{"title":"Multi-targets for high-resolution range profile of radar based on fuzzy support vector machine","authors":"C. Zheng, G. Zheng, L. Jiao, A. Ding","doi":"10.1109/ICCIMA.2003.1238160","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238160","url":null,"abstract":"Multi target recognition of high-resolution 1D radar image is proposed in this paper based on the fuzzy support vector machine. The four classes of finite real measured data of radar range profile image are recognized. Better simulation results were obtained compared with the traditional support vector machine approach. It is showed that the improved fuzzy support vector machine has the characteristics of simpler calculation and better testing correctness.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong Chun-xi, Yang Shao-quan, Rao Xian, Tang Jian-long
{"title":"An algorithm of estimating the generalization performance of RBF-SVM","authors":"Dong Chun-xi, Yang Shao-quan, Rao Xian, Tang Jian-long","doi":"10.1109/ICCIMA.2003.1238101","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238101","url":null,"abstract":"Using the sparseness of a support vector machine (SVM) solution, properties of radial basis function (RBF) kernel and the inter-median parameters in training the SVM, an algorithm to estimate the generalization performance of RBF-SVM is presented. Without additional complex computing, it overcomes many disadvantages of existing algorithm such as longer computation time and narrower application range. It is proved to be a general method for estimating the generalization performance of a RBF-SVM theoretically and experimentally and can be applied in wide range problems of pattern recognition using SVM.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"21 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114130812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design and implement of Internet intelligence agent in electronic commerce environment [implement read implementation] [intelligence read intelligent]","authors":"Chen Qingzhang, Jin Kezhong, Ying Kezhen","doi":"10.1109/ICCIMA.2003.1238120","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238120","url":null,"abstract":"The paper describes an Internet intelligence agent system. It can help users to conclude and analyze the information afforded by the same type of Web sites in the Internet and shorten the time of searching or comparing information. By using three layers' structure, this system has several functions such as distributed processing, support for different operation systems and Web pages mining. And the foreground of this structure is the communicating region between system and users. The intermediate is used to contact with foreground and background and classify or analyze the executed information. The responsibilities of background are extracting and storing information. This system has two subsystems: real-time Web page mining agent subsystem and real-time online transaction subsystem. The former can extract information from the Internet at real time, while the latter can help users to make online deals automatically.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive wavelets neural networks based multiuser detector","authors":"Ling Wang, H. Tao, L. Jiao, Fang Liu","doi":"10.1109/ICCIMA.2003.1238168","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238168","url":null,"abstract":"The capacity and performance of code division multiple access (CDMA) system are limited by multiple access interference (MAI) and \"near-far\" problem, the effect on receivers of which depends on the users' signatures and the actual detector in the receiver. An adaptive wavelets neural networks (AWNN) based multiuser detector is proposed for demodulation of direct sequence CDMA (DS-CDMA) signals in both synchronous and asynchronous Gaussian channels, the complexity of which only lies on that of AWNN. The performance analysis of the detector are carried out by Monte Carlo simulations. The results show it greatly exceeds the matched filter detector and the multilayer perceptron based multiuser detector. In addition, it approaches to the matched filters under single user scenario.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Literature resource portal based on virtual dynamic hierarchical architecture","authors":"Huang Lican, Weidong Chen, Zhaohui Wu, P. Yunhe","doi":"10.1109/ICCIMA.2003.1238170","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238170","url":null,"abstract":"This paper presents a model of literature resource portal based on virtual and dynamic hierarchical architecture (VDHA) in an e-Science Grid-CUEG. Literature resources are important to the scientists. How to exactly and fully access the literature in distributed and heterogeneous resources is a big issue. How to avoid the disadvantage of centralizing index server's crashing down is another big issue. The model based on VDHA we proposed here can solve these problems.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint verification using wavelet transform","authors":"H. Selvaraj, S. Arivazhagan, L. Ganesan","doi":"10.1109/ICCIMA.2003.1238164","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238164","url":null,"abstract":"Fingerprint verification is one of the most reliable personal identification methods and it plays a very important role in forensic and civilian applications. However, manual fingerprint verification is so tedious, time-consuming, and expensive in that it is incapable of meeting today's increasing performance requirements. Hence, an automatic fingerprint identification system (AFIS) is widely needed. Wavelet transform which has wide range of applications such as image compression, denoising noisy data, texture classification, etc., is used in this paper, for fingerprint verification. It describes the design and implementation of an offline fingerprint verification system using wavelet transform. In this method, matching can be done between the input image and the stored template without resorting to exhaustive search using the extracted feature. The experimental results show that the wavelet transform based approach is better than the existing minutiae based method and it takes less response time which is more suitable for online verification, with high accuracy.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114256961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Hongtao, D. Feng, Zhao Rong-Chun, Wang Xiu-ying
{"title":"Face recognition method using mutual information and hybrid feature","authors":"S. Hongtao, D. Feng, Zhao Rong-Chun, Wang Xiu-ying","doi":"10.1109/ICCIMA.2003.1238165","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238165","url":null,"abstract":"A two-stage face recognition algorithm is proposed. In the first stage, the mutual information match is applied to reduce the candidate pattern amount in the database. In the second stage, the principal component analysis (PCA) and linear discriminant analysis (LDA) are applied to the probe image to extract the corresponding features, which will be used in classification. The approach is tested on ORL database, Shimon database and Harvard database. The experimental results demonstrate that the performance of this system is superior to other algorithms on the same database.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive polyclonal programming algorithm with applications","authors":"Haifeng Du, Licheng Jiao, Ruochen Liu","doi":"10.1109/ICCIMA.2003.1238150","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238150","url":null,"abstract":"Based on the clonal selection theory, the main mechanism of immune clone applied in artificial intelligence is analyzed in this paper. A new operator, adaptive polyclonal operator as well as a novel artificial immune system algorithm, APPA (adaptive polyclonal programming algorithm), is put forward. Compared with some other evolutionary programming algorithms (like breeder genetic algorithm), APPA, behaving as an evolutionary strategy, is shown to be capable of solving complex machine learning tasks effectively, like multimodal function optimization.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition using self-organizing feature maps and support vector machines","authors":"Liang Chaoyang, Liu Fang, Xie Yin-xiang","doi":"10.1109/ICCIMA.2003.1238097","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238097","url":null,"abstract":"Self-organizing feature maps are topologically ordered. One develops realistic cortical structures when given approximations of the visual environment as input, and are an effective way to model the development of face recognition abilities. Support vector machines (SVMs) are classifiers, which have demonstrated high generalization capabilities. In this paper, we combine these two techniques for face recognition problem. Experiments were made on two different face databases, achieving very high recognition rates with relative low classification cost. As the results using the combination SOM/SVM were not very far from only with SVM, but the classifier cost of SOM/SVM is one-tenth of with SVM.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intention-based image retrieval using SGLD matrices","authors":"Ying Dai","doi":"10.1109/ICCIMA.2003.1238146","DOIUrl":"https://doi.org/10.1109/ICCIMA.2003.1238146","url":null,"abstract":"In this paper, we proposed an intention-based image retrieval approach by using the SGLD (space gray level dependence) matrices of images. By using textural features of SGLD matrices, associations between the human visual perception for images and the SGLD textural features were analyzed. Based on the analysis results, the scheme for intention-based image retrieval was proposed.","PeriodicalId":385362,"journal":{"name":"Proceedings Fifth International Conference on Computational Intelligence and Multimedia Applications. ICCIMA 2003","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}