Patrick Shen-Pei Wang

Patrick Shen-Pei Wang
Northeastern University | NEU · College of Computer and Information Science

PhD, CIS, Oregon, MSICE, GIT

About

233
Publications
17,970
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,850
Citations

Publications

Publications (233)
Article
Graph signal processing (GSP) is an emerging field in the signal processing community. Novel GSP-based transforms, such as graph Fourier transform and graph wavelet filter banks, have been successfully utilized in image processing and pattern recognition. As a rapidly developing research area, graph signal processing aims to extend classical signal...
Article
Text-independent Chinese writer identification does not depend on the text content of the query and reference handwritings. In order to deal with the uncertainty of the text content, text-independent approaches usually give special attention to the global writing style of handwriting, rather than the properties of each individual character or word....
Article
In this study, a new version of TOPSIS method is reconstructed to deal with the problem of multi-criteria decision making. Here, the data representation of all alternatives is varied according to different criteria, such as real number, interval-valued number, set-valued number and intuitionistic fuzzy-valued number, etc. Because the distinguishing...
Chapter
The purpose of ranking, for decision makers, is to discover a mechanism that can produce a possible linear sequence of the data to be ranked. But this is not an easy thing, especially for the highly structured data. This paper will make a discussion on the ranking problem for factor granules in viewpoint of fuzzy collaborative clustering. Hereinto,...
Article
This paper presents a new approach called the empirical mode decomposition — window fractal (EMDWF) algorithm in classification of fingerprint of medicinal herbs. In this way, we consider a glycyrrhiza fingerprint of medicinal herb as a signal sequence, and apply empirical mode decomposition (EMD) and Hiaguchis fractal dimension to construct a feat...
Article
Text-independent handwriting identification methods require that features such as texture are extracted from lengthy document image; while text-dependent handwriting identification methods require that the contents of the documents being compared are identical. In order to overcome these confinements, this paper presents a novel Chinese handwriting...
Article
Approximate Nearest Neighbor (ANN) search is a challenging problem with the explosive high-dimensional large-scale data in recent years. The promising technique for ANN search include hashing methods which generate compact binary codes by designing effective hash functions. However, lack of an optimal regularization is the key limitation of most of...
Article
This paper makes a discussion on the ranking problem of factor granules where each granule is composed by three parts: The patterns, the factors and the factor-induced information. Hereinto, the factor-induced information refers to the pattern's attributes and the relationship between any two patterns. The overall ranking process is based on the id...
Article
Writer recognition is to identify a person on the basis of handwriting, and great progress has been achieved in the past decades. In this paper, we concentrate ourselves on the issue of off-line text-independent writer recognition by summarizing the state of the art methods from the perspectives of feature extraction and classification. We also exh...
Conference Paper
Diffusion magnetic resonance imaging (dMRI) can provide quantitative information with which to visualize and study connectivity and continuity of neural pathways in nervous systems. However, the very subtle regions and multiple intra-voxel orientations of water diffusion in brain cannnot accurately be represented in low spatial resolution imaging w...
Conference Paper
By considering the fuzzy collaborative clustering, in this paper we investigate the ranking problem of factor granules, where the factor granule is composed by the patterns, the factors and the factor-induced information. Since the ideology of TOPSIS method is applied to obtain the finial ranking result, a referential factor granule is pre-provided...
Article
Recently, many dimensionality reduction (DR) algorithms have been developed, which are successfully applied to feature extraction and representation in pattern classification. However, many applications need to re-project the features to the original space. Unfortunately, most DR algorithms cannot perform reconstruction. Based on the manifold assum...
Article
Full-text available
There is a growing worldwide trend to implement livestock traceability systems. This paper aims to explore how iris analysis and recognition can be utilised on cow identification to enhance cow management in its traceability system. In general, a typical cow identification system based on iris analysis includes iris imaging, iris detection, and rec...
Conference Paper
This seminar deals with fundamental aspects of Similarity, Semantics, Ambiguity, Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack,, What are Biometric Technologies? Biometrics: Analysis vs Synthes...
Article
As is known, kernel methods are developed to handle nonlinear classification. However, we have found that based on vector representation of face images, it is not easy to improve the performance of LDA-based methods by incorporating the kernel trick. Actually, in the case that the dimensionality of face images in vector form is far greater than the...
