Computational Intelligence - February 2013 - 45

for the final determination. According to [4], these partition
values were selected because of their relatively good test
detection performance among different experimental trials. It
was shown in [4] that this non-uniform partition detection
method outperformed the detection method using color histogram features from the uniformly partitioned HS space and
the TFS-SVMPC classifier. The number of object and nonobject training patterns used to train the two TFS-SVMPCs
were the same as those used in the FC-SSCSVM. Table 4
shows the detection results. The proposed method shows
much better detection performance than the global-localcolor detection method in experiments 3, 4, and 5. The performance of the global-local-color detection method is competitive with the proposed method in the other two
experiments. Overall, the proposed method outperforms the
global-local-color detection method.
VI. Conclusions

This paper proposed a novel entropy-based FC-SSCSVM
detection method to detect objects in different complex
scenes. The SSC algorithm is recommended to find a good
clustering result for color histogram extraction and antecedent-parameter learning of the FC-SSCSVM. For the two
proposed entropy features, the single EEC value used in filtering phase one enables rapid filtering via comparison
against a threshold. The EGCD feature vector in filtering
phase two considered the geometric distributions of the clustered composing colors of an object and therefore reduced
the number of FAs and improved detection performance. For
FC-SSCSVM learning, the use of a linear SVM helped in
finding a set of consequent parameters with high generalization ability. The experimental results showed that the FCSSCSVM outperformed the neural and SVM-trained FCs
used for comparison. The comparison with different object
detection methods utilizing different detection features also
showed the advantage of the proposed method. In the future,
the proposed method will be applied to stereo, camera-based,
three-dimensional object localization problems.
VII. Acknowledgments

This work was supported by the National Science Council,
Taiwan, R.O.C. under Grant NSC101-2221-E-005036-MY2.
References

[1] B. Bhanu and J. Peng, "Adaptive integrated image segmentation and object recognition," IEEE Trans. Syst. Man, Cybern. C, vol. 30, no. 4, pp. 427-441, 2000.
[2] T. Kawanishi, H. Murase, S. Takagi, and M. Werner, "Dynamic active search for
quick object detection with pan-tilt-zoom camera," in Proc. Int. Conf. Image Processing,
Oct. 2001, vol. 3, pp. 716-719.
[3] K. Schindler and D. Suter, "Object detection by global contour shape," Pattern Recognit., vol. 41, no. 12, pp. 3763-3748, Dec. 2008.
[4] C. F. Juang and G. C. Chen, "A TS fuzzy system learned through a support vector
machine in principal component space for real-time object detection," IEEE Trans. Ind.
Electron., vol. 59, no. 8, pp. 3309-3320, Aug. 2012.
[5] Y. Yu, G. K. I. Mann, and R. G. Gosine, "An object-based visual attention model for
robotic application," IEEE Trans. Syst. Man, Cybern. B, vol. 40, no. 5, pp. 1398-1412,
Oct. 2010.
[6] N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," in
Proc. IEEE Int. Conf. Computer Vision Pattern Recognition, June 2005, pp. 886-893.

