2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)最新文献

筛选
英文 中文
Semi-supervised Learning Using Incremental Polynomial Classifier and Extreme Value Theory 基于增量多项式分类器和极值理论的半监督学习
Husam Al-Behadili, A. Grumpe, C. Wohler
{"title":"Semi-supervised Learning Using Incremental Polynomial Classifier and Extreme Value Theory","authors":"Husam Al-Behadili, A. Grumpe, C. Wohler","doi":"10.1109/AIMS.2015.60","DOIUrl":"https://doi.org/10.1109/AIMS.2015.60","url":null,"abstract":"The data in many real-world applications are streamed continuously which causes a variety of problems, e.g. Infinitely long data streams, concept drift, on-line or real-time classification and noise or outlier samples. To overcome these problems, the classifier should be updated continuously and it should have the ability to detect outliers. Since the size of the data set is growing with the duration of the data stream, the classifier should be updated incrementally without storing the whole training set. We present a polynomial classifier that efficiently detects the outliers using the extreme value theory in combination with confidence band intervals derived from regression techniques. All parameters are updated incrementally without requiring the old data. This approach makes the classifier suitable for on-line classification, since the processing time of the update is negligible with respect to the time required for processing the full training data set. In contrast to other novelty detection algorithms which work only with one-class systems, the proposed method can be applied in multi-class systems. The proposed algorithm is evaluated on an unbalanced multi-class gesture database. A comparison of the proposed method with the support vector data description classifier shows that it has superior properties.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Redesign of Grashof Incubator Concerning the Alternative Heating System and the Ergonomic Aspect 从替代加热系统和人体工程学角度对Grashof培养箱进行重新设计
B. Arthaya, C. Tesavrita, Priyatna Permana
{"title":"The Redesign of Grashof Incubator Concerning the Alternative Heating System and the Ergonomic Aspect","authors":"B. Arthaya, C. Tesavrita, Priyatna Permana","doi":"10.1109/AIMS.2015.86","DOIUrl":"https://doi.org/10.1109/AIMS.2015.86","url":null,"abstract":"Delivering neonatal babies is still happening in Indonesia and low incomes families often cannot afford to buy/rent baby incubators during the baby critical growing period. Charity groups are lending electrically driven Grashof incubators freely to whom that have financial difficulties. Free incubator still does not immediately solve the problem of the families as nowadays supply of electricity from our Indonesian State Electricity Company to some areas is not delivered constantly. As a result, electricity blackout appears frequently especially at under developed regions even in Jakarta regions.This issue makes such a tremendous anxiety for those families as the incubators heating system cannot work properly.Redesigning of heating system of the incubator will be the solution to the problem. The redesign is to find alternative energy sources that maintain cabin temperature when electricity is out. The new alternative energy a heat exchanger based on hot water flowing in a tubular heating system. The usability of the device is to be considered due to the current device cannot be suitably operated by common people, where some difficulties still appear when operating of the unit. The incubator must also be confidently safe for the neonatal babies and their parents.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Quality of Service Using R-AODV Protocol in MANETs 在manet中使用R-AODV协议提高服务质量
S. Biradar, P. Kulkarni
{"title":"An Improved Quality of Service Using R-AODV Protocol in MANETs","authors":"S. Biradar, P. Kulkarni","doi":"10.1109/AIMS.2015.69","DOIUrl":"https://doi.org/10.1109/AIMS.2015.69","url":null,"abstract":"Mobile ad hoc Networks (MANETs) is a type of wireless ad hoc network which is a self-arranging network of mobile nodes connected by wireless links that create a discretionary topology. The mobile nodes are free to move randomly and to arrange themselves in a random manner. Thus, the wireless ad hoc network topology may expand rapidly and unpredictably. In Mobile ad hoc networks, the routing protocol plays an important role for improving Quality of Service (QoS). There are many different types of routing protocols such as reactive, proactive, and hybrid. In reactive routing protocol, AODV is a one which establishes routes on-demand, as they are needed. In this paper, we proposed a new routing protocol called Reverse Ad hoc On-Demand Distance Vector (R-AODV) routing which reduces route path fail correction messages and gives better performance than the original AODV routing protocol with respect to set of performance metric such as packet delivery ratio, throughput, energy consumption, and overhead under different pause time. We designed the R-AODV routing protocol and implemented with certain simulation parameters using Network Simulator (NS-2) tool. The performance analysis of routing protocol designed for wireless networks has been very challenging. Hence, simulations are always utilized to obtain the desired performance results.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling and Simulation Study for Dynamic Model of Brushless Doubly Fed Reluctance Machine Using Matlab Simulink 基于Matlab Simulink的无刷双馈磁阻电机动态模型建模与仿真研究
