{"title":"Research of DTMF dialing system based on the goertzel algorithm and MATLAB simulation","authors":"L. Yuying","doi":"10.1109/ITAIC.2014.7065012","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065012","url":null,"abstract":"The DTMF audio dialing signal is widely used in worldwide scope because of its high speed, easy automatic detection -, identification and extended telephone service. With new theories and algorithms continue to appear, digital signal processing technologies have opened up a lot of new application fields. This paper gives DTMF signal generation scheme on the theoretical basis of digital signal D/A, A/D converting, deduces the modified Goertzel algorithm based on the digital signal processing's DFT algorithm, finishs the DTMF signal detection using the Goertzel algorithm filter banks, and finally, realizes MATLAB simulation of DTMF dialing system.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116894384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards feature subset selection in intrusion detection","authors":"I. Ahmad, Fazal e Amin","doi":"10.1109/ITAIC.2014.7065007","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065007","url":null,"abstract":"Intrusion is a serious issue in computer and network systems because a single intrusion can cause a heavy loss in few seconds. To prevent an intrusion, a robust intrusion detection system is highly needed. Existing intrusion detection techniques are not robust; the number of false alarms is high. One of the reasons of false alarms is due to the use of a raw dataset that includes redundancy. To overcome this issue, the recent approaches used (PCA) for feature subset selection where features are first transformed into an eigen space and then features are selected based on their variances (i.e. eigenvalues), but the features corresponding to the highest eigenvalues may not have the optimal sensitivity for the classifier. Instead of using traditional approach of selecting features with the highest eigenvalues, an optimization approach is needed because the selection of most discriminative subset of transformed features is an optimization problem. One research used genetic algorithm (GA) to search the most discriminative subset of transformed features which is evolutionary optimization approach. The particle swarm optimization (PSO) is another optimization approach based on the behavioral study of animals/birds that outperforms GA in some applications. Therefore, the PSO based method is proposed in feature subset selection in this research work.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127454390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a hybrid approach of primitive cognitive network process and weighted iterative dichotomiser 3 for customer e-payment adoption analysis","authors":"Joyce Wenting Su, K. Yuen","doi":"10.1109/ITAIC.2014.7065038","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065038","url":null,"abstract":"Attracting customers to use e-payment is the critical success factor for the e-business transaction. Various factors influence the customers to adopt e-Payment. A hybrid approach of Primitive Cognitive Network Process (PCNP) and Weighted Iterative Dichotomiser Three (WID3) is proposed to classify the factors which influence the customer e-payment adoptions. Whilst PCNP is a revised approach of Analytic Hierarchy Process (AHP) to quantify the weights of factors, WED3 is the classification approach combining the weighted factors to the classical ID3 to classify data into distinct groups. An application shows the proposed approach could identify the patterns of customer e-Payment adoption, and predict the potential customer adoption behaviour.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125515771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyper-network multi agent model for military system and its use case","authors":"Zhu Jiang, Du Wei, Zhao Shu-chun, L. Dawei","doi":"10.1109/ITAIC.2014.7065070","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065070","url":null,"abstract":"Military network is believed to be a complex system, which is composed of several entity nodes, physical or logic relationships and flows. Our research focuses on the needs for modeling such network. After analyzing the properties of network, hyper network modeling method was naturally used to express the military network from quantitative view. First, several layers called social task layer, command control layer and physical resource layer are set up in this model and the relationship and interaction between network is normalized through the formalization description. Then, by combining hyper-network with MAS(multi-agent system), a hyper network agent model method was proposed. Which at the micro level, the network properties were extended into entity properties; and at the macro level, the evolution behavior of overall network was taken into account? The model regulates and reflects the interaction and dynamics of network with combination of emerge behavior brought from entity relationship, and driving efficiency caused by overall network characteristic. Lastly, key technologies of model are discussed. The testing bed made by this model provides a new tool for military organization design.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welding line detection based on image for automatic welding machine","authors":"Guangyuan Zhang, Zhengfang Zhu, Guannan Si, Xiaolin Wei","doi":"10.1109/ITAIC.2014.7065014","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065014","url":null,"abstract":"This article uses the original weld images as the research object. The OpenCV library is used in developing the weld image edge detection algorithm as the basic function library. Our research use gray transform filter as the pre-processing. The Canny operator is used as the edge detector to detecting the weld edge, and the Hough transform algorithm is used to detecting the welding line. Line location algorithm is used to geting the weld centerline location. By detecting and tracking the welding line, the welding machine can realize the automatic weld processing with well welding speed and high welding precision.