Article
The number of inner points excluded in an initial convex hull (ICH) is vital to the efficiency getting the convex hull (CH) in a planar point set. The maximum inscribed circle method proposed recently is effective to remove inner points in ICH. However, limited by density distribution of a planar point set, it does not always work well. Although th...
Article
A proposed situational awareness system uses facial biometric data and dialog-based decision-making support to aid security personnel.
Article
Sparse representation based classification has led to interesting image recognition results, while the dictionary used for sparse coding plays a key role in it. This paper presents a novel supervised structure dictionary learning (SSDL) algorithm to learn a discriminative and block structure dictionary. We associate label information with each dict...
Article
Edges are prominent features in images. The detection and analysis of edges are key issues in image processing, computer vision and pattern recognition. Wavelet provides a powerful tool to analyze the local regularity of signals. Wavelet transform has been successfully applied to the analysis and detection of edges. A great number of wavelet-based...
Article
In this paper, we propose a novel automatic image annotation model by mining the web. In our approach, the terms or words appearing in the associated text are extracted and filtered as labels or annotations for the corresponding web images. Sure, much noise exists in those selected labels. In order to reduce the influence caused by the noisy labels...
Conference Paper
This keynotes discusses the following: A Formal Approach for Understanding Emergent Properties in Simulation Models; Similarity-Based IPR and e-Forensics, -Modeling and Simulation in HC Interactive Learning Environment; Emotion, Future Smart Technology, and Convergence.
Article
Most traditional postcode recognition systems implicitly assumed that the distribution of the 10 numerals (0–9) is balanced. However it is far from a reasonable setting because the distribution of 0–9 in postcodes of a country or a city is generally imbalanced. Some numerals appear in more postcodes, while some others do not. In this paper, we stud...
Article
Similarity measurement is crucial for classification. Based on the manifold assumption, many graph-based algorithms were developed. Almost all methods follow the k-rule or ε-rule to construct a graph, and then focus on the algorithms based on the graph. However, the graph may not represent the local structure well, and it does not fully utilize the...
Conference Paper
Mandarin is known as a tonal language, mainly because its tone is a distinctive discriminative feature. This paper describes an attempt to automate the tone evaluation for continuous Mandarin speech in CALL systems. A competing model based integrated evaluation approach is introduced to obtain objective tone evaluation results. The evaluation inclu...
Article
The importance of high-fidelity enhancement in low quality fingerprint image cannot be overemphasized. Most of the existing fingerprint enhancement methods are contextual filter-based methods and they often suffer from two shortcomings: (1) there is block effect on the enhanced images; and (2) they blur or destroy ridge structures around singular p...
Conference Paper
This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack,, What are Biometric Technologies? Biometrics: Analysis vs Synthesis, Analysis: Interactive Pattern Rec...
Article
Tone is a distinctive feature in Mandarin. This paper describes an attempt to automate the tone evaluation for continuous Mandarin speech. An HMM forced alignment based tone model is used to get tone score for Mandarin syllables. The competing model based approach is introduced to get tonal syllable score. Especially, we generate the syllable-based...
Article
Texture classification is one of the important fields in pattern recognition and machine vision research. LBP method,13–15 proposed by Ojala, can be used to classify texture images effectively. And the LBP method has rotation-invariant, illumination-invariant, multi-resolution characteristics. But, since the contrast is not considered between neigh...
Article
In this paper a new thinning algorithm is presented. It is simple yet robust, and can maintain the same advantages of other key skeletonization algorithms. In this new algorithm, only a very small set of rules of criteria for deleting pixels is used. It is faster and easier to implement. Its advantages and limitations are discussed and compared wit...
Article
In this paper, we propose a bionic face recognition method based on Gabor feature. First, Gabor features are extracted from face images, followed by dimensionality reduction using 2DPCA algorithm, which serves as the feature vectors of the proposed method. Finally, the bionic classifier is trained for classification. The experiment on AR and PIE fa...
Article
We investigate the factors that make it difficult to generalize pushdown automata for one-dimensional strings to two-dimensional arrays. Then we resolve the problems and construct two-dimensional pushdown array automata (PDAA). The relationship between isometric context-free array languages and pushdown array automata is established. Several exampl...
Article
In this paper, a generic approach for the analysis and design of parallel thinning algorithms is presented. The procedures for designing 4-subcycle/iteration, 2-subcycle/iteration, and 1-subcycle/iteration thinning algorithms are developed. The experimental results show that these thinning algorithms designed by proposed approach preserve image con...