[7] R. Feraund, O. J. Bernier, J. E. Viallet, and M. Collobert, "A fast and accurate face
detector based on neural networks," IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no.
1, pp. 42-53, Jan. 2001.
[8] M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman, "The
PASCAL visual object classes (VOC) challenge," Int. J. Comput. Vision, vol. 88, no. 2,
pp. 303-338, 2010.
[9] Y. L. Chen, B. F. Wu, H. Y. Huang, and C. J. Fan, "A real-time vision system for
nighttime vehicle detection and traffic surveillance," IEEE Trans. Ind. Electron., vol. 58,
no. 5, pp. 2030-2044, May 2011.
[10] Z. Suna , G. Bebisa, and R. Millerb, "Object detection using feature subset selection,"
Pattern Recognit., vol. 37, no. 11, pp. 2165- 2176, 2004.
[11] R. Lienhart and J. Maydt, "An extended set of Haar-like features for rapid object
detection," in Proc. IEEE Int. Conf. Image Processing, 2002, pp. 900-903.
[12] D. G. Lowe, "Distinctive image features from scale-invariant keypoints," Int. J. Comput. Vision, vol. 60, no. 2, pp. 91-110, 2004.
[13] J. Luo and D. Crandall, "Color object detection using spatial-color joint probability
functions," IEEE Trans. Image Process., vol. 15, no. 6, June 2006.
[14] C. Y. Chang, P. C. Chung, Y. C. Hong, and C. H. Tseng, "A neural network for
thyroid segmentation and volume estimation in CT images," IEEE Comput. Intell. Mag.,
vol. 6, no. 4, pp. 43-55, Nov. 2011.
[15] S. L. Smith, "Cartesian genetic programming and its application to medical diagnosis," IEEE Comput. Intell. Mag., vol. 6, no. 4, pp. 56-67, Nov. 2011.
[16] M. E. Yuksel and A. Basturk, "Application of type-2 fuzzy logic filtering to reduce
noise in color images," IEEE Comput. Intell. Mag., vol. 7, no. 3, pp. 25-35, July 2012.
[17] C. F. Juang and C. M. Chang, "Human body posture classification by neural fuzzy
network and its application to home care system," IEEE Trans. Syst. Man, Cybern. A, vol.
37, no. 6, pp. 984-994, Nov. 2007.
[18] G. D. Wu and P. H. Huang, "A maximizing-discriminability-based self-organizing
fuzzy network for classification problems," IEEE Trans. Fuzzy Syst., vol. 18, no. 2, pp.
362-373, Apr. 2010.
[19] C. F. Juang, T. C. Chen, and W. Y. Cheng, "Speedup of implementing fuzzy neural
networks with high-dimensional inputs through parallel processing on graphic processing
units," IEEE Trans. Fuzzy Syst., vol. 19, no. 4, pp. 717-728, Aug. 2011.
[20] N. Cristianini and J. S.-Taylor, An Introduction to Support Vector Machines And Other
Kernel-based Learning Methods. Cambridge, U.K.: Cambridge Univ. Press, 2000.
[21] W. Y. Cheng and C. F. Juang, "An incremental support vector machine-trained TStype fuzzy system for on-line classification problems," Fuzzy Sets Syst., vol. 163, no. 1,
pp. 24-44, Jan. 2011.
[22] Y. Chen and J. Z.Wang, "Support vector learning for fuzzy rule-based classification
systems," IEEE Trans. Fuzzy Syst., vol. 11, no. 6, pp. 716-728, Dec. 2003.
[23] J. H. Chiang and P. Y. Hao, "Support vector learning mechanism for fuzzy rule-based
modeling: A new approach," IEEE Trans. Fuzzy Syst., vol. 12, no. 1, pp. 1-12, Feb. 2004.
[24] C. T. Lin, C. M. Yeh, S. F. Liang, J. F. Chung, and N. Kumar, "Support-vector-based
fuzzy neural network for pattern classification," IEEE Trans. Fuzzy Syst., vol. 14, no. 1,
pp. 31-41, Feb. 2006.
[25] S. M. Zhou and J. Q. Gan, "Constructing L2-SVM-based fuzzy classifiers in highdimensional space with automatic model selection and fuzzy rule ranking," IEEE Trans.
Fuzzy Syst., vol. 15, no. 3, pp. 398-409, June 2007.
[26] C. F. Juang, S. H. Shiu, and S. J. Shiu, "Fuzzy system learned through fuzzy clustering and support vector machine for human skin color segmentation," IEEE Trans. Syst.
Man, Cybern. A, vol. 37, no. 6, pp. 1077-1087, Nov. 2007.
[27] C. F. Juang, S. H. Chiu, and S. W. Chang, "A self-organizing TS-type fuzzy network
with support vector learning and its application to classification problems," IEEE Trans.
Fuzzy Syst., vol. 15, no. 5, pp. 998-1008, Oct. 2007.
[28] T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data
Mining, Inference, and Prediction. New York: Springer-Verlag, 2001, ch. 13.
[29] R. C. Gonzalez and P. A. Wintz, Digital Image Processing. Reading, MA: AddisonWesley, 1992.
[30] H. Ishibuchi, T. Nakashima, and M. Nii, Classification and Modeling with Linguistic Information Granules: Advanced Approaches to Linguistic Data Mining. New York: Springer-Verlag, 2004.
[31] S. L. Chiu, "Fuzzy model identification based on cluster estimation," J. Intell. Fuzzy
Syst., vol. 2, no. 3, pp. 267-278, Sept. 1994.
[32] R. Yager and D. Filev, "Generation of fuzzy rules by mountain clustering," J. Intell.
Fuzzy Syst., vol. 2, no. 3, pp. 209-219, Sept. 1994.
[33] P. P. Angelov and D. Filev, "An approach to online identification of Takagi-Sugeno
fuzzy models," IEEE Trans. Syst. Man Cybern. B, vol. 34, no. 1, pp. 484-498, 2004.
[34] E. D. Lughofer, "FLEXFIS: A robust incremental learning approach for evolving Takagi-
Sugeno fuzzy models," IEEE Trans. Fuzzy Syst., vol. 16, no. 6, pp. 1393-1410, Dec. 2008.
[35] P. Angelov, D. P. Filev, and N. Kasabov, Evolving Intelligent Systems: Methodology and
Applications (Computational Intelligence). Piscataway, NJ: IEEE Press, 2010.
[36] L. Oliveira, U. Nunes, and P. Peixoto, "On exploration of classifier ensemble synergism
in pedestrian detection," IEEE Trans. Intell. Transp. Syst., vol. 11, no. 1, pp. 16-27, Mar. 2010.
[37] Y. Freund and R. Schapire, "Experiments with a new boosting algorithm," in Proc.
13th Int. Conf. Machine Learning, 1996, pp. 148-156.
[38] L. Breiman, "Random forests," Mach. Learn., vol. 45, pp. 5-32, 2001.
[39] K. C. Chen and W. H. Tsai, "Vision-based autonomous vehicle guidance for indoor
security patrolling by a SIFT-based vehicle-localization technique," IEEE Trans. Vehicular
Technol., vol. 59, no. 7, pp. 3261-3271, Sep. 2010.
[40] M. Begum, F. Karray, G. K. I. Mann, and R. G. Gosine, "A probabilistic model of
overt visual attention for cognitive robots," IEEE Trans. Syst. Man, Cybern. B, vol. 40, no.
5, pp. 1305-1318, Oct. 2010.

