{"title":"Contour extraction for breast tumor in ultrasound image","authors":"Wei-Ren Chen, P. Tsui, Yung-Sheng Chen","doi":"10.1109/ICMLC.2014.7009664","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009664","url":null,"abstract":"Shape features are usually considered for discriminating benign and malignant breast tumors in ultrasound image. A contour extraction method is presented for the purpose of discrimination. A half contouring is devised for reducing the influence of shadow effect resulting from the ultrasonic energy decay. Based on the cue of contour variation, degree standard variation and texture information are developed as useful features for the discrimination. Above 70% accuracy could be obtained by using the adopted half contour information. Experiments confirm the feasibility of the proposed method.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133657401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised low dimensional embedding for multi-label classification","authors":"Zijie Chen, Z. Hao","doi":"10.1109/ICMLC.2014.7009116","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009116","url":null,"abstract":"In multi-label classification, discovering label structures or label correlations when learning can improve predictive performance and time complexity. In this paper, a unified framework is proposed to incorporate the supervised correlation exploration with the predictive model. In the framework, feature mappings to a low-dimensional subspace is obtained through a linear transformation guided by the label information. And a multi-label classifier is simultaneously built on the projected features. The framework leads to a trace optimization problem which can be solved by a generalized eigenvalue problem. Meanwhile, the dual form of the framework is presented to deal with different problems. Experiments on four datasets show that the proposed framework can achieve comparable performance with four other well-known methods, and achieve better performance when label correlations are important. It's also demonstrated that the framework is efficient when the dimensionality is low, and the dual form will be more efficient without extra computational tricks in the small-sample problems.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast HMM-driven beamforming for robust speech recognition in reverberant environments","authors":"W. Hong","doi":"10.1109/ICMLC.2014.7009663","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009663","url":null,"abstract":"The reverberation is induced from the combination of the direct waveform and multiple reflected waveforms. Therefore, the reverberation is highly corrected with the original speech signal. This leads to dramatically degrade the performance of speech recognition. This paper extends VTS methodology to develop a robust technique for HMM-driven beamformer on the reverberation environments. We approximate the logarithm of Gaussian mixture models of HMM with VTS expansion. This makes it possible to obtain a simpler updating functions of beamformer parameters than the counterparts of original HMM-driven beamformer. The RWCP database is used for the simulation of the multi-channel recorded reverberation speech. A speaker-independent speech query task of Mandarin names was applied to evaluate the performance of the beamformers. Our experimental results show that the proposed algorithm was effective on compoutation reduction for the adaptation process of HMM-driven beamformer. It indicates that the proposed framework benefits the development in robust speech recognition on resource-constrained platforms.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective content-based copy detection scheme for image authentication","authors":"Shinfeng D. Lin, L. Yang","doi":"10.1109/ICMLC.2014.7009136","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009136","url":null,"abstract":"In this paper, a content-based copy detection scheme for image authentication is proposed. The proposed scheme is based on DCT coefficients and Radon transform. It combines the local feature with the global feature to detect suspicious images. The local feature vector is extracted by dividing blocks and selecting the largest DC coefficients. If the similarity is less than a threshold, the global feature vector will be extracted. Radon transform (RT) and discrete Fourier transform (DFT) are then exploited to extract the global feature vector. Experimental results demonstrate that the proposed scheme outperforms other existing techniques for image authentication.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haichao Chen, Quanyong Huang, Sheng Bi, Xiang Yao, N. Guo
{"title":"Implementation of a cheap and portable three-dimensional scanner system","authors":"Haichao Chen, Quanyong Huang, Sheng Bi, Xiang Yao, N. Guo","doi":"10.1109/ICMLC.2014.7009132","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009132","url":null,"abstract":"A low-cost and portable three-dimensional scanner system is designed in this paper, including hardware and software systems. A common camera and a linear laser emitter are used to detect the distance of the object by using triangulation algorithm. Meanwhile, 3D point cloud data is generated. Then by using QuickHull algorithm or MeshLab software, the object's surface can be recovered. To verify the methods mentioned in this paper, a cup is measured using the scanner system. The experimental results show that the system has the following advantages: low cost, lightweight and high accuracy.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Le Li, Jianjun Yang, Yang Xu, Zhen Qin, Honggang Zhang
