/SITIS.2010.26","DOIUrl":"https://doi.org/10.1109/SITIS.2010.26","url":null,"abstract":"Many tracking algorithms have difficulties dealing with occlusions and background clutters, and consequently don't converge to an appropriate solution. Tracking based on the mean shift algorithm has shown robust performance in many circumstances but still fails e.g. when encountering dramatic intensity or colour changes in a pre-defined neighbourhood. In this paper, we present a robust tracking algorithm that integrates the advantages of mean shift tracking with those of tracking local invariant features. These features are integrated into the mean shift formulation so that tracking is performed based both on mean shift and feature probability distributions, coupled with an expectation maximisation scheme. Experimental results show robust tracking performance on a series of complicated real image sequences.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge Cartography and Social Network Representation: Application to Collaborative Platforms in Scientific Area 知识制图与社会网络表示:在科学领域协作平台中的应用
Michel Plantié, Pierre-Michel Riccio
{"title":"Knowledge Cartography and Social Network Representation: Application to Collaborative Platforms in Scientific Area","authors":"Michel Plantié, Pierre-Michel Riccio","doi":"10.1109/SITIS.2010.45","DOIUrl":"https://doi.org/10.1109/SITIS.2010.45","url":null,"abstract":"Our research revolves around collaborative platforms entirely dedicated to research activities for several scientific organizations. Here, researchers from different domains interact and exchange information using our platforms as the common ground involving new concepts, methods and services to encourage collaborative work for their research activities. The work is based on the co-operation and collaboration between scientific specialists and engineers building the platform. In our proposal we attempt to capture the individual information and then build social network representations to build a group representation of knowledge, attracting and encouraging people to participate in collaborative tasks.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133046527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protein Structure Modeling in Two-Level Topology Strings for Structure Comparison 用于结构比较的两级拓扑串中的蛋白质结构建模
J. Razmara, S. Deris, Sepideh Parvizpour
{"title":"Protein Structure Modeling in Two-Level Topology Strings for Structure Comparison","authors":"J. Razmara, S. Deris, Sepideh Parvizpour","doi":"10.1109/SITIS.2010.57","DOIUrl":"https://doi.org/10.1109/SITIS.2010.57","url":null,"abstract":"Biological data representation in textual sequences has opened a new hybrid research area in protein structure analysis. The paper presents a novel method for structural comparison and alignment of proteins based on text modeling techniques. The method firstly models the geometry of protein secondary and tertiary structure in two-level topology strings and then, employs n-gram modeling and cross-entropy concept from computational linguistics approach to compare strings and align structures. The results of the experiments confirm the validity and efficiency of the proposed method. Moreover, conceptual simplicity of the method indicates applicability and preference of the method in comparison to the other related techniques.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Approach for Interoperability Testing of Security Rules 安全规则互操作性测试的形式化方法
Mazen El Maarabani, Iksoon Hwang, A. Cavalli
{"title":"A Formal Approach for Interoperability Testing of Security Rules","authors":"Mazen El Maarabani, Iksoon Hwang, A. Cavalli","doi":"10.1109/SITIS.2010.53","DOIUrl":"https://doi.org/10.1109/SITIS.2010.53","url":null,"abstract":"The interaction between business communities becomes a crucial requirement due to the need of exchanging and sharing resources and services. In general, each system defines its own security policy to manage access control to its resources. In this case, we may have security interoperability problems due to the variety and complexity of secured systems implementations. In this paper, we provide a formal approach for interoperability testing of security rules. First we propose a method to integrate interoperability security rules in a functional model represented by an extended finite automata. Then, test cases are generated from the obtained secured functional model by using an automatic test generation tool, Test Gen-IF. As an application, we provide a case study of security interoperability between two hospitals that share some resources.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic Segmentation of Abdominal Aortic Aneurysm in Computed Tomography Images Using Spatial Fuzzy C-Means 基于空间模糊c均值的腹主动脉瘤ct图像自动分割
Emadaldin Mozafari Majd, U. U. Sheikh, S. Abu-Bakar
{"title":"Automatic Segmentation of Abdominal Aortic Aneurysm in Computed Tomography Images Using Spatial Fuzzy C-Means","authors":"Emadaldin Mozafari Majd, U. U. Sheikh, S. Abu-Bakar","doi":"10.1109/SITIS.2010.38","DOIUrl":"https://doi.org/10.1109/SITIS.2010.38","url":null,"abstract":"Abdominal aortic aneurysm (AAA) is a cardiovascular disease which mostly appears in elderly people. Due to the weakening of aortic wall, a rupture occurs in the most inner layer of aorta and a thrombus is generated. If the diameter exceeds greater than 5.5 cm, a treatment strategy is required. As a result, CT imaging is utilized to screen and evaluate thrombus parameters for treatment. Exploitation of automatic techniques improves the pre- and post-treatment evaluation. In this paper, at first an algorithm based on spatial fuzzy c-means is applied to the CT image. Then lumen and thrombus are segmented automatically by tuning of morphological operators and thresholding parameters.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"12 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting Worms Using Data Mining Techniques: Learning in the Presence of Class Noise 使用数据挖掘技术检测蠕虫:在班级噪声存在下学习
I. Ismail, M. N. Marsono, S. Nor
{"title":"Detecting Worms Using Data Mining Techniques: Learning in the Presence of Class Noise","authors":"I. Ismail, M. N. Marsono, S. Nor","doi":"10.1109/SITIS.2010.41","DOIUrl":"https://doi.org/10.1109/SITIS.2010.41","url":null,"abstract":"Worms are self-contained programs that spread over the Internet. Worms cause problems such as lost of information, information theft and denial-of-service attacks. The first part of the paper evaluates the detection of worms based on content classification by using all machine learning techniques available in WEKA data mining tools. Four most accurate and quite fast classifiers are identified for further analysis–Naive Bayes, J48, SMO and Winnow. Results show that classification using machine learning techniques could classify worms to 99% accuracy. From the accuracy perspective, J48 performs better than other algorithms meanwhile Naive Bayes and Winnow show the best performances in terms of speed. The second part of the paper analyzes the accuracy these four classifiers under the presence of class noise in learning corpora. By injecting class noise ranging between 0% and 50% into positive and negative corpora, results from the simulation show gradual decrease in accuracy and increase in false positive and false negative for all analyzed techniques. The presence of the classes noise affects false positive more significantly compared to false negative. The results show that worm detection with classification algorithms could not tolerate the presence of classes noise in learning corpora.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132133152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信