An Immune Clonal Selection Algorithm for Online Symbol Recognition
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [31]
  • |
  • Related [20]
  • |
  • Cited by [1]
  • | |
  • Comments
    Reference
    [1]Landay JA,Myers BA.Sketching interfaces:Toward more human interface design.IEEE Computer,2001,34(3):56-64.
    [2]Li Y,Guan ZW,Dai GZ.Research on development tools for pen-based user interfaces.Journal of Software,2003,14(3):392-400 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/392.htm
    [3]Sun ZX,Feng GH,Zhou RH.Techniques for sketch-based user interface:Review and research.Journal of Computer-Aided Design & Computer Graphics,2005,17(9):1889-1899 (in Chinese with English abstract).
    [4]Calhoun C,Stahovich TF,Kurtoglu T,Kara LB.Recognizing multi-stroke symbols.In:Proc.of the AAAI Spring Symp.on Sketch Understanding.Palo Alto,2002.15-23.http://www.aaai.org/Press/Reports/Symposia/Spring/ss-02-08.html
    [5]Xu XG,Sun ZX,Peng BB,Jin XY,Liu WY.An online composite graphics recognition approach based on matching of spatial relation graphs.Int'l Journal of Document Analysis and Recognition,2004,7(1):44-55.
    [6]Al-Zubi S,Broemme A,Toennies K.Using an active shape structural model for biometric sketch recognition.In:Michaelis B,Krell G,eds.Proc.of the DAGM 2003.LNCS 2781,Beilin,Heidelberg:Springer-Verlag,2003.187-195.
    [7]Sun ZX,Zhang LS,Tang EY.An incremental learning algorithm based on SVM for online sketchy shape recognition.In:Wang LP,Chen K,Soon OY,eds.Advance in natural Computing.LNCS 3610,Beilin,Heidelberg:Springer-Verlag,2005.655-659.
    [8]Sun ZX,Jiang W,Sun JY.Adaptive online multi-stroke sketch recognition based on hidden Markov model.In:Daniel YS,Liu ZQ,Wang XZ,et al.,eds.Advances in Machine Learning and Cybernetics.LNCS 3784,Beilin,Heidelberg:Springer-Verlag,2005.948-957.
    [9]Sun ZX,Zhang LS,Zhang B.Online composite sketchy shape recognition based on Bayesian networks.In:Jiao LC,Wang LP,Gao XB,et al.,eds.Proc.of the Natural Computing.LNCS 4222,Beilin,Heidelberg:Springer-Verlag,2006.506-515.
    [10]Sun ZX,Liu WY,Peng BB,Zhang B,Sun JY.User adaptation for online sketchy shape recognition.In:Jolep L,Kwon YB,eds.Graphics Recognition:Recent Advances and Perspectives.LNCS 3088,Beilin,Heidelberg:Springer-Verlag,2004.303-314.
    [11]Burnet FM.The Clonal Selection Theory of Acquired Immunity.Cambridge:Cambridge University Press,1959.
    [12]Ding JL,Liu XQ,Li T,Yang S,Yang P.Dynamic computer forensics based on artificial immune system against network intrusion.Journal of Sichuan University (Engineering Science Edition),2004,36(5):108-111 (in Chinese with English abstract).
    [13]Li T.Computer Immunology.Beijing:Publishing House of Electronics Industry,2004 (in Chinese).
    [14]Li T.An immunity based network security risk estimation.Science in China (Series F),2005,48(5):557-578.
    [15]Okamoto T,Ishida Y.A distributed approach against computer viruses inspired by the immune system.IEICE Trans.on Communications,2000,83(5):908-915.
    [16]Kim JW,Bentley P.The human immune system and network intrusion detection.In:Proc.of the 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99).Aachen,1999.
    [17]Plamondon R,Srihari NS.On-Line and off-line handwriting recognition:A comprehensive survey.IEEE Trans.on Pattern Analysis and Machine Intelligence,2000,22(1):63-84.
    [18]Liu CL,Jaeger S,Nakagawa M.Online recognition of Chinese characters:The state-of-the-art.IEEE Trans.on Pattern Analysis and Machine Intelligence,2004,26(2):198-213.
    [19]Jain AK,Griess FD,Connell SD.On-Line signature verification.Pattern Recognition,2002,35(12):2963-2972.
    [20]Günter S,Bunk H.Handwritten word recognition using classifier ensembles generated from multiple prototypes.Int'l Journal of Pattern Recognition and Artificial Intelligence,2004,18(5):957-974.
    [21]Fierrez-Aguilar J,Nanni L,Lopez-Penalba J,Ortega-Garcia J,Maltoni D.An on-line signature verification system based on fusion of local and global information.In:Kanade T,Jain A,Ratha NT,eds.Proc.of the Audio-and Video-based Biometric Person Authentication.LNCS 3546,Beilin,Heidelberg:Springer-Verlag,2005.523-532.
    [22]Forrest S,Perelson AS,Allen L,Cherukuri R.Self-Nonself discrimination in a computer.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,1994.202-212.
    [23]Bentley K.Immune memory in the dynamic clonal selection algorithm.In:Proc.of the 1st Int'l Conf.on Artificial Immune System (ICARIS).Canterbury,2002.57-65.
    [24]de Castro LN,Timmis J.Artificial immune systems:A novel approach to pattern recognition.In:Proc.of the Artificial Neural Networks in Pattern Recognition.Paisley,2002.67-84.
    [25]Tarakanov AO,Skormin VA.Pattern recognition by immunocomputing.In:Proc.of the Special Sessions on Artificial Immune Systems in Congress on Evolutionary Computation,IEEE World Congress on Computational Intelligence.Hawaii:IEEE Computer Society Press,2002.938-943.
    [26]White J,Garrett SM.Improved pattern recognition with artificial clonal selection.In:Goos G,Hartmanis J,van Leeuwen J,eds.Proc.of the Artificial Immune Systems.LNCS 2787,Beilin,Heidelberg:Springer-Verlag,2003.181-193.
    [27]Carter JH.The immune system as a model for pattern recognition and classification.Journal of the American Medical Informatics Association,2000,7(3):28-41.
    [28]Sathyanath S,Sahin F.An AIS approach to a color image classification problem in a real time industrial application.In:Proc.of the IEEE Int'l Conf.on System,Man and Cybernetics.Arizona:IEEE Computer Society Press,2001.2285-2290.
    [29]Sun FX,Li T,Jiang YP,Wang TF,Ni JC,Gong X.A novel method of chinese name recognition based on artificial immune system.Journal of Sichuan University (Engineering Science Edition),2006,38(1):98-102 (in Chinese with English abstract).
    [30]Liang KX,Li T,Liu Y,Chen Y.A new model of intrusion detection based on artificial immune theory.Computer Engineering and Applications,2005,41(2):129-132.
    [31]Wang YF,Li T,Hu XQ,Song C.A real-time method of risk evaluation based on artificial immune system for network security.Acta Electronica Sinica,2005,33(5):945-949 (in Chinese with English abstract).
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张莉莎,孙正兴.面向在线图符识别的免疫克隆选择算法.软件学报,2008,19(7):1654-1665

Copy
Share
Article Metrics
  • Abstract:4436
  • PDF: 5929
  • HTML: 0
  • Cited by: 0
History
  • Received:October 09,2006
  • Revised:January 04,2007
You are the first2032830Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063