Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fu...Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fuzzy probability and fuzzy partition. The relation of the probability partition and the fuzzy c-partition of the image gradient are used in the algorithm. Secondly, based on the conditional probabilities and the fuzzy partition, the optimal thresholding is searched adaptively through the maximum fuzzy entropy principle, and then the edge image is obtained. Lastly, an edge-enhancing procedure is executed on the edge image. The experimental results show that the proposed approach performs well.展开更多
A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the sur...A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.展开更多
In image processing, one of the most important steps is image segmentation. The objects in remote sensing images often have to be detected in order toperform next steps in image processing. Remote sensing images usua...In image processing, one of the most important steps is image segmentation. The objects in remote sensing images often have to be detected in order toperform next steps in image processing. Remote sensing images usually havelarge size and various spatial resolutions. Thus, detecting objects in remote sensing images is very complicated. In this paper, we develop a model to detectobjects in remote sensing images based on the combination of picture fuzzy clustering and MapReduce method (denoted as MPFC). Firstly, picture fuzzy clustering is applied to segment the input images. Then, MapReduce is used to reducethe runtime with the guarantee of quality. To convert data for MapReduce processing, two new procedures are introduced, including Map_PFC and Reduce_PFC.The formal representation and details of two these procedures are presented in thispaper. The experiments on satellite image and remote sensing image datasets aregiven to evaluate proposed model. Validity indices and time consuming are usedto compare proposed model to picture fuzzy clustering model. The values ofvalidity indices show that picture fuzzy clustering integrated to MapReduce getsbetter quality of segmentation than using picture fuzzy clustering only. Moreover,on two selected image datasets, the run time of MPFC model is much less thanthat of picture fuzzy clustering.展开更多
Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,a...Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner.展开更多
In this letter, drawbacks of the classical algorithm to enhance the fuzzy contrast among adjacent regions are analyzed. Based on it, a new fuzzy enhancement algorithm and a linear fuzzy distribution that maps the gray...In this letter, drawbacks of the classical algorithm to enhance the fuzzy contrast among adjacent regions are analyzed. Based on it, a new fuzzy enhancement algorithm and a linear fuzzy distribution that maps the gray images to corresponding generalized fuzzy set are proposed. Results of two examples illustrate that the algorithm is more effective and faster when used to detect the multi-level edges of images.展开更多
A fast edge detection method basing on the combination of fuzzy subsets is developed, in which the detection of an edge as a classification problem will be considered, partitioning the image into two portions: the edg...A fast edge detection method basing on the combination of fuzzy subsets is developed, in which the detection of an edge as a classification problem will be considered, partitioning the image into two portions: the edge portion and the non-edge portion. The latter one, as the main constituent of an image, consists of the object and its background. Removing the non-edge portion from an image, the remainder is nothing but the edge of this image. As far as the fuzziness of the edge of an image is concerned, some fuzzy operations can be made. In this paper, the gray level histogram is partitioned into several sub-regions, and some operations are performed with the associated fuzzy subsets corresponding to those sub-edges in the sub-regions on the gray-level-square-difference histogram, and the edge of this image is finally obtained. Practical examples in this paper illustrate that, the described method is simple and effective to achieve an ideal edge image.展开更多
By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components ...By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components in different transformed sub-images corresponding to a pixel are employed to form a feature vector of the pixel. All the feature vectors are classified with unsupervised fuzzy c-means to segment the image, and then the edge pixels are checked out by the Canny detector. A series of images contaminated with different intensive Gaussian noises are used to test the novel algorithm. Experiments show that fairly precise edges can be checked out robustly from those images with fairly intensive noise by the proposed algorithm.展开更多
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
In this paper, we present an adaptive anomaly detection framework that isapplicable to network-based intrusion detection. Our framework employs fuzzy cluster algorithm to detect anomalies in an online, adaptive fashio...In this paper, we present an adaptive anomaly detection framework that isapplicable to network-based intrusion detection. Our framework employs fuzzy cluster algorithm to detect anomalies in an online, adaptive fashion without a priori knowledge of the underlying data. We evaluate our method by performing experiments over network records from the KDD CUP99 data set.展开更多