Article
We introduce a sequential/parallel parsing algorithm for analyzing 3-dimensional polyhedral objects represented by 3-d universal array grammars. The mechanism serves as a compromise between purely sequential methods, which normally take too much time, and purely parallel methods, which take too much hardware for large digital arrays. Several exampl...
Article
Facial expression modeling has been a popular topic in biometrics for many years. One of the emerging recent trends is capturing subtle details such as wrinkles, creases and minor imperfections that are highly important for biometric modeling as well as matching. In this paper, we suggest a novel approach to the problem of expression modeling and m...
Article
This paper is aimed at 3D object understanding from 2D images, including articulated objects in active vision environment, using interactive, and internet virtual reality techniques. Generally speaking, an articulated object can be divided into two portions: main rigid portion and articulated portion. It is more complicated that "rigid" object in t...
Article
In dealing with large volume image data, sequential methods usually are too slow and unsatisfactory. This paper introduces a new system employing parallel matching in high-level recognition of 3D articulated objects. A new structural strategy using linear combination and parallel graphic matching techniques is presented for 3D polyhedral objects re...
Article
A perfectly parallel thinning algorithm (PPTA) is proposed. It can generate perfect skeletons, which consist of end points, break points, and hole points only. Experimental results show that the proposed PPTA can also preserve image connectivity, produce thinner skeletons, and is faster than many existing thinning algorithms. For example, it is twi...
Article
This paper deals with analyzing and comparing several key thinning algorithms in terms of various different methodologies. From these analyses and comparisons, a new sequential model thinning algorithm using heuristic, hybrid methods is presented. It intends to produce, based on past experience, thinned skeletons of thickness one from input pattern...
Article
This paper includes a description of 3 affiliated oriental languages: Chinese, Japanese, and Korean. It includes a description of the origins of these 3 languages and the inter-relationship among them. Drawn from the viewpoints of several experienced researchers in the field of OCR (Optical Character Recognition) and computational linguistics, it a...
Conference Paper
Full-text available
This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack, What are Biometric Technologies? Biometrics: Analysis vs Synthesis, Analysis: Interactive Pattern Reco...
Chapter
This chapter introduces recent progress and existing challenges in the area of face recognition (FR). Main problems encountered in FR such as curse of dimensionality problem, nonlinear problem, and small sample size problem are discussed. To deal with these limitations, some classical methods and state of the art schemes, including linear feature a...
Chapter
Mandarin is known as a tonal language, so the tone is a distinctive discriminative feature in Mandarin. However, accurate segmentation of utterances has a great effect on tone recognition. In this chapter, an approach based on forced alignment of HMM (Hidden Markov Model) is employed to train utterances for obtaining model of getting accurate sylla...
Chapter
The common vector represents the common invariant properties of the respective class, which was proposed and originally introduced for isolated word recognition problems. Inspired by the idea of the common vector, researchers proposed the discriminant common vector approach and the common faces approach for face recognition. In this chapter, we stu...
Article
In this paper, an automatic rotation invariant multiview face detection method, which utilizes modified Skin Color Model (SCM), is presented. First, Gaussian Mixture Model (GMM) and Support Vector Machine (SVM) based hybrid models are used to classify human skin regions from color images. The novelty of the adaptive hybrid model is its ability to p...
Conference Paper
Cognitive Computing (CC) is an emerging paradigm of intelligent computing theories and technologies based on cognitive informatics that implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the brain. The development of Cognitive Computers (cC) is centric in cognitive computing methodologies. A c...
Conference Paper
Some concerns of measurement for biometric analysis and synthesis are investigated. This paper reexamines the nature of definition of “measurement” of distance between two objects or image patterns, which is essential for comparing the “similarity” of patterns. According to [19], biometric refers to the studies of analysis, synthesis, modeling and...
Article
The main problem to identify skilled forgeries for offline signature verification lies in the fact that it is difficult to formalize distinguished feature representation of the signature patterns and design appropriate fusion scheme for various types of feature vectors. To tackle these problems, in this paper, we propose an approach to extract robu...
Article
In this article, a new dynamic structural statistical model based online signature verification algorithm is proposed, in which a method for statistical modeling the signature's characteristic points is presented. Dynamic time warping is utilized to match two signature sequences so that correspondent characteristic point pair can be extracted from...
