Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition - Advances in Computational Intelligence and Robotics
Latest Publications


TOTAL DOCUMENTS

32
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781613504291, 9781613504307

Author(s):  
Mohammad Hossein Fazel Zarandi ◽  
Milad Avazbeigi

This chapter presents a new optimization method for clustering fuzzy data to generate Type-2 fuzzy system models. For this purpose, first, a new distance measure for calculating the (dis)similarity between fuzzy data is proposed. Then, based on the proposed distance measure, Fuzzy c-Mean (FCM) clustering algorithm is modified. Next, Xie-Beni cluster validity index is modified to be able to valuate Type-2 fuzzy clustering approach. In this index, all operations are fuzzy and the minimization method is fuzzy ranking with Hamming distance. The proposed Type-2 fuzzy clustering method is used for development of indirect approach to Type-2 fuzzy modeling, where the rules are extracted from clustering fuzzy numbers (Zadeh, 1965). Then, the Type-2 fuzzy system is tuned by an inference algorithm for optimization of the main parameters of Type-2 parametric system. In this case, the parameters are: Schweizer and Sklar t-Norm and s-Norm, a-cut of rule-bases, combination of FATI and FITA inference approaches, and Yager parametric defuzzification. Finally, the proposed Type-2 fuzzy system model is applied in prediction of the steel additives in steelmaking process. It is shown that, the proposed Type-2 fuzzy system model is superior in comparison with multiple regressions and Type-1 fuzzy system model, in terms of the minimization the effect of uncertainty in the rule-base fuzzy system models an error reduction.


Author(s):  
Siddhartha Bhattacharyya

These networks generally operate in two different modes, viz., supervised and unsupervised modes. The supervised mode of operation requires a supervisor to train the network with a training set of data. Networks operating in unsupervised mode apply topology preservation techniques so as to learn inputs. Representative examples of networks following either of these two modes are presented with reference to their topologies, configurations, types of input-output data and functional characteristics. Recent trends in this computing paradigm are also reported with due regards to the application perspectives.


Author(s):  
Ganesh Naik ◽  
Dinesh Kant Kumar ◽  
Sridhar Arjunan

In recent times there is an urgent need for a simple yet robust system to identify natural hand actions and gestures for controlling prostheses and other computer assisted devices. Surface Electromyogram (sEMG) is a non-invasive measure of the muscle activities but is not reliable because there are multiple simultaneously active muscles. This research first establishes the conditions for the applicability of Independent Component Analysis (ICA) pattern recognition techniques for sEMG. Shortcomings related to order and magnitude ambiguity have been identified and a mitigation strategy has been developed by using a set of unmixing matrix and neural network weight matrix corresponding to the specific user. The experimental results demonstrate a marked improvement in the accuracy. The other advantages of this system are that it is suitable for real time operations and it is easy to train by a lay user.


Author(s):  
Artem A. Lenskiy ◽  
Jong-Soo Lee

In this chapter, the authors elaborate on the facial image segmentation and the detection of eyes and lips using two neural networks. The first neural network is applied to segment skin-colors and the second to detect facial features. As for input vectors, for the second network the authors apply speed-up robust features (SURF) that are not subject to scale and brightness variations. The authors carried out the detection of eyes and lips on two well-known facial feature databases, Caltech. and PICS. Caltech gave a success rate of 92.4% and 92.2% for left and right eyes and 85% for lips, whereas the PCIS database gave 96.9% and 95.3% for left and right eyes and 97.3% for lips. Using videos captured in real environment, among all videos, the authors achieved an average detection rate of 94.7% for the right eye and 95.5% for the left eye with a 86.9% rate for the lips


Author(s):  
P. Mukherji ◽  
P.P. Rege

Devnagari script is the most widely used script in India and its Optical Character Recognition (OCR) poses many challenges. Handwritten script has many variations, and existing methods used are discussed. The authors have also collected a database on which the techniques are tested. The techniques are based on structural methods as opposite to statistical methods. There are some special properties of Devnagari script like the topline, curves, and various types of connections that have been exploited in the methods discussed in this chapter.


