Sciweavers

PRL
1998
85views more  PRL 1998»
13 years 4 months ago
Large encrypting binary images with higher security
In this paper, we present a new approach for encrypting binary images. Putting different scan patterns at the same level in Ž .the scan tree structure and employing a two-dimensi...
Kuo-Liang Chung, Lung-Chun Chang
PRL
1998
93views more  PRL 1998»
13 years 4 months ago
A connectionist method for pattern classification with diverse features
A novel connectionist method is proposed to simultaneously use diverse features in an optimal way for pattern classification. Unlike methods of combining multiple classifiers, a m...
Ke Chen 0001
PRL
1998
142views more  PRL 1998»
13 years 4 months ago
A monothetic clustering method
: The proposed divisive clustering method performs simultaneously a hierarchy of a set of objects and a monothetic characterization of each cluster of the hierarchy. A division is ...
Marie Chavent
PRL
1998
132views more  PRL 1998»
13 years 4 months ago
Unsupervised feature selection using a neuro-fuzzy approach
A neuro-fuzzy methodology is described which involves connectionist minimization of a fuzzy feature evaluation index with unsupervised training. The concept of a ¯exible membersh...
Jayanta Basak, Rajat K. De, Sankar K. Pal
PRL
1998
83views more  PRL 1998»
13 years 4 months ago
Using image signatures for place recognition
This paper describes and evaluates an image-based place recognition method for mobile robots based on matching image signatures. The method represents an image as a set of arrays ...
Shlomo Argamon-Engelson
PRL
1998
55views more  PRL 1998»
13 years 4 months ago
Non-linear dimensionality reduction techniques for unsupervised feature extraction
Steve De Backer, Antoine Naud, Paul Scheunders