{"title":"A machine learning approach to detect occluded faces in unconstrained crowd scene","authors":"Shazia Gul, Humera Farooq","doi":"10.1109/ICCI-CC.2015.7259379","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259379","url":null,"abstract":"The face verification systems gained significant attention in the last few years due to the increased security concern in public and private places. Face detection is the most important and initial stage in the automatic face verification system. It helps to determine the existence of faces in an image and return the position and location of the face. The face verification system's accuracy depends on face detection. The human faces are not always frontal and have many variations, therefore, face detection is challenging in unconstrained scenarios. One main challenge of face detection is occlusion. The proposed work is an attempt to illustrate the cognitive informatics approach using machine learning and present an occluded face detection method. The proposed method uses Adaboost[1] machine learning approach. The Viola-Jones[2] algorithm along with free rectangular features[3] has been adopted in the proposed approach in order to detect faces. the machine learning methods require two operation namely training and testing. Two cascade classifiers are used in which one is trained on holistic faces and the second is trained on half occluded faces; both of the classifiers are used in parallel to work in unconfined scene. Additionally, for improvement the correctness and adeptness of the system, the skin color models are applied which are used for removing of the false positive detection. The experiment has been performed on FDDB[4] dataset. The results shows that the proposed method achieve desirable results in the detection of half occluded faces.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123277526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human activity recognition with HMM-DNN model","authors":"Licheng Zhang, Xihong Wu, D. Luo","doi":"10.1109/ICCI-CC.2015.7259385","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259385","url":null,"abstract":"Activity recognition commonly made use of hidden Markov models (HMMs) to exploit temporal dependencies between activities. The emission distribution of HMMs could be represented by generative models, such as Gaussian mixture models (GMMs), or discriminative models, such as random forest (RF). These models, especially discriminative ones, needed to manually extract features from the sensor data, which relied on the experience of the researchers, and usually was a time-consuming task when complicated features are extracted. Furthermore, with these methods, the process of quantization of the sensor data, i.e., manual feature extraction, might lose much useful information and thus led to a performance debasement. In this paper, we recommend deep neural networks (DNNs) for modeling the emission distribution of HMMs, which automatically learn features suitable for classification from the raw sensor data and then estimate the posterior probabilities of the HMM states. We collected a dataset of daily activities and based on which experiments were performed to compare our HMM-DNN model with both HMM-GMM and HMM-RF. The results illustrated that HMM-DNN outperformed both HMM-GMM and HMM-RF.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117291915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The detection of under-eye bags on the facial image","authors":"Xiao Jiang, Yong Chai, Wei Xiong, Yi Zhao","doi":"10.1109/ICCI-CC.2015.7259405","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259405","url":null,"abstract":"In this paper, we propose a novel approach to detect the under-eye bags on the human facial image. The existence and exacerbation of the under-eye bags is one of the significant marks of the facial aging. Once the under-eye bags appear, it not only plays an important impact on the human looks but also gives the impression of the emaciation and senescence. Our experiments and algorithms are based on the image gallery built on our own. The image gallery consists of 8132 facial images of 230 different males which are from different age. The decision of the presence of the under-eye bags in the image is made with the help of the experienced oculists. In the analysis of the facial images, we find several significant features of the under-eye bags in the captured images and design some effective methods to detect them. Base on the our reasonable detection methods, we have designed the under-eye bags classifier. Then we use the whole gallery to evaluate the performance of the classifier. The experiments show that the under-eye bags in the facial image can be well detected with a relatively high accuracy although both the forms of the under-eye bags and the illumination of the image acquisition condition are various.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"9 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116928452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study on associated knowledge flow using OWL based mechnism","authors":"Zheng Xu, Shunxiang Zhang, Haiyan Chen","doi":"10.1109/ICCI-CC.2015.7259398","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259398","url":null,"abstract":"With the explosive growth of Web services in Internet and cloud computing platform, it's difficult for researchers to identify, select, combine, and verify the Web service and its portfolio. The above scene motivates a new area of knowledge representation and services computing, which provide semantic browsing service for users in the type of associated knowledge flow. Associated knowledge flow will also provide fundamental principle for related services fields such as e-Learning, e-Science, video data management, Web searching which can help learners, readers, reviewers to observe, understand and recognize a given document more deeply. The overall idea of engineering design is given, SCAToOWL algorithm which used to converted SCA component and composite into CPSWS is proposed in the paper. Research work about the paper is verified by the case which is the process of the job computing in the cloud platform for industrial design and simulation.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng Lin, Yunzhou Li, Limin Xiao, J. Wang, Xibin Xu