Author(s):  
Yuexing Han ◽  
Bing Wang ◽  
Hideki Koike ◽  
Masanori Idesawa

One of the main goals of image understanding and computer vision applications is to recognize an object from various images. Object recognition has been deeply developed for the last three decades, and a lot of approaches have been proposed. Generally, these methods of object recognition can successfully achieve their goal by relying on a large quantity of data. However, if the observed objects are shown to diverse configurations, it is difficult to recognize them with a limited database. One has to prepare enough data to exactly recognize one object with multi-configurations, and it is hard work to collect enough data only for a single object. In this chapter, the authors will introduce an approach to recognize objects with multi-configurations using the shape space theory. Firstly, two sets of landmarks are obtained from two objects in two-dimensional images. Secondly, the landmarks represented as two points are projected into a pre-shape space. Then, a series of new intermediate data can be obtained from data models in the pre-shape space. Finally, object recognition can be achieved in the shape space with the shape space theory.


Author(s):  
Sang-Myoung Ye ◽  
Rae-Hong Park ◽  
Dong-Kyu Lee

Object segmentation in video sequence is a basic and important task in video applications such as surveillance systems and video coding. Nonparametric snake algorithms for object segmentation have been proposed to overcome the drawback of conventional snake algorithms: the dependency on several parameters. In this chapter, a new object segmentation algorithm for video, based on a nonparametric snake model with motion prediction, is proposed. Object contour is initialized by using the mean absolute difference of intensity between input and previous frames. And in order to convert initial object contours into more exact object contours, the gradient vector flow snake is used. Finally object contour is predicted using a Kalman filter in successive frames. The proposed object segmentation method for video can provide more detailed and improved object segmentation results than the conventional methods. Various experimental results show the effectiveness of the proposed method in terms of the pixel-based quality measure and the computation time.


Author(s):  
Carlos Eduardo Thomaz ◽  
Vagner do Amaral ◽  
Gilson Antonio Giraldi ◽  
Edson Caoru Kitani ◽  
João Ricardo Sato ◽  
...  

This chapter describes a multi-linear discriminant method of constructing and quantifying statistically significant changes on human identity photographs. The approach is based on a general multivariate two-stage linear framework that addresses the small sample size problem in high-dimensional spaces. Starting with a 2D data set of frontal face images, the authors determine a most characteristic direction of change by organizing the data according to the patterns of interest. These experiments on publicly available face image sets show that the multi-linear approach does produce visually plausible results for gender, facial expression and aging facial changes in a simple and efficient way. The authors believe that such approach could be widely applied for modeling and reconstruction in face recognition and possibly in identifying subjects after a lapse of time.


Author(s):  
Kostas Kolomvatsos ◽  
Stathes Hadjiefthymiades

Today, there is a large number of product providers in the Web. Electronic Marketplaces (EMs) enable entities to negotiate and trade products. Usually, intelligent agents assume the responsibility of representing buyers or sellers in EMs. However, uncertainty about the characteristics and intentions of the negotiating entities is present in these scenarios. Fuzzy Logic (FL) theory presents a lot of advantages when used in environments where entities have limited or no knowledge about their peers. Hence, entities can rely on a FL knowledge base that determines the appropriate action on every possible state. FL can be used in offers, trust, or time constraints definition or when an agent should decide during the negotiation process. The autonomic nature of agents in combination with FL leads to more efficient systems. In this chapter, the authors provide a critical review on the adoption of FL in marketplace systems and present their proposal for the buyer side. Moreover, the authors describe techniques for building FL systems focusing on clustering techniques. The aim is to show the importance of FL adoption in such settings.


Author(s):  
Jan Stoklasa

The decision making process of the Emergency Medical Rescue Services (EMRS) operations centre during disasters involves a significant amount of uncertainty. Decisions need to be made quickly, and no mistakes are tolerable, particularly in the case of disasters resulting in a large number of injured people. A multiphase linguistic fuzzy model is introduced to assist the operator during the initial phase of the medical disaster response. Based on uncertain input data, estimating the severity of the disaster, the number of injured people, and the amount of forces and resources needed to successfully deal with the situation is possible. The need for reinforcements is also considered. Fuzzy numbers, linguistic variables and fuzzy rule bases are applied to deal with the uncertainty. Outputs provided by the model (severity of the disaster, number of reinforcements needed etc.) are available both as fuzzy sets (for the purposes of disaster planning) and linguistic terms (for emergency call evaluation purposes).


Sign in / Sign up

Export Citation Format

Share Document