Sciweavers

PRL
1998
85views more  PRL 1998»
13 years 11 months ago
Large encrypting binary images with higher security
In this paper, we present a new approach for encrypting binary images. Putting different scan patterns at the same level in Ž .the scan tree structure and employing a two-dimensi...
Kuo-Liang Chung, Lung-Chun Chang
PRL
1998
93views more  PRL 1998»
13 years 11 months ago
A connectionist method for pattern classification with diverse features
A novel connectionist method is proposed to simultaneously use diverse features in an optimal way for pattern classification. Unlike methods of combining multiple classifiers, a m...
Ke Chen 0001
PRL
1998
142views more  PRL 1998»
13 years 11 months ago
A monothetic clustering method
: The proposed divisive clustering method performs simultaneously a hierarchy of a set of objects and a monothetic characterization of each cluster of the hierarchy. A division is ...
Marie Chavent
PRL
1998
132views more  PRL 1998»
13 years 11 months ago
Unsupervised feature selection using a neuro-fuzzy approach
A neuro-fuzzy methodology is described which involves connectionist minimization of a fuzzy feature evaluation index with unsupervised training. The concept of a ¯exible membersh...
Jayanta Basak, Rajat K. De, Sankar K. Pal
PRL
1998
83views more  PRL 1998»
13 years 11 months ago
Using image signatures for place recognition
This paper describes and evaluates an image-based place recognition method for mobile robots based on matching image signatures. The method represents an image as a set of arrays ...
Shlomo Argamon-Engelson
PRL
1998
55views more  PRL 1998»
13 years 11 months ago
Non-linear dimensionality reduction techniques for unsupervised feature extraction
Steve De Backer, Antoine Naud, Paul Scheunders