2010 Second International Conference on Machine Learning and Computing最新文献

筛选
英文 中文
Facial Gesture Identification Using Lip Contours 利用嘴唇轮廓识别面部手势
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.13
J. Raheja, Radhey Shyam, Jatin Gupta, Umesh Kumar, P. B. Prasad
{"title":"Facial Gesture Identification Using Lip Contours","authors":"J. Raheja, Radhey Shyam, Jatin Gupta, Umesh Kumar, P. B. Prasad","doi":"10.1109/ICMLC.2010.13","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.13","url":null,"abstract":"This paper describes a robust technique to determine happy/sad/neutral facial gestures of humans by processing an image containing human face. It aims to do away with the cumbersome process of training the computer with images and thereby significantly reducing the processing time. In this technique human face is identified using skin color identification on various spaces like HSV and YCbCr. Segmented features of face like the lips are determined using unique face feature determination. Contour of lips formed for different human moods are analyzed to identify, facial gesture. Edge detection of lips, followed by morphological operation, gives lip structure. Pattern analysis of lips using the unique histogram algorithm and subsequent comparison with different facial gesture icons gives facial gesture of human being in an image. This technique when tested on a huge database of human images under varying lightning conditions gave acceptable accuracy rates and was found fast enough to be used in real time video-stream","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image Compression using Artificial Neural Networks 基于人工神经网络的图像压缩
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.33
P. V. Rao, S. Madhusudana, Nachiketh S.S., K. Keerthi
{"title":"Image Compression using Artificial Neural Networks","authors":"P. V. Rao, S. Madhusudana, Nachiketh S.S., K. Keerthi","doi":"10.1109/ICMLC.2010.33","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.33","url":null,"abstract":"This paper explores the application of artificial neural networks to image compression. An image compressing algorithm based on Back Propagation (BP) network is developed after image pre-processing. By implementing the proposed scheme the influence of different transfer functions and compression ratios within the scheme is investigated. It has been demonstrated through several experiments that peak-signal-to-noise ratio (PSNR) almost remains same for all compression ratios while mean square error (MSE) varies.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"134 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks 无线传感器网络中有效密钥分发的移动节点自适应移动性和可用性
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.30
S. K, Vidya Yeri, Arjun A.V., Venugopal K.R., L. Patnaik
{"title":"Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks","authors":"S. K, Vidya Yeri, Arjun A.V., Venugopal K.R., L. Patnaik","doi":"10.1109/ICMLC.2010.30","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.30","url":null,"abstract":"Wireless Sensor Networks(WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The analysis and simulation results showed that the performance of the proposed scheme is better than the existing scheme.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Semantic Model for Building the Vietnamese Language Query Processing Framework in e-Library Searching Application 电子图书馆查询应用中越南语查询处理框架的语义模型
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.17
Dang Tuan Nguyen, Tuan Ngoc Pham, Quoc Tan Phan
{"title":"A Semantic Model for Building the Vietnamese Language Query Processing Framework in e-Library Searching Application","authors":"Dang Tuan Nguyen, Tuan Ngoc Pham, Quoc Tan Phan","doi":"10.1109/ICMLC.2010.17","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.17","url":null,"abstract":"This paper aims to establish a semantic model which is the most important and central component of our Vietnamese Language Query Processing (VLQP) framework. The VLQP framework is architecture of 2-tiers. This framework includes a restricted parser for analyzing Vietnamese query from users based on a class of the pre-defined syntactic rules and a transformer for transforming syntactic structure of query to its semantic representation. In this framework, the semantic model is an original feature we have addressed. This semantic model contributes to the syntax analysis and representation of Vietnamese query forms involving to application domain. We also propose transforming rules to transform syntactic structures to their semantic representation.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modified Ant Miner for Intrusion Detection 改进的Ant Miner入侵检测
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.52
Deven Agravat, Urmi Vaishnav, P. Swadas
{"title":"Modified Ant Miner for Intrusion Detection","authors":"Deven Agravat, Urmi Vaishnav, P. Swadas","doi":"10.1109/ICMLC.2010.52","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.52","url":null,"abstract":"This paper proposes Modified Ant Miner algorithm for intrusion detection. Ant Miner and its descendant have produced good result on many classification problems. Data mining technique is still relatively unexplored area for intrusion detection. In this paper, modification has been suggested in basic ant miner algorithm to improve accuracy and training time of algorithm. The KDD Cup 99 intrusion data set is used to evaluate our proposed algorithm and the result obtained from this experiment is compared with that of Support Vector Machine. It has been found that our proposed algorithm is more effective in case of DOS, U2R, and R2L type of attacks.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hybrid Machine Learning Approach in Data Mining 数据挖掘中的混合机器学习方法
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.57
Jyothi Bellary, Bhargavi Peyakunta, Sekhar Konetigari