Conference Paper
Full-text available
This talk deals with some fundamental aspects of biometrics and its applications. It basically includes the following: Overview of Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack, What are Biometric Technologies? Biometrics: Analysis vs Synthesis, Analysis: Interactive Pattern Recognition Concept, Impo...
Article
Full-text available
A new facial biometric scheme is proposed in this paper. Three steps are included. First, a new nontensor product bivariate wavelet is utilized to get different facial frequency components. Then a modified 2D linear discriminant technique (M2DLD) is applied on these frequency components to enhance the discrimination of the facial features. Finally,...
Conference Paper
In this paper we present a scene-based video watermarking scheme using support vector machines (SVMs). In a given scene, the algorithm uses the first h' frames to train an embedding SVM, and uses this SVM to watermark the rest of frames. In the extracting phrase, the detector uses center h frames of the first h' frames to train an extracting SVM. T...
Article
In this paper we present an improved support vector machines (SVMs) watermarking system for still images and video sequences. By a thorough study on feature selection for training SVM, the proposed system shows significant improvements on computation efficiency and robustness to various attacks. The improved algorithm is extended to be a scene-base...
Conference Paper
Face recognition has received significant attention in the last decades for many potential applications. Recently, the scale invariant feature transform (SIFT) becomes an interesting technique for the task of object recognition. This paper investigated the application of the SIFT approach to the face recognition and proposed a new method based on S...
Conference Paper
Full-text available
This talk deals with advanced concepts of artificial intelligence (AI) and pattern recognition (PR), and their applications to solving real life problems including biometrics applications. It basically covers the following topics: (1) Overview of pattern recognition (PR),(2) Overview of artificial intelligence (AI),(3) the relation between PR and A...
Article
Full-text available
Facial expression provides an important behavioral measure for studies of emotion, cognitive processes, and social interaction. Facial expression recognition has recently become a promising research area. Its applications include human-computer interfaces, human emotion analysis, and medical care and cure. In this paper, we investigate various feat...
Article
Full-text available
In this paper, we present image processing and pattern recognition techniques to extract human faces and facial features from color images. First, we segment a color image into skin and non-skin regions by a Gaussian skin-color model. Then, we apply mathematical morphology and region filling techniques for noise removal and hole filling. We determi...
Article
Classifier combination is an effective method to improve the recognition accuracy of a biometric system. It has been applied to many practical biometric systems and achieved excellent performance. However, there is little literature involving theoretical analysis on the effectiveness of classifier combination. In this paper, we investigate classifi...
Article
Full-text available
3D face reconstruction is a popular area within the computer vision domain. 3D face reconstruction should ideally be achieved easily and cost-effectively, without requiring specialized equipment to estimate 3D shapes. As a result of this, many techniques for retrieving 3D shapes from 2D images have been proposed. In this paper, a novel method for 3...
Conference Paper
This tutorial deals with advanced concepts of Artificial Intelligence (AI) and Pattern Recognition (PR), and their applications to solving real life problems including biometrics applications. It basically covers the following topics: (1) Overview of Pattern Recognition (PR),(2) Overview of Artificial Intelligence (AI),(3) The Relation Between PR a...
Conference Paper
Full-text available
Recognition rate is traditionally used as the main criterion for evaluating the performance of a recognition system. High recognition reliability with low misclassification rate is also a must for many applications. To handle the variability of the writing style of different individuals, this paper employs decision trees and WRB AdaBoost to design...
Conference Paper
Watermarking plays a significant role in copyright protection. In this paper, a new method of digital watermarking is proposed based on a new non-tensor bivariate wavelet filter banks with linear phase, which are constructed from the centrally symmetric matrices. Our investigation demonstrates that the constructed non-tensor product bivariate wavel...
Conference Paper
Skew detection acts as an important role in document image analysis systems. Many methods have been designed for text-dominant document images, but they usually fail in handling formula-dominant images. Hough transform is an effective method to estimate the skew angle of formulas with fraction bars, but cannot dealing with formulas without fraction...
Conference Paper
This cutting-edge research lecture deals with some fundamental aspects of biometrics and its applications. It basically includes the following subtopics: (1) overview of biometric technology and applications (2) importance of security: a scenario of terrorists attack, (3) what are biometric technologies?, (4) biometrics: analysis vs. synthesis. (5)...