{"title":"Documents clustering based on max-correntropy nonnegative matrix factorization","authors":"Le Li, Jianjun Yang, Yang Xu, Zhen Qin, Honggang Zhang","doi":"10.1109/ICMLC.2014.7009720","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009720","url":null,"abstract":"Nonnegative matrix factorization (NMF) has been successfully applied to many areas of both classification and clustering. Commonly used NMF algorithms mainly target on minimizing the l2 distance or the Kullback-Leibler (KL) divergence, which may not be suitable for nonlinear cases. In this paper, we propose a new decomposition method by maximizing the correntropy between the original and the product of two low-rank matrices for document clustering. This method also allows us to learn new basis vectors of the semantic feature space from data. To our knowledge, there is no existing work which clusters high dimensional document data by maximizing the correntropy in NMF. Our experimental results show the supremacy of the proposed method over other variants of NMF algorithms on Reuters21578 and TDT2 databasets.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114455155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel intelligent neural guidance law design by using adjoint method","authors":"Jium-Ming Lin, Cheng-Hung Lin","doi":"10.1109/ICMLC.2014.7009133","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009133","url":null,"abstract":"In this study, we propose a novel intelligent neural guidance law by applying several neural network optimization algorithms alternatively in each step, such as Gradient Descent (GD), Levenberg-Marquardt (LM) and Scaled Conjugate Gradient (SCG) methods. The missile turning rate time constant, radome slope error, initial heading error and the noise effects in the guidance loop (such as target maneuver, glint, and fading noises) are taken into consideration by using the adjoint simulation technique. Comparisons with the traditional proportional navigation (PN) method and those applying only one optimization algorithm for the cases of lower and higher altitudes are also made; note that the miss distances obtained by the proposed neural guidance law are always lower.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chia-Rong Su, Ching-Ter Chang, Chih-Yung Chen, Chang-Shu Tu
{"title":"QR codes & GPS functions - New applications in TAIWAN","authors":"Chia-Rong Su, Ching-Ter Chang, Chih-Yung Chen, Chang-Shu Tu","doi":"10.1109/ICMLC.2014.7009683","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009683","url":null,"abstract":"Before the Law Enforcement system was adopted, the conventional manual sign-in system had been used for patrolling. In 2012, the Taipei City Police Department tried to set up an electronic sign-in system by launching a new infrared ray scanning system. But the device was based on heavy equipment and thus cast doubt on the practicability for police officers conducting routine operations. This study aims to assess the possibility of integrating smartphones with digital cameras, the Global Positioning System and maps into the electronic sign-in system.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of dictionary based compressed sensing for photoacoustic image","authors":"Lili Zhou, Jiajun Wang, D. Hu","doi":"10.1109/ICMLC.2014.7009099","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009099","url":null,"abstract":"Restrictions of the hardware conditions and spatial size usually limit the number of the measurements in photo acoustic imaging which will finally degrade the quality of the reconstructed image with the back projection algorithm. In order to recover larger number of measurements from incomplete ones, a compressed sensing (CS) based method was proposed. Different from most existed CS-based photoacoustic reconstruction method, the transform matrix for converting the measurement data to their compressed version is obtained by learning a dictionary with the K-SVD method. Visual assessment and quantitative evaluations in terms of the mean squared error (MSE) and the peak signal-to-noise ratio (PSNR) demonstrate the superiorities of our proposed method.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao-Hua Lai, Min Dong, Sheng Bi, Qi-Yao Luo, Jia-Xian Tan
{"title":"Outdoors real-time information analysis system for elderly based on smart phone","authors":"Hao-Hua Lai, Min Dong, Sheng Bi, Qi-Yao Luo, Jia-Xian Tan","doi":"10.1109/ICMLC.2014.7009130","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009130","url":null,"abstract":"Aging population is growing, and the young people are more concerned about the real-time condition of the elderly. This paper aims to propose a real-time monitoring system, obtaining and analyzing the outdoors dynamic information of the elderly, which is composed of three cooperative modules (mobile client, server and sensor). The sensor is equipped with a Bluetooth module to the data transmission, and the server is mainly responsible for distinguishing between the falling attitude and normal activity and record the outdoors motion path of the elderly. The result is displayed on the client, including the mobile phone and browser. If the abnormal condition emerges, the phone of the elderly immediately alarms and the server sends message to ask their children and relevant departments for help at once. The system shows a good real-time performance and an accurate result.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125939571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}