{"title":"An improved multicarrier based waveform design for cognitive radio communication","authors":"Meng Lin, Yunzhou Li, Limin Xiao, J. Wang, Xibin Xu","doi":"10.1109/ICCI-CC.2015.7259375","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259375","url":null,"abstract":"Compared to the CP-OFDM, filter bank based multi-carrier with offset quadrature amplitude modulation (FBMC/OQAM) is more suitable for cognitive radio scenarios by using synthesis and analysis filter banks with well time-frequency location(TFL) property. Being a favorable candidate physical waveform for the cognitive radio system, FBMC/OQAM has attracted much attention. However, real orthogonality instead of complex orthogonality makes the combination of MIMO and FBMC/OQAM system challenging. In this paper, the implemention issues of the FBMC/OQAM system is researched. Considering various prototype filters used, a weighted signal-to-leakage-and-noise ratio (WSLNR) based precoding method is proposed to mitigate intrinsic interference, the simulation results show that the proposed method is more robust to the channel frequency selectivity compared to the others. The spectral comparison for the prototype filters of the FBMC/OQAM and the CP-OFDM recommends the consideration of FBMC/OQAM in the future CR systems.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High precision uplink time and frequency calibration in cognitive space communications","authors":"Menglu Wang, X. Chen, Wenyun Gao","doi":"10.1109/ICCI-CC.2015.7259372","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259372","url":null,"abstract":"Being cognitive is important to future space communications for improved energy and spectrum efficiency. A fundamental challenge therein is calibrating timing and frequency offsets brought by the long distance and rapid relative movement between communications satellites and ground terminals. In this work, we proposed a high-precision time and frequency calibration algorithm for communications between satellites and ground user terminals, with the ideas of recursive short-term satellite state prediction and iterative transmitting time and frequency calculation. The proposed method models and corrects the bias of satellite position and velocity prediction, and improves the precision of transmitting time and frequency calibration. Simulations are conducted for different types of satellite orbits, and the results show that the proposed calibration method significantly outperforms existing methods.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards hierarchical fuzzy rule interpolation","authors":"Shangzhu Jin, Jun Peng","doi":"10.1109/ICCI-CC.2015.7259396","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259396","url":null,"abstract":"Fuzzy rule interpolation offers a useful means for enhancing the robustness of fuzzy models by making inference possible in systems of only a sparse rule base. However in practical applications, as the application domain of fuzzy systems expand to more complex ones, the “curse of dimensionality” problem of the conventional fuzzy systems became apparent, which makes the already challenging tasks such as inference and interpolation even more difficult. An initial idea of hierarchical fuzzy interpolation is presented in this paper. The proposed approach combines hierarchical fuzzy systems and fuzzy rule interpolation, to overcome the “curse of dimensionality” problem and the sparse rule base problem simultaneously. Hierarchical fuzzy interpolation is applicable to situations where a multiple multi-antecedent rules system needs to be reconstructed to a multi-layer fuzzy system and the sub-layer rules base is sparse. This approach is based on fuzzy rule interpolative reasoning that utilities scale and move transformation. Illustrative example and experimental scenario are provided to demonstrate the potential of this approach.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained Differential Harmony Search algorithm","authors":"Xiaoyu Lin, Yiwen Zhong, Yingxu Wang","doi":"10.1109/ICCI-CC.2015.7259366","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259366","url":null,"abstract":"A novel Fine-grained Differential Harmony Search algorithm (FDHS) is presented in this paper. The new algorithm incorporates differential mutation scheme with the pitch adjustment operator of Harmony Search (HS) algorithm. Meanwhile a fine-grained evaluation strategy is adopted inside pitch adjustment on every dimension instead of construction completion. The innate self-adaptive feature of differential mutation operator makes it demonstrate better exploitation ability than fixed-step-size method. While, fine-grained strategy overcomes the interference among dimensions throughout evaluation process to a large extent. The experiments conducted on typical benchmark functions show that the proposed FDHS algorithm demonstrates better convergent speed and solution precision than other HS variants with differential mutation operator.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115066858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast multi-objective differential evolutionary algorithm based on sorting of non-dominated solutions","authors":"Yulong Xu, Lingdong Zhao","doi":"10.1109/ICCI-CC.2015.7259386","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259386","url":null,"abstract":"The multi-objective differential evolution based on Pareto domination is researched. It is found that there are some redundant operations in classic multi-objective evolutionary. Based on the non-dominated solution sorted and its potential features, we introduce a sorting method which only handles the highest rank individuals in current population. During the sorting operation, individuals can be chosen into the next generation. When the next generation is fully the algorithm is broken. Our method reduces the number of individuals for sorting process and the time complexity. In addition, a method of uniform crowding distance calculation is given. Finally, we incorporate the introduced sorting method and uniform crowding distance into differential evolution to propose a fast multi-objective differential evolution algorithm. Simulation results show that the proposed algorithm has greatly improved in terms of time complexity and performance.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data tool integration in physical design process find hidden patterns, predictive analysis and classifying Big Data","authors":"Waseem Ahmed, L. Fan","doi":"10.1109/ICCI-CC.2015.7259408","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2015.7259408","url":null,"abstract":"Physical Design (PD) Big Data tool is designed primarily to assist chip design engineers in achieving design optimization. It uses data mining techniques to handle the existing unstructured data repository. The tool extracts the relevant data and loads it into a well-structured database. It also has an archive mechanism that initially creates and then keeps updating an archive repository on a daily basis. The original input to the PD tool is a completely unstructured datasource which are read by the tool using regular expression based data extraction methodology. By doing this, PD tool converts the input data into the structured tables. This undergoes the data cleansing process before being fed into the operational DB. By maintaining an archive repository of this, PD tool also ensures data integrity and data validity. PD tool helps the design engineers to compare, correlate and inter-relate the results of their existing work with the ones done in the past which gives them a clear picture of the progress made and deviations that occurred. Data analysis can be done using various features offered by the tool such as graphical and statistical representation.","PeriodicalId":328695,"journal":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}