February 2013 | Ieee ComputatIonal IntellIgenCe magazIne

45



Table of Contents for the Digital Edition of Computational Intelligence - February 2013

Computational Intelligence - February 2013 - Cover1
Computational Intelligence - February 2013 - Cover2
Computational Intelligence - February 2013 - 1
Computational Intelligence - February 2013 - 2
Computational Intelligence - February 2013 - 3
Computational Intelligence - February 2013 - 4
Computational Intelligence - February 2013 - 5
Computational Intelligence - February 2013 - 6
Computational Intelligence - February 2013 - 7
Computational Intelligence - February 2013 - 8
Computational Intelligence - February 2013 - 9
Computational Intelligence - February 2013 - 10
Computational Intelligence - February 2013 - 11
Computational Intelligence - February 2013 - 12
Computational Intelligence - February 2013 - 13
Computational Intelligence - February 2013 - 14
Computational Intelligence - February 2013 - 15
Computational Intelligence - February 2013 - 16
Computational Intelligence - February 2013 - 17
Computational Intelligence - February 2013 - 18
Computational Intelligence - February 2013 - 19
Computational Intelligence - February 2013 - 20
Computational Intelligence - February 2013 - 21
Computational Intelligence - February 2013 - 22
Computational Intelligence - February 2013 - 23
Computational Intelligence - February 2013 - 24
Computational Intelligence - February 2013 - 25
Computational Intelligence - February 2013 - 26
Computational Intelligence - February 2013 - 27
Computational Intelligence - February 2013 - 28
Computational Intelligence - February 2013 - 29
Computational Intelligence - February 2013 - 30
Computational Intelligence - February 2013 - 31
Computational Intelligence - February 2013 - 32
Computational Intelligence - February 2013 - 33
Computational Intelligence - February 2013 - 34
Computational Intelligence - February 2013 - 35
Computational Intelligence - February 2013 - 36
Computational Intelligence - February 2013 - 37
Computational Intelligence - February 2013 - 38
Computational Intelligence - February 2013 - 39
Computational Intelligence - February 2013 - 40
Computational Intelligence - February 2013 - 41
Computational Intelligence - February 2013 - 42
Computational Intelligence - February 2013 - 43
Computational Intelligence - February 2013 - 44
Computational Intelligence - February 2013 - 45
Computational Intelligence - February 2013 - 46
Computational Intelligence - February 2013 - 47
Computational Intelligence - February 2013 - 48
Computational Intelligence - February 2013 - 49
Computational Intelligence - February 2013 - 50
Computational Intelligence - February 2013 - 51
Computational Intelligence - February 2013 - 52
Computational Intelligence - February 2013 - 53
Computational Intelligence - February 2013 - 54
Computational Intelligence - February 2013 - 55
Computational Intelligence - February 2013 - 56
Computational Intelligence - February 2013 - 57
Computational Intelligence - February 2013 - 58
Computational Intelligence - February 2013 - 59
Computational Intelligence - February 2013 - 60
Computational Intelligence - February 2013 - 61
Computational Intelligence - February 2013 - 62
Computational Intelligence - February 2013 - 63
Computational Intelligence - February 2013 - 64
Computational Intelligence - February 2013 - 65
Computational Intelligence - February 2013 - 66
Computational Intelligence - February 2013 - 67
Computational Intelligence - February 2013 - 68
Computational Intelligence - February 2013 - 69
Computational Intelligence - February 2013 - 70
Computational Intelligence - February 2013 - 71
Computational Intelligence - February 2013 - 72
Computational Intelligence - February 2013 - 73
Computational Intelligence - February 2013 - 74
Computational Intelligence - February 2013 - 75
Computational Intelligence - February 2013 - 76
Computational Intelligence - February 2013 - 77
Computational Intelligence - February 2013 - 78
Computational Intelligence - February 2013 - 79
Computational Intelligence - February 2013 - 80
Computational Intelligence - February 2013 - Cover3
Computational Intelligence - February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com