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and performance analysis of scheduling system for cloud service based on stochastic network calculus","authors":"Yan-bing Liu, L. Lang","doi":"10.1109/ITAIC.2014.7065095","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065095","url":null,"abstract":"In the background of cloud service is widely used, performance of the network has become more and more important, therefore the ability to guarantee the QoS of cloud networks is an important and essential part. To meet the demand for the QoS of cloud service network, we need an effective scheduling model to reach the user's requirements, and a tool to calculate the theoretical bounds of QoS parameters. As a tool for network analysis which is still evolving, stochastic network calculus is the theory to analysis the stochastic network service systems. We propose an efficient scheduling method of multiple priorities and differentiated services to reach users' expectations, and use stochastic network calculus to analyze the QoS parameters of cloud service network, it is proved that this scheduling method can meet the needs of different users of the network.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126696108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingfeng Zhang, Weilong Chu, Changhong Ji, Chengyuan Ke, Yamei Li
{"title":"An implementation of generic augmented reality in mobile devices","authors":"Qingfeng Zhang, Weilong Chu, Changhong Ji, Chengyuan Ke, Yamei Li","doi":"10.1109/ITAIC.2014.7065112","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065112","url":null,"abstract":"There are two problems in the existing mobile augmented reality (MAR) system, one is the difficulty in developing and the other is the lack of versatile AR observer. To address them, a generic MAR framework was proposed in the paper, which contains three components: a versatile observer which is run on smart mobile device to see the AR effect produced by MAR application, an MAR server that provides network and data service for the MAR application, and an MAR application customizer which is used by developers to tailor their desired applications. The Vuforia SDK is used to implement the observer, and the XML technology is applied to achieve the goal of customizing MAR application. The generic framework enables developers to do code-free development, and provides the convenience of observing different MAR applications by one MAR observer. The experimental results show that this framework reduces the difficulty and time in developing AR application and makes it easy to observing AR effects by users.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new outlier detection algorithm and its application in intelligent transportation system","authors":"Gao Lin, Liu Xin, Han Feng, Liu Ying","doi":"10.1109/ITAIC.2014.7065088","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065088","url":null,"abstract":"Outlier detection plays an important role for data analysis in data mining. Aiming at outlier characters of Intelligent Transportation System (ITS) such as few samples, high frequency and large range, a new outlier detection algorithm based on probability theory and fuzzy clustering method (FCM) is proposed. Firstly, the new algorithm judges data variation, and then clusters data using FCM. Finally, the outlier detection result is given through estimating clustering result using probability theory. Detection of practical travel time verifies validity and practicability of the new algorithm.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116480005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed neighborhood sphere and pattern selection in SVDD","authors":"Dongyin Pan","doi":"10.1109/ITAIC.2014.7065065","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065065","url":null,"abstract":"For the problem of a large dataset, we need to select a subset to represent the original dataset. Many scholars do pattern selection from the problem of the kNN (k-nearest neighbors). The distribution of a pattern's neighbors is usually uneven. In this paper, we define a fixed neighborhood sphere. When the pattern locates near the boundary of the data distribution, there will be fewer neighbors in the neighborhood sphere and when the pattern locates within the data distribution, there will be more neighbors in the neighborhood sphere. According to gather the statistic of the neighbors in a fixed neighborhood sphere, we can find those patterns locating near the boundary of the data distribution. In SVDD (Support Vector Data Description), those patterns are locating near the boundary of the data distribution have more information. They are those patterns which would be support vectors. We can use FNSPS (fixed neighborhood sphere pattern selection) algorithm to select those patterns, which locate near the boundary of the data distribution. The experimental results show that the performance of the SVDD will not go bad. The time complexity of the naive identifying the neighbors in the fixed neighborhood sphere is O(n2). And the time complexity of the SVDD is O(n3). If we set a lower threshold, the FNSPS algorithm can also be used to remove the noise in the targets.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One intelligent algorithm for estimation of TDOA and FDOA","authors":"Zhiyu Lu, Jian Hui Wang, Da Wang, Yue Wang","doi":"10.1109/ITAIC.2014.7065099","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065099","url":null,"abstract":"The calculation is large to estimate the TDOA and FDOA with cross ambiguity function. Existing algorithms which are based on the ergodic theory have poor real-time performance. To solve this problem, the genetic algorithm is proposed with improvements based on the characteristics of cross ambiguity function. With the self-adapting mutation probability by following the convergence extent of the population and multiple population initializations, the diversity of the population is effectively improved to prevent the algorithm into a local optimum. The simulation results show that the computational efficiency of the improved algorithm, compared with the existing algorithms, is greatly improved, and the TDOA/FDOA estimation results can quickly be obtained.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}