{"title":"Hybrid Machine Learning Approach in Data Mining","authors":"Jyothi Bellary, Bhargavi Peyakunta, Sekhar Konetigari","doi":"10.1109/ICMLC.2010.57","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.57","url":null,"abstract":"In this paper we discuss various machine learning approaches used in mining of data. Further we distinguish between symbolic and sub-symbolic data mining methods. We also attempt to propose a hybrid method with the combination of Artificial Neural Network (ANN) and Cased Based Reasoning (CBR) in mining of data.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Study of the Gas Emission Prediction Model Based on Fuzzy-rough Set Neural Network 基于模糊-粗糙集神经网络的瓦斯涌出预测模型研究
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.16
Jing Hong, Yi Zhao
{"title":"The Study of the Gas Emission Prediction Model Based on Fuzzy-rough Set Neural Network","authors":"Jing Hong, Yi Zhao","doi":"10.1109/ICMLC.2010.16","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.16","url":null,"abstract":"Precise and timely predicting the amount of gas emitted from the coal is of great importance for coal mine safety. A novel artificial network model based on fuzzy-rough set for gas emission forecasting of coal mine is proposed in this paper. Some practices prove that this model can perform better than the tradition neural network.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure Group Key Distribution Using Hybrid Cryptosystem 使用混合密码系统的安全组密钥分发
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.41
V. Kumari, D. Nagaraju, K. Soumya, K. Raju
{"title":"Secure Group Key Distribution Using Hybrid Cryptosystem","authors":"V. Kumari, D. Nagaraju, K. Soumya, K. Raju","doi":"10.1109/ICMLC.2010.41","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.41","url":null,"abstract":"In group-oriented applications like conferencing, chat groups and interactive gaming myriad messages are sent from one or more sources to multiple users. Multicasting is the optimum technique for such group oriented applications with effective network resource utilization. But maintaining security is a critical issue in group oriented protocols with frequent membership changes. Confidentiality can be achieved through changing the key material, known as rekeying every time a new member joins the group or existing member leaves from the group. Many techniques have been proposed earlier for this purpose. In centralized approach, a single key server is responsible to generate and distribute keys. In decentralized approach, a hierarchy of key managers distributes the keys. In distributed key-agreement protocol, the group members collectively generate and distribute a group key. This paper uses combination of both de-centralized and key agreement approaches to prevent a single point of failures and to improve the reliability as well as the performance of the system. This paper proposes new a technique(SGKP-1), using hybrid key trees, has certain advantages like secure channel establishment for the distribution of the key material, reducing the storage requirements and burden at each member, minimization of time requirement to become a new member of a group. The computational complexity further reduced using both the combination of public and private key crypto systems.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Color Image Restoration Based on Split Bregman Iteration Algorithm 基于分裂Bregman迭代算法的彩色图像恢复
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.22
Yi Li-ya, Xiaolei Lu, Furong Wang
{"title":"Color Image Restoration Based on Split Bregman Iteration Algorithm","authors":"Yi Li-ya, Xiaolei Lu, Furong Wang","doi":"10.1109/ICMLC.2010.22","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.22","url":null,"abstract":"In this paper, we modify the Split Bregman algorithm for color image restoration with the edge-preserving color image total variation model. The observed blurred images are assumed to be degraded by within channel and cross channel blurs. Our proposed algorithm is based on the Split Bregman process and simply requires Fast Fourier Transform in each iteration. Experimental comparisons using various types of blurs are reported, and the results show that, the proposed method significantly outperforms existing methods, such as the variable splitting alternative minimization algorithm and that adopted by MATLAB deblurring function, in terms of both objective signal to noise ratio and subjective vision quality. This demonstrates the efficiency of our proposed algorithms.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Preliminary Evaluation of New Machine Learning Algorithms for Feasibility 新机器学习算法可行性的快速初步评估
2010 Second International Conference on Machine Learning and Computing Pub Date : 2010-02-09 DOI: 10.1109/ICMLC.2010.31
Dustin Baumgartner, G. Serpen
{"title":"Fast Preliminary Evaluation of New Machine Learning Algorithms for Feasibility","authors":"Dustin Baumgartner, G. Serpen","doi":"10.1109/ICMLC.2010.31","DOIUrl":"https://doi.org/10.1109/ICMLC.2010.31","url":null,"abstract":"Traditionally, researchers compare the performance of new machine learning algorithms against those of locally executed simulations that serve as benchmarks. This process requires considerable time, computation resources, and expertise. In this paper, we present a method to quickly evaluate the performance feasibility of new algorithms – offering a preliminary study that either supports or opposes the need to conduct a full-scale traditional evaluation, and possibly saving valuable resources for researchers. The proposed method uses performance benchmarks obtained from results reported in the literature rather than local simulations. Furthermore, an alternate statistical technique is suggested for comparative performance analysis, since traditional statistical significance tests do not fit the problem well. We highlight the use of the proposed evaluation method in a study that compared a new algorithm against 47 other algorithms across 46 datasets.","PeriodicalId":423912,"journal":{"name":"2010 Second International Conference on Machine Learning and Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信