Article
MC-CDMA systems and partial band jamming were modeled, and further BER formulae under two conditions were theoretically deduced when equal gain combination is used in the receiver, which was proved by MATLAB simulations. One condition was in normal MC-CDMA systems, and the other was that the systems employed frequency interleave and convolutional c...
Article
Full-text available
The primary application focus of biometric technology is the verification and identification of humans using their possessed biological (anatomical, physiological and behavioral) properties. Recent advances in biometric processing of individual biometric modalities (sources of identification data such as facial features, iris patterns, voice, gait,...
Chapter
Biometrics are automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are: face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Facial Recognition technologies are becoming one of the foundation of an extensive array of highly secure identification and...
Conference Paper
Full-text available
Biometric technologies focus on the verification and iden- tification of humans using their possessed biological (anatomical, physiological and behavioral) properties. T his paper overview current advances in biometric technologies, as well as some aspects of system integration, privacy and security and accompanying problems such as testing and eva...
Article
Full-text available
This paper proposes a Content-Based Image Retrieval (CBIR) system applicable in mobile devices. Due to the fact that different queries to a content-based image retrieval (CBIR) system emphasize different subsets of a large collection of features, most CBIR systems using only a few features are therefore only suitable for retrieving certain types of...
Article
The antijamming performance of OFDM (Orthogonal Frequency Division Multiplexing) with various jamming types was analyzed, such as broadband jamming, pulse jamming, partial-band jamming, multitone jamming and so on, and the performances with coding and interleaving were also given. Finally, the conclusions were given that what jamming type is the be...
Article
Full-text available
Some concerns of measurement for biometric analysis and synthesis are investigated. This research tries to reexamine the nature of the basic definition of "measurement" of distance between two objects or image patterns, which is essential for comparing the "similarity" of patterns. According to a recent International Workshop on Biometric Technolog...
Article
Full-text available
A recognition device, called Finite Array Automaton, accepting a class of picture arrays, is introduced and it is shown that this device is equiva-lent to the n−dimensional regular array grammar. Regular (string) lan-guages, called spreading languages, are associated to the corresponding n−dimensional array regular languages in order to deal with c...
Conference Paper
Full-text available
This paper presents a new approach to represent face by using non-tensor product bivariate wavelet filters. A new non-tensor product bivariate wavelet filter banks with linear phase are constructed from the centrally symmetric matrices. Our investigations demonstrate that these filter banks have a matrix factorization and they are capable of repres...
Conference Paper
Full-text available
Though millions of images are stored in a large digital image library today, the user can not access or make full use of these image information unless the digital image li- brary is well organized in order to allow efficient browsing, searching and retrieval. Thus, research in image retrieval has been an active discipline since 70's last century....
Conference Paper
Full-text available
In this paper, we propose an unsupervised genetic clustering algorithm, which produces a new chromosome without any conventional genetic operators, and instead according to the gene reproducing probabilities determined by Markov chain modeling. Selection of cluster centers from the dataset enables construction of a look-up table that saves the dist...
Conference Paper
In preceding papers, a genetic algorithm was developed for the design and optimization of the noise transfer function in higher-order Sigma-Delta A/D and D/A converters having cascade-of-resonators (COR), cascade-of-integrators (COI), and combined cascade-of-integrators-cum-resonators (CRI) configurations. This paper presents a two-stage genetic-al...
Conference Paper
With the fast development of technology and science, there come various changes and demands in consumer service market. The plan integrating "broadband network" with "application service" is potential and farsighted in network industry. Academic and technological institutes start researching and promoting the MOD (multimedia on demand) system, whic...
Article
A simple and effective syntactic method of description of picture patterns of rectangular arrays of symbols is proposed. The method is based on contextual grammars of Marcus(1969) guided by trajectories in the generation process.The resulting grammar is called Parallel contextual array grammar with contexts shuffled on trajectories. This grammar is...
Article
XML has been widely used as metadata for image retrieval. As a standard, it makes it easier to index and retrieve information across different platforms. However, how to automatically convert an image into XML format remains a challenge, In this paper, a system for generating structured document in XML from digitally captured document images is pre...
Article
Full-text available
In recent years, a number of large–scale applications continue to rely heavily on the use of paper as the dominant medium, either on intra-organization basis or on inter-organization basis, including paper intensive applications in the check processing application. In many countries, the value of each check is read by human eyes before the check is...