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti...An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.展开更多
Diabetic Retinopathy(DR)is a vision disease due to the long-term prevalenceof Diabetes Mellitus.It affects the retina of the eye and causes severedamage to the vision.If not treated on time it may lead to permanent vi...Diabetic Retinopathy(DR)is a vision disease due to the long-term prevalenceof Diabetes Mellitus.It affects the retina of the eye and causes severedamage to the vision.If not treated on time it may lead to permanent vision lossin diabetic patients.Today’s development in science has no medication to cureDiabetic Retinopathy.However,if diagnosed at an early stage it can be controlledand permanent vision loss can be avoided.Compared to the diabetic population,experts to diagnose Diabetic Retinopathy are very less in particular to local areas.Hence an automatic computer-aided diagnosis for DR detection is necessary.Inthis paper,we propose an unsupervised clustering technique to automatically clusterthe DR into one of its five development stages.The deep learning based unsupervisedclustering is made to improve itself with the help of fuzzy rough c-meansclustering where cluster centers are updated by fuzzy rough c-means clusteringalgorithm during the forward pass and the deep learning model representationsare updated by Stochastic Gradient Descent during the backward pass of training.The proposed method was implemented using python and the results were takenon DGX server with Tesla V100 GPU cards.An experimental result on the publicallyavailable Kaggle dataset shows an overall accuracy of 88.7%.The proposedmodel improves the accuracy of DR diagnosis compared to the existingunsupervised algorithms like k-means,FCM,auto-encoder,and FRCM withalexnet.展开更多
Shadow detection is a crucial task in high-resolution remote-sensing image processing. Various shadow detection methods have been explored during the last decades. These methods did improve the detection accuracy but ...Shadow detection is a crucial task in high-resolution remote-sensing image processing. Various shadow detection methods have been explored during the last decades. These methods did improve the detection accuracy but are still not robust enough to get satisfactory results for failing to extract enough information from the original images. To take full advantage of various features of shadows, a new method combining edges information with the spectral and spatial information is proposed in this paper. As known, edge is one of the most important characteristics in the high-resolution remote-sensing images. Unfortunately, in shadow detection, it is a high-risk strategy to determine whether a pixel is the edge or not strictly because intensity values on shadow boundaries are always between those in shadow and non-shadow areas. Therefore, a soft edge description model is developed to describe the degree of each pixel belonging to the edges or not. Sequentially, the soft edge description is incorporating to a fuzzy clustering procedure based on HMRF (Hidden Markov Random Fields), in which more appropriate spatial contextual information can be used. More concretely, it consists of two components: the soft edge description model and an iterative shadow detection algorithm. Experiments on several remote sensing images have shown that the proposed method can obtain more accurate shadow detection results.展开更多
This paper presents a novel intrusion detection model based on fuzzy cluster and immune principle. The original rival penalized competitive learning (RPCL) algorithm is modified in order to address the problem of diff...This paper presents a novel intrusion detection model based on fuzzy cluster and immune principle. The original rival penalized competitive learning (RPCL) algorithm is modified in order to address the problem of different variability of variables and correlation between variables, the sensitivity to initial number of clusters is also solved. Especially, we use the extended RPCL algorithm to determine the initial number of clusters in the fuzzy cluster algorithm. The genetic algorithm is used to optimize the radius deviation for the determination of characteristic function of abnormal subspace.展开更多
Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would ...Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would minimize the total energy—a sum of the classic CVT energy and the weighted length of cluster boundaries.To distinguish it with the classic CVTs,we call it an Edge-Weighted CVT(EWCVT).The concept of EWCVT is expected to build a mathematical base for all CVT related data classifications with requirement of smoothness of the cluster boundaries.The EWCVT method is easy in implementation,fast in computation,and natural for any number of clusters.展开更多
