A neural network shape recognition system based on D-S theory

被引:0
|
作者
Hu, LM [1 ]
Gao, J [1 ]
Wang, AD [1 ]
Hu, Y [1 ]
机构
[1] Hefei Univ Technol, Lab Image & Informat Proc, Hefei 230009, Peoples R China
来源
2003 IEEE INTELLIGENT TRANSPORTATION SYSTEMS PROCEEDINGS, VOLS. 1 & 2 | 2003年
关键词
Dempster-Shafer theory; information fusion; neural network; shape recognition;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper,, a new neural network shape recognition system based on Dempster-Shafer theory is presented. It is composed. of three parts; they are preprocessing part, feature extracting part and recognition part. Firstly, we use Hough Transform (HT) to preprocess and obtain the feature vectors of the images to be. recognized. Recognition part fully utilizes the advantages of Dempster-Shafer Theory in uncertainty reasoning, and the prototype patterns are used as items of evidence in Dempster-Shafer reasoning. The belief degrees deduced by those evidences are represented by basic belief assignments (BBAs) and pooled using the Dempster's rule of combination. This procedure can be implemented in a multilayer neural network with specific architecture consisting of one input layer, two hidden layers and one output layer. Experiments in recognition of three kinds of traffic signs demonstrate the excellent performance of this recognition system.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [41] Security evaluation of substation communication system based on D-S theory
    Cao, Yijia
    Yao, Huan
    Huang, Xiaoqing
    Zhang, Zhenfu
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2011, 31 (06): : 1 - 5
  • [42] Network intrusion early warning model based on D-S evidence theory
    Zhai, JQ
    Tian, JF
    Du, RZ
    Huang, JC
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1972 - 1977
  • [43] EARLY WARNING MODEL OF NETWORK INTRUSION BASED ON D-S EVIDENCE THEORY
    Tian Junfeng Zhai Jianqiang Du Ruizhong Huang Jiancai(institute of Computer Network Technology
    Journal of Electronics(China), 2005, (03) : 261 - 267
  • [44] Situation evaluate on hierarchical network security based on D-S evidence theory
    Zhang, Yu, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13): : 3 - 4
  • [45] EARLY WARNING MODEL OF NETWORK INTRUSION BASED ON D-S EVIDENCE THEORY
    Tian Junfeng Zhai Jianqiang Du Ruizhong Huang Jiancaiinstitute of Computer Network TechnologyHebei UniversityBaoding China
    JournalofElectronics, 2005, (03) : 261 - 267
  • [46] Damage identification method based on bp network and D-S evidence theory
    Jiang, Shao-Fei
    Zhang, Chun-Mei
    Lv, Xiao-Fei
    STRUCTURAL CONDITION ASSESSMENT, MONITORING AND IMPROVEMENT, VOLS 1 AND 2, 2007, : 495 - 501
  • [47] Situation evaluate on hierarchical network security based on D-S evidence theory
    Wang, Chundong
    Zhang, Yu
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 13 (3-4) : 245 - 256
  • [48] Network Security Situation Evaluation Based on Modified D-S Evidence Theory
    WANG Chundong
    ZHANG YuKey
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 409 - 416
  • [49] Combination of weak evidences by D-S theory for person recognition
    Yamada, M
    Kudo, M
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2004, 3213 : 1065 - 1071
  • [50] Research on the algorithm of object recognition based on the feature fusion and D-S evidence theory
    Pan Xiuqin
    Lu Yong
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2907 - +