In this paper is presented a solution based on a bi-dimensional cellular automata (CA) for image density classification task (DCT). the two necessary properties: density preserving and translation are combined togethe...
详细信息
In this paper is presented a solution based on a bi-dimensional cellular automata (CA) for image density classification task (DCT). the two necessary properties: density preserving and translation are combined together to obtain the DCT solution. these two properties are achieved using a combination of nine fundamental 2D-CA rules and the proposed solution for DCT has two phases: preprocessing phase and decision phase. the project has been implemented in software using C# programming language and experimental results are presented for images with different sizes. this work is totally related to the idea of understanding the impact of the inherently local information processing of CA on their ability to perform a coordinated computation at the global level, as achieved by an evolutionary process.
the issue of location of facilities constitutes a structural section of the strategic planning and designing in the domain of business development and industrial optimization problems. the matter is the determination ...
详细信息
ISBN:
(纸本)9789609999465
the issue of location of facilities constitutes a structural section of the strategic planning and designing in the domain of business development and industrial optimization problems. the matter is the determination of the number and location of facilities and the identification of their attributes. In order for such problems to come to a feasible solution, several methodologies including the use of algorithms, together with methods involving linear and non - linear programming were introduced. Especially in the case of the location of Freight Centers, the problem becomes even more sophisticated and complex due to its polyparametric and multi-dimensional character, given the fact that the establishment of such units at specific regions has impact not only on the transportation sector, but also on the domains of enterprise and business sustainability, as well as on the socioeconomic development of the wider geographical area. In addition, the creation of an integrated Freight Center network apart from incorporating a group of different individual freight transport facilities, it also constitutes a concept which is still under investigation and is still a great challenge for the decision makers in the domain of freight transportation. tool to support such decisions is needed as the use of special software, although it simplifies and facilitates the process, it often entails the threat that the problem will be detached from reality due to the adoption of various assumptions. Towards this direction, in this paper, a multi level multi criteria evaluation framework to be used in the assessment of candidate locations for the establishment of Freight Centers is introduced. In the context of the proposed framework, based on past experience, all the parameters and key performance indicators that are necessary to be taken into account by the transport planners and the policy makers, as well as their respective significance (weights) in the total evaluation process are incorpo
In this paper multi-class classification system of handwritten Arabic digits using Dynamic Bayesian Network (DBN) is proposed, in which technical details are presented in terms of three stages, i.e. pre-processing, fe...
详细信息
In this paper multi-class classification system of handwritten Arabic digits using Dynamic Bayesian Network (DBN) is proposed, in which technical details are presented in terms of three stages, i.e. pre-processing, feature extraction and classification. Firstly, digits are pre-processed and normalized in size. then, features are extracted from each normalized digit, where a set of new features for handwritten digit is proposed based on the discrete cosine transform (DCT) coefficients approach. Finally, these features are then utilized to train a DBN for classification. the proposed system has been successfully tested on Arabic handwritten digit database (ADBase) which is composed of 70,000 digits written by 700 different writers, and the results were promising and very encouraging.
Digital image forgery is becoming easier to perform because of the rapid development of various manipulation tools. Image splicing is one of the most common image forgery techniques. To detect the spliced images sever...
详细信息
Digital image forgery is becoming easier to perform because of the rapid development of various manipulation tools. Image splicing is one of the most common image forgery techniques. To detect the spliced images several methods proposed utilizing the statistical features of the digital images. In this paper, a new image splicing detection approach proposed based on singular value decomposition (SVD) feature extraction method applied in steganalysis. SVD-based features are merged withdiscrete cosine transform (DCT) for image splicing detection. Support vector machine is used to distinguish between authentic and spliced images. the results show a detection accuracy of 78.82% is achieved for the proposed method with only 50 dimensional feature vector. Furthermore the performance of SVD-based features needs more improvement in image splicing detection area of work.
Learning low dimensional manifold from highly nonlinear data of high dimensionality has become increasingly important for discovering intrinsic representation that can be utilized for data visualization and preprocess...
详细信息
the problem of batch generation of orthonormal Hermite-Gaussian-like eigenvectors separately for each eigenspace of the DFT matrix F is reconsidered. the singular value decomposition (SVD) technique is applied to a ma...
详细信息
the problem of batch generation of orthonormal Hermite-Gaussian-like eigenvectors separately for each eigenspace of the DFT matrix F is reconsidered. the singular value decomposition (SVD) technique is applied to a matrix whose columns are nonorthogonal eigenvectors lying in one eigenspace. Moreover this key matrix is allowed to be rank-deficient which necessitates the adoption of the notion of matrix pseudoinverse in order to find optimal orthonormal basis of that eigenspace. the contributed Revised Direct Batch Evaluation by constrained Optimization Algorithm using the notion of matrix Pseudoinverse (RDBEOAP) has been shown to give reasonable results for large values of the order N of matrix F - where the key matrix becomes rank deficient - compared to a similar technique (RDBEOA) based on the assumption that the key matrix has full rank.
the most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algor...
详细信息
the most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. the relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. this method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. the results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared withthe Least Significant Bit (LSB) after embedding two bits. the best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. the best values investigated when the two embedded bits are k1=4 and k2=6.
this paper presents results of using some methods for optimization of the discrete system cyclic processes. We consider the issue of maintaining the throughput of the system. Modelling and control is at the operationa...
详细信息
ISBN:
(纸本)9781467356374;9781467356350
this paper presents results of using some methods for optimization of the discrete system cyclic processes. We consider the issue of maintaining the throughput of the system. Modelling and control is at the operational level. the processes under consideration are represented by the formalism Timed Event Graph as a particular case of Timed Petri Nets. the suggested max-plus system and simulation methods are useful in investigating selected properties of the network models. the cycle time of the system was adopted as a measure of the system performance. Genetic algorithm is applied in finding the solution to the optimization problem. this paper extends the simple genetic algorithm and proposes a new methodology to handle a complex variety of variables.
We provide extension of chaos by implementing chaotic perturbations to exponentially stable difference equations with arbitrarily high dimensions. Our analysis is based on the Li-Yorke definition of chaos. the results...
详细信息
the proceedings contain 101 papers. the topics discussed include: data-driven performance improvement of control systems for three-tank systems;particle swarm optimization techniques. power systems applications;segmen...
ISBN:
(纸本)9781467356374
the proceedings contain 101 papers. the topics discussed include: data-driven performance improvement of control systems for three-tank systems;particle swarm optimization techniques. power systems applications;segmentation of cerebral cortex MRI images with artificial neural network (ANN) training;Adaboost with SVM using GMM supervector for imbalanced phoneme data;a fuzzy framework with modeling language for type 1 and type 2 application development;application of fuzzy ontological reasoning in an implementation of medical guidelines;thresholding strategies for large scale multi-label text classifier;introduction to semantic knowledge base: linguistic module;logic of human-system-interaction in planning complex strategies for chemical syntheses;feasibility study of optimization of a genetic algorithm for traffic network division for distributed road traffic simulation;and application of genetic algorithms and MaxPlus system formalism in optimization of discrete system processes.
暂无评论