With the rapid development of Unmanned Aerial Vehicle(UAV)technology,change detection methods based on UAV images have been extensively studied.However,the imaging of UAV sensors is susceptible to environmental interf...With the rapid development of Unmanned Aerial Vehicle(UAV)technology,change detection methods based on UAV images have been extensively studied.However,the imaging of UAV sensors is susceptible to environmental interference,which leads to great differences of same object between UAV images.Overcoming the discrepancy difference between UAV images is crucial to improving the accuracy of change detection.To address this issue,a novel unsupervised change detection method based on structural consistency and the Generalized Fuzzy Local Information C-means Clustering Model(GFLICM)was proposed in this study.Within this method,the establishment of a graph-based structural consistency measure allowed for the detection of change information by comparing structure similarity between UAV images.The local variation coefficient was introduced and a new fuzzy factor was reconstructed,after which the GFLICM algorithm was used to analyze difference images.Finally,change detection results were analyzed qualitatively and quantitatively.To measure the feasibility and robustness of the proposed method,experiments were conducted using two data sets from the cities of Yangzhou and Nanjing.The experimental results show that the proposed method can improve the overall accuracy of change detection and reduce the false alarm rate when compared with other state-of-the-art change detection methods.展开更多
Based on the service characteristics and the sensing ability for secondary users, a joint optimization scheme of spectrum detection and allocation is investigated to expand the available sensing region and allocate th...Based on the service characteristics and the sensing ability for secondary users, a joint optimization scheme of spectrum detection and allocation is investigated to expand the available sensing region and allocate the Qo S-specified channels. On the aspect of spectrum detection, due to the available detection index with the global detection metrics, cooperation thresholds are adaptively adjusted to select the cooperative model for maximizing the available sensing region. On the aspect of spectrum allocation, for different service category, the idle channels are efficiently allocated that depend on their stability and available bandwidth. Meanwhile, based on the requested rates defined by fuzzy theory, the secondary users can be divided into two categories, i.e.,delay sensitive service and reliability sensitive service. Finally, the Qo S-specified channels from the targeted spectrum subset are allocated to secondary users. Simulation results show that our proposed algorithm can not only expand the available sensing region,but also decrease the outage probability of delay sensitive services. Additionally, it enables stable power consumption in the time-variation channel.展开更多
This paper presents a novel vision-based obstacle avoidance approach for the Autonomous Mobile Robot (AMR) with a Pan-Tilt-Zoom (PTZ) camera as its only sensing modality. The approach combines the morphological closin...This paper presents a novel vision-based obstacle avoidance approach for the Autonomous Mobile Robot (AMR) with a Pan-Tilt-Zoom (PTZ) camera as its only sensing modality. The approach combines the morphological closing operation based on Sobel Edge Detection Operation and the (μ-kσ) thresholding technique to detect obstacles to soften the various lighting and ground floor effects. Both the morphology method and thresholding technique are computationally simple. The processing speed of the algorithm is fast enough to avoid some active obstacles. In addition, this approach takes into account the history obstacle effects on the current state. Fuzzy logic is used to control the behaviors of AMR as it navigates in the environment. All behaviors run concurrently and generate motor response solely based on vision perception. A priority based on subsumption coordinator selects the most appropriate response to direct the AMR away from obstacles. Validation of the proposed approach is done on a Pioneer 1 mobile robot.展开更多
文摘Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fuzzy probability and fuzzy partition. The relation of the probability partition and the fuzzy c-partition of the image gradient are used in the algorithm. Secondly, based on the conditional probabilities and the fuzzy partition, the optimal thresholding is searched adaptively through the maximum fuzzy entropy principle, and then the edge image is obtained. Lastly, an edge-enhancing procedure is executed on the edge image. The experimental results show that the proposed approach performs well.
文摘A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.
基金funded by Thuyloi University Foundation for Science and Technologyunder Grant Number TLU.STF.19-02.
文摘In image processing, one of the most important steps is image segmentation. The objects in remote sensing images often have to be detected in order toperform next steps in image processing. Remote sensing images usually havelarge size and various spatial resolutions. Thus, detecting objects in remote sensing images is very complicated. In this paper, we develop a model to detectobjects in remote sensing images based on the combination of picture fuzzy clustering and MapReduce method (denoted as MPFC). Firstly, picture fuzzy clustering is applied to segment the input images. Then, MapReduce is used to reducethe runtime with the guarantee of quality. To convert data for MapReduce processing, two new procedures are introduced, including Map_PFC and Reduce_PFC.The formal representation and details of two these procedures are presented in thispaper. The experiments on satellite image and remote sensing image datasets aregiven to evaluate proposed model. Validity indices and time consuming are usedto compare proposed model to picture fuzzy clustering model. The values ofvalidity indices show that picture fuzzy clustering integrated to MapReduce getsbetter quality of segmentation than using picture fuzzy clustering only. Moreover,on two selected image datasets, the run time of MPFC model is much less thanthat of picture fuzzy clustering.
文摘Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner.
