Skip to main content

previous disabled Page of 75
and
  1. No Access

    Chapter and Conference Paper

    Segmentation of range images: A neural network approach

    In this paper we present a neural computation model for histogram based range image segmentation. An optimal thresholding vector for the range histogram is determined. The number of elements in the vector is c...

    W. P. Cheung, C. K. Lee, K. C. Li in From Natural to Artificial Neural Computation (1995)

  2. No Access

    Chapter and Conference Paper

    Toward global solution to MAP image estimation: Using Common structure of local solutions

    The maximum a posteriori (MAP) principle is often used in image restoration and segmentation to define the optimal solution when both the prior and likelihood distributions are available. MAP estimation is equ...

    Stan Z. Li in Energy Minimization Methods in Computer Vision and Pattern Recognition (1997)

  3. No Access

    Chapter and Conference Paper

    A New Genetic Algorithm for the Optimal Communication Spanning Tree Problem

    This paper proposes a new genetic algorithm to solve the Optimal Communication Spanning Tree problem. The proposed algorithm works on a tree chromosome without intermediate encoding and decoding, and uses cros...

    Yu Li, Youcef Bouchebaba in Artificial Evolution (2000)

  4. No Access

    Chapter and Conference Paper

    Transductive Learning: Learning Iris Data with Two Labeled Data

    This paper presents two graph-based algorithms for solving the transductive learning problem. Stochastic contraction algorithms with similarity based sampling and normalized similarity based sampling are intro...

    Chun Hung Li, Pong Chi Yuen in Artificial Neural Networks — ICANN 2001 (2001)

  5. No Access

    Chapter and Conference Paper

    The Behavior of the Complex Integral Neural Network

    In this paper, we introduce an Integral Neural Network based on complex domain. We describe the model of the neuron, analyze the behavior of the neuron, and indicate that in certain conditions it performs the ...

    Pan Yong, Shi Hongbao, Li Lei in Rough Sets and Current Trends in Computing (2001)

  6. No Access

    Chapter and Conference Paper

    User Profile Model: A View from Artificial Intelligence

    The goal of this paper is to develop a user profile model for agent-based information filtering. We try to formalize the whole process of information filtering from an Artificial Intelligence point view. This ...

    Yuefeng Li, Y. Y. Yao in Rough Sets and Current Trends in Computing (2002)

  7. No Access

    Chapter and Conference Paper

    Fusing Images with Multiple Focuses Using Support Vector Machines

    Optical lenses, particularly those with long focal lengths, suffer from the problem of limited depth of field. Consequently, it is often difficult to obtain good focus for all the objects in the scene. One app...

    Shutao Li, James T. Kwok, Yaonan Wang in Artificial Neural Networks — ICANN 2002 (2002)

  8. No Access

    Chapter and Conference Paper

    Multi-Class SVM Classifier Based on Pairwise Coupling

    In this paper, a novel structure is proposed to extend standard support vector classifier to multi-class cases. For a K-class classification task, an array of K optimal pairwise coupling classifier (O-PWC) is con...

    Zeyu Li, Shiwei Tang, Shuicheng Yan in Pattern Recognition with Support Vector Machines (2002)

  9. No Access

    Chapter and Conference Paper

    A New Cache Replacement Algorithm in SMO

    In the methods for training Support Vector Machines (SVM), precomputed elements in the Hessian matrix are usually cached in order to avoid recomputation. However, the least-recent-used replacement algorithm th...

    Jianmin Li, Bo Zhang, Fuzong Lin in Pattern Recognition with Support Vector Machines (2002)

  10. No Access

    Chapter and Conference Paper

    λ-Connected Approximations for Rough Sets

    Rough sets was first studied by Pawlak to describe the approximation of a set X by using its lower bound L(X) and upper bound U(X). λ-connectedness was originally proposed as a technique to search layers in 2D or...

    Li Chen in Rough Sets and Current Trends in Computing (2002)

  11. No Access

    Chapter and Conference Paper

    A Hybrid Intrusion Detection Strategy Used for Web Security

    This paper describes a novel framework for intrusion detection systems used for Web security. A hierarchical structure was proposed to gain both server-based detection and network-based detection. The system c...

    Bo Yang, Han Li, Yi Li, Shaojun Yang in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  12. No Access

    Chapter and Conference Paper

    A Maximal Frequent Itemset Algorithm

    We present MinMax, a new algorithm for mining maximal frequent itemsets(MFI) from a transaction database. It is based on depth-first traversal and iterative. It combines a vertical tidset representation of the...

    Hui Wang, Qinghua Li, Chuanxiang Ma in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  13. No Access

    Chapter and Conference Paper

    Probabilistic Rough Sets Characterized by Fuzzy Sets

    In this paper, fuzziness in probabilistic rough set is studied by fuzzy sets. we show that the variable precision approximation of a probabilistic rough set can be generalized from the vantage point of the cut...

    Li-Li Wei, Wen-**u Zhang in Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (2003)

  14. No Access

    Chapter and Conference Paper

    An Improved Quantum Genetic Algorithm and Its Application

    An improved quantum genetic algorithm (IQGA) is proposed in this paper. In IQGA, the strategies of updating quantum gate by using the best solution and introducing population catastrope are used. The typical f...

    Gexiang Zhang, Weidong **, Na Li in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  15. No Access

    Chapter and Conference Paper

    A Kind of Linearization Method in Fuzzy Control System Modeling

    A kind of linearization method in fuzzy control system modeling is proposed, in order to deal with the nonlinear model with variable coefficients. The method can turn a nonlinear model with variable coefficien...

    Hongxing Li, Jiayin Wang, Zhihong Miao in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  16. No Access

    Chapter and Conference Paper

    A Distributed Multidimensional Data Model of Data Warehouse

    The base fact tables of a data warehouse are generally of huge size. In order to shorten query response time and to improve maintenance performance, a base fact table is generally partitioned into multiple ins...

    Youfang Lin, Houkuan Huang, Hongsong Li in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  17. No Access

    Chapter and Conference Paper

    Extended Random Sets for Knowledge Discovery in Information Systems

    In this paper, we discuss the problem of knowledge discovery in information systems. A model is presented for users to obtain either “objective” interesting rules or “subjective” judgments of meaningful descri...

    Yuefeng Li in Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (2003)

  18. No Access

    Chapter and Conference Paper

    Interpolation Techniques for Geo-spatial Association Rule Mining

    Association rule mining has become an important component of information processing systems due to significant increase in its applications. In this paper, our main objective is to find which interpolation app...

    Dan Li, Jitender Deogun, Sherri Harms in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  19. No Access

    Chapter and Conference Paper

    Research of Atomic and Anonymous Electronic Commerce Protocol

    Atomicity and anonymity are the two important requirements for application in electronic commerce. However absolutely anonymity may lead to confliction with law enforcement, e.g. blackmailing or money launderi...

    Jie Tang, Juan-Zi Li, Ke-Hong Wang in Rough Sets, Fuzzy Sets, Data Mining, and G… (2003)

  20. No Access

    Chapter and Conference Paper

    Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting

    A new method using Fuzzy Support Vector Machines (FSVM) is presented for Short-Term Load Forecasting (STLF). In many regression problems, the effects of the training points are different. It is often that some...

    Yuancheng Li, Tingjian Fang in Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (2003)

previous disabled Page of 75