Now showing items 1-20 of 165

    • A hierarchical clustering based on overlap similarity measure 

      Qu, Jun; Jiang, Qingshan; Weng, Fangfei; Hong, Zhiling; 姜青山 (IEEE COMPUTER SOC, 2007)
      Selecting the appropriate number of clusters and distinguishing partially overlapping and irregular data are two important problems in clustering. Hierarchical clustering provides a good solution to them. Similarity measure ...
    • A new metric for classification of multivariate time series 

      Guan, Heshan; Jiang, Qingshan; Hong, Zhiling; 姜青山 (IEEE COMPUTER SOC, 2007)
      Multivariate time series are an important kind of data collected in many domains, such as multimedia, biology and so on. We focus on discrimination metric for time series data; especially classify the multivariate time ...
    • An Outlier mining-based method for anomaly detection 

      Wu, Nannan; Shi, Liang; Jiang, Qingshan; Weng, Fangfei; 史亮; 姜青山 (IEEE, 2007)
      In this paper, a new technology is proposed to solve anomaly detection problems of the high false positive rate or hard to build the model of normal behavior, etc. What our technology based on is the similarity between ...
    • An intrusion detection system based on the clustering ensemble 

      Weng, Fangfei; Jiang, Qingshan; Shi, Liang; Wu, Nannan; 姜青山; 史亮 (IEEE, 2007)
      Intrusion detection system (IDS) is an important component of computer network security, while clustering analysis is a common unsupervised anomaly detection method. However, it is difficult for the single clustering ...
    • Clustering ensemble based on the fuzzy KNN algorithm 

      Weng, Fangfei; Jiang, Qingshan; Chen, Lifei; Hong, Zhiling; 姜青山 (IEEE COMPUTER SOC, 2007)
      Compared with the single clustering algorithm, Clustering Ensembles are deemed to be more robust and accurate, with combining multiple partitions of the given data into a single clustering solution of better quality. In ...
    • Measuring overlap-rate in hierarchical cluster merging for image segmentation and ship detection 

      Hong, Zhiling; Jiang, Qingshan; Guan, Heshan; Weng, Fangfei; 姜青山 (IEEE COMPUTER SOC, 2007)
      In this paper, we present a definition on the degree of overlap between two clusters and develop an algorithm for calculating the overlap rate. Using this theory, we also develop a new hierarchical cluster merging algorithm ...
    • Hybrid Content-based Trademark Retrieval using Region and Contour Features 

      Hong, Zhiling; Jiang, Qingshan; 姜青山 (IEEE, 2008)
      The number of registered trademarks is increasing tremendously in recent years. In order to retrieve a similar looking trademark from a large trademark database, we propose a hybrid content based trademark retrieval method ...
    • Fast Image Retrieval Based on Color, Texture and Shape of MPEG-7 

      Wei Pianpian; Wang Beizhan; Qu Cheng; 王备战 (IEEE, 2008)
      Color, texture and shape are three basic visual features in content-based image retrieval, Descriptors based on only one of them could just express pat-is of characteristics of images. This paper proposes a method that ...
    • An Improved AntTree Algorithm for MRI Brain Segmentation 

      Li Chenling; Zeng Wenhua; Zhuang Jiahe; 曾文华 (IEEE, 2008)
      In this paper an improved method is proposed based on the AntTree algorithm to deal with MRI brain segmentation. This algorithm uses a new free-structure model to accelerate the calculation of segmenting the brain structure ...
    • A Hybrid Statistical Language Model Applied to the Domain Specific Information Retrieval 

      Wei Wang; Kunhui Lin; Changle Zhou; 林坤辉 (IEEE COMPUTER SOC, 2008)
      The traditional language model takes the multi-topics document corpus as the research target. In order to avoid the interference brought by the multi-topics problem, this paper focuses on the domain specific Information ...
    • An identity-based group key agreement protocol from pairing 

      Wang, Hongji; Yao, Gang; Jiang, Qingshan; 王鸿吉; 姜青山 (IEEE COMPUTER SOC, 2008)
      In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However using most of those protocols, the session key which users arrive ...
    • A 3D Controllable Head and Face Modeling Method for a Certain Person 

      Hong, Duan; 段鸿 (IEEE COMPUTER SOC, 2008)
      Presents a method to reconstruct a controllable 3D head and face model for a specific person. The 3D grid-muscle head and face model of the certain person is created after selecting key feature points from a front face ...
    • Efficient Focused Crawling Strategy Using Combination of Link Structure and Content Similarity 

      Qu Cheng; Wang Beizhan; Wei Pianpian; 王备战 (IEEE, 2008)
      At present, focused crawler usually crawl pages using the link structure or page contents. But both of them have some flaws. So we designed an efficient crawling strategy, which combine the link structure with content ...
    • A New Centroid-Based Classifier for Text Categorization 

      Chen, Lifei; Ye, Yanfang; Jiang, Qingshan; 姜青山 (IEEE, 2008)
      In recent years, centroid-based document classifiers receive wide interests from text mining community because of their simplicity and linear-time complexity. However the traditional centroid-based classifiers ususally ...
    • Improved Generalized Co-occurrence Matrix for Image Retrieval using MPEG-7 Texture Edge 

      Wei Pianpian; Wang Beizhan; Qu Cheng; Chen Liyan; 王备战; 陈俐燕 (IEEE COMPUTER SOC, 2008)
      To achieve efficient image retrieval, this paper applied the five texture edge directions, including 0, 45, 90, 135 and nondirection, recommended by MPEG-7 standards to generalized co-occurrence matrix method. The new ...
    • Design and Implementation of the Container Terminal Operating System Based on Service-Oriented Architecture (SOA) 

      Shen Yi; Yao Junfeng; Zhang Hui; 姚俊峰 (IEEE COMPUTER SOC, 2008)
      Due to the impact on IT architecture, the limitation of information planning, as well as the problems left over by history, etc., traditional terminal operating system are often unable to make rapid response to the ...
    • Fragile Watermarking Scheme Based on Integer Wavelet Transform 

      Zhuang Jiahe; Zeng Wenhua; Li Chenling; 曾文华 (IEEE, 2008)
      A fragile watermarking scheme based on integer wavelet transform and chaos sequence is proposed in this paper. The novel watermarking scheme uses the Quad tree structures received by the wavelet decomposition and chaos ...
    • An Image Retrieval Method Based on Spatial Features of Colors 

      Chen Haishan; Han Xuan; Hu Bochao; 陈海山 (IEEE COMPUTER SOC, 2008)
      This paper presents a method for expressing color features of images through color hue histograms, according to the distribution characteristics of image color space. In this method, the spatial features of colors are ...
    • Research on Face Recognition Based on PCA 

      Duan, Hong; Yan, Ruohe; Lin, Kunhui; 段鸿; 林坤辉 (IEEE COMPUTER SOC, 2008)
      Principal Components Analysis(PCA) is a basic method widely used in face feature extraction and recognition. In order to overcome the shortcoming of absent consideration of the between-class information and the defect of ...
    • Reduction and Dynamic Discretization of Multi-attribute Based on Rough Set 

      Lin Tinghui; Shi Liang; Jiang Qingshan; Wang Beizhan; 史亮; 姜青山; 王备战 (IEEE COMPUTER SOC, 2009)
      In majority of approaches of multi-attributes discretization, the results with a large number of break points always tend to make irrational and redundant. To this issue, this paper presents a dynamic multi-attribute ...