基金Supported by the Natural Science Foundation of GuangDong Province(NO.011750)
文摘In this letter, drawbacks of the classical algorithm to enhance the fuzzy contrast among adjacent regions are analyzed. Based on it, a new fuzzy enhancement algorithm and a linear fuzzy distribution that maps the gray images to corresponding generalized fuzzy set are proposed. Results of two examples illustrate that the algorithm is more effective and faster when used to detect the multi-level edges of images.
文摘A fast edge detection method basing on the combination of fuzzy subsets is developed, in which the detection of an edge as a classification problem will be considered, partitioning the image into two portions: the edge portion and the non-edge portion. The latter one, as the main constituent of an image, consists of the object and its background. Removing the non-edge portion from an image, the remainder is nothing but the edge of this image. As far as the fuzziness of the edge of an image is concerned, some fuzzy operations can be made. In this paper, the gray level histogram is partitioned into several sub-regions, and some operations are performed with the associated fuzzy subsets corresponding to those sub-edges in the sub-regions on the gray-level-square-difference histogram, and the edge of this image is finally obtained. Practical examples in this paper illustrate that, the described method is simple and effective to achieve an ideal edge image.
文摘By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components in different transformed sub-images corresponding to a pixel are employed to form a feature vector of the pixel. All the feature vectors are classified with unsupervised fuzzy c-means to segment the image, and then the edge pixels are checked out by the Canny detector. A series of images contaminated with different intensive Gaussian noises are used to test the novel algorithm. Experiments show that fairly precise edges can be checked out robustly from those images with fairly intensive noise by the proposed algorithm.
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
基金Supported by the National Natural Science Foun-dation of China (60573101) the Natural Science Foundation ofShaanxi Province (2005f43)
文摘In this paper, we present an adaptive anomaly detection framework that isapplicable to network-based intrusion detection. Our framework employs fuzzy cluster algorithm to detect anomalies in an online, adaptive fashion without a priori knowledge of the underlying data. We evaluate our method by performing experiments over network records from the KDD CUP99 data set.
文摘An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.
文摘Diabetic Retinopathy(DR)is a vision disease due to the long-term prevalenceof Diabetes Mellitus.It affects the retina of the eye and causes severedamage to the vision.If not treated on time it may lead to permanent vision lossin diabetic patients.Today’s development in science has no medication to cureDiabetic Retinopathy.However,if diagnosed at an early stage it can be controlledand permanent vision loss can be avoided.Compared to the diabetic population,experts to diagnose Diabetic Retinopathy are very less in particular to local areas.Hence an automatic computer-aided diagnosis for DR detection is necessary.Inthis paper,we propose an unsupervised clustering technique to automatically clusterthe DR into one of its five development stages.The deep learning based unsupervisedclustering is made to improve itself with the help of fuzzy rough c-meansclustering where cluster centers are updated by fuzzy rough c-means clusteringalgorithm during the forward pass and the deep learning model representationsare updated by Stochastic Gradient Descent during the backward pass of training.The proposed method was implemented using python and the results were takenon DGX server with Tesla V100 GPU cards.An experimental result on the publicallyavailable Kaggle dataset shows an overall accuracy of 88.7%.The proposedmodel improves the accuracy of DR diagnosis compared to the existingunsupervised algorithms like k-means,FCM,auto-encoder,and FRCM withalexnet.
文摘Shadow detection is a crucial task in high-resolution remote-sensing image processing. Various shadow detection methods have been explored during the last decades. These methods did improve the detection accuracy but are still not robust enough to get satisfactory results for failing to extract enough information from the original images. To take full advantage of various features of shadows, a new method combining edges information with the spectral and spatial information is proposed in this paper. As known, edge is one of the most important characteristics in the high-resolution remote-sensing images. Unfortunately, in shadow detection, it is a high-risk strategy to determine whether a pixel is the edge or not strictly because intensity values on shadow boundaries are always between those in shadow and non-shadow areas. Therefore, a soft edge description model is developed to describe the degree of each pixel belonging to the edges or not. Sequentially, the soft edge description is incorporating to a fuzzy clustering procedure based on HMRF (Hidden Markov Random Fields), in which more appropriate spatial contextual information can be used. More concretely, it consists of two components: the soft edge description model and an iterative shadow detection algorithm. Experiments on several remote sensing images have shown that the proposed method can obtain more accurate shadow detection results.
文摘This paper presents a novel intrusion detection model based on fuzzy cluster and immune principle. The original rival penalized competitive learning (RPCL) algorithm is modified in order to address the problem of different variability of variables and correlation between variables, the sensitivity to initial number of clusters is also solved. Especially, we use the extended RPCL algorithm to determine the initial number of clusters in the fuzzy cluster algorithm. The genetic algorithm is used to optimize the radius deviation for the determination of characteristic function of abnormal subspace.
基金supported in part by the U.S.National Science Foundation under grant number DMS-0913491.
文摘Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would minimize the total energy—a sum of the classic CVT energy and the weighted length of cluster boundaries.To distinguish it with the classic CVTs,we call it an Edge-Weighted CVT(EWCVT).The concept of EWCVT is expected to build a mathematical base for all CVT related data classifications with requirement of smoothness of the cluster boundaries.The EWCVT method is easy in implementation,fast in computation,and natural for any number of clusters.
基金National Natural Science Foundation of China(No.62101219)Natural Science Foundation of Jiangsu Province(Nos.BK20201026,BK20210921)+1 种基金Science Foundation of Jiangsu Normal University(No.19XSRX006)Open Research Fund of Jiangsu Key Laboratory of Resources and Environmental Information Engineering(No.JS202107)。
文摘With the rapid development of Unmanned Aerial Vehicle(UAV)technology,change detection methods based on UAV images have been extensively studied.However,the imaging of UAV sensors is susceptible to environmental interference,which leads to great differences of same object between UAV images.Overcoming the discrepancy difference between UAV images is crucial to improving the accuracy of change detection.To address this issue,a novel unsupervised change detection method based on structural consistency and the Generalized Fuzzy Local Information C-means Clustering Model(GFLICM)was proposed in this study.Within this method,the establishment of a graph-based structural consistency measure allowed for the detection of change information by comparing structure similarity between UAV images.The local variation coefficient was introduced and a new fuzzy factor was reconstructed,after which the GFLICM algorithm was used to analyze difference images.Finally,change detection results were analyzed qualitatively and quantitatively.To measure the feasibility and robustness of the proposed method,experiments were conducted using two data sets from the cities of Yangzhou and Nanjing.The experimental results show that the proposed method can improve the overall accuracy of change detection and reduce the false alarm rate when compared with other state-of-the-art change detection methods.
基金partly supported by National Natural Science Foundation of China (No. 61371113, 61371112)
文摘Based on the service characteristics and the sensing ability for secondary users, a joint optimization scheme of spectrum detection and allocation is investigated to expand the available sensing region and allocate the Qo S-specified channels. On the aspect of spectrum detection, due to the available detection index with the global detection metrics, cooperation thresholds are adaptively adjusted to select the cooperative model for maximizing the available sensing region. On the aspect of spectrum allocation, for different service category, the idle channels are efficiently allocated that depend on their stability and available bandwidth. Meanwhile, based on the requested rates defined by fuzzy theory, the secondary users can be divided into two categories, i.e.,delay sensitive service and reliability sensitive service. Finally, the Qo S-specified channels from the targeted spectrum subset are allocated to secondary users. Simulation results show that our proposed algorithm can not only expand the available sensing region,but also decrease the outage probability of delay sensitive services. Additionally, it enables stable power consumption in the time-variation channel.
基金TheNationalNaturalSienceFoundationofChina (No .6 2 385 2 )
文摘This paper presents a novel vision-based obstacle avoidance approach for the Autonomous Mobile Robot (AMR) with a Pan-Tilt-Zoom (PTZ) camera as its only sensing modality. The approach combines the morphological closing operation based on Sobel Edge Detection Operation and the (μ-kσ) thresholding technique to detect obstacles to soften the various lighting and ground floor effects. Both the morphology method and thresholding technique are computationally simple. The processing speed of the algorithm is fast enough to avoid some active obstacles. In addition, this approach takes into account the history obstacle effects on the current state. Fuzzy logic is used to control the behaviors of AMR as it navigates in the environment. All behaviors run concurrently and generate motor response solely based on vision perception. A priority based on subsumption coordinator selects the most appropriate response to direct the AMR away from obstacles. Validation of the proposed approach is done on a Pioneer 1 mobile robot.