W. K. Song, D. Dorrell
{"title":"Modeling and Simulation Study for Dynamic Model of Brushless Doubly Fed Reluctance Machine Using Matlab Simulink","authors":"W. K. Song, D. Dorrell","doi":"10.1109/AIMS.2015.66","DOIUrl":"https://doi.org/10.1109/AIMS.2015.66","url":null,"abstract":"The Brushless Doubly Fed Reluctance Machine (BDFRM) is a type variable speed machine with two sets of windings. One set is fed from a variable frequency inverter while the second set is fed at constant frequency. Comparing with the traditional induction machine, BDFRM has simple structure and higher efficiency, higher power density, smaller size and lower maintenance cost. So, it is important to build an accurate dynamic model of BDFRM for many control method studies. This paper presents mathematical model for a dynamic model of BDFRM using d-q reference coordination system and the simulation model be designed on Matlab/Simulink®.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Optimizing of LTE System Performance for SISO and MIMO Modes 基于SISO和MIMO模式的LTE系统性能优化研究
Ali Abdulqader Bin Salem, Yung-Wey Chong, Sabri M. Hanshi, T. Wan
{"title":"On the Optimizing of LTE System Performance for SISO and MIMO Modes","authors":"Ali Abdulqader Bin Salem, Yung-Wey Chong, Sabri M. Hanshi, T. Wan","doi":"10.1109/AIMS.2015.71","DOIUrl":"https://doi.org/10.1109/AIMS.2015.71","url":null,"abstract":"Packet size and modulation scheme can play an important role on optimizing the data rate of Long Term Evolution (LTE) system. The performance of the existing LTE system is evaluated in this paper in term of throughput and packet loss for Orthogonal Frequency-Division Multiple Access (OFDMA) modulation scheme with different packet sizes. The performance of LTE system for different packet size is done. The simulation experiments are done using Mat lab and Simulink libraries. The results show and discuss the effects of packet size and adaptation modulation on the performance of LTE based on throughput and packet loss. Moreover, the Signal-to-noise ratio (SNR) threshold values can be optimized in order to enhance the performance of LTE system. Experiments of packet loss illustrated that it is possible to get an accepted Packet Error Rate (PER) before reaching to SNR threshold values by enhancing an optimizing technique such as Markov Decision Process (MDP).","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128268190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Local Binary Patterns for Digital Image Watermarking 数字图像水印的局部二值模式
S. Chalamala, K. Kakkirala
{"title":"Local Binary Patterns for Digital Image Watermarking","authors":"S. Chalamala, K. Kakkirala","doi":"10.1109/AIMS.2015.34","DOIUrl":"https://doi.org/10.1109/AIMS.2015.34","url":null,"abstract":"In this paper we describe a novel digital image watermarking method using local binary patterns (LBP). Local binary patterns are known for their robust texture describing capabilities and digital watermarking used in proving the ownership of a multimedia content. In this work we propose a LBP synthesis or inverse LBP matching process and its applicability to digital image watermarking. LBP synthesis process changes the neighborhood pixels values, so that the LBP computed from these pixels is the value we want to synthesize. This process takes into account the requirements of a digital image watermarking such as imperceptibility and robustness to watermark removal attacks. Because of the nature of LBP synthesis it is required that only few pixels of a given block are modified to embed watermark. The simulation results show that the method is robust to JPEG compression, rotation and scaling attacks. This LBP synthesis process could also be used to watermark sensor data for proving the ownership. We are confident that this work would lead to a new research direction in authentication of digital content.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Integration of Fuzzy C-Means with Correlation Template and Active Contour for Brain Lesion Segmentation in Diffusion-Weighted MRI 模糊c均值与相关模板和活动轮廓的融合在弥散加权MRI脑损伤分割中的应用
A. F. Muda, N. Saad, N. Waeleh, A. Abdullah, Low Yin Fen
{"title":"Integration of Fuzzy C-Means with Correlation Template and Active Contour for Brain Lesion Segmentation in Diffusion-Weighted MRI","authors":"A. F. Muda, N. Saad, N. Waeleh, A. Abdullah, Low Yin Fen","doi":"10.1109/AIMS.2015.88","DOIUrl":"https://doi.org/10.1109/AIMS.2015.88","url":null,"abstract":"This study proposed automatic detection and segmentation of brain lesion in diffusion-weighted magnetic resonance images (DWI) based on Fuzzy C-Means (FCM). Due to noises and intensity inhomogeneity, FCM technique fails in producing accurate results. Active contour and correlation template are integrated to overcome this problem. The brain lesions are acute stroke and solid tumor foe hyperintense lesions, and necrosis and chronic stroke for hypointense lesions. The proposed analysis framework has been validated by using Jaccard (AO), Dice, false negative rate (FNR) and false positive rate (FPR). FCM with correlation template provides more accurate results compared with FCM with active contour. The results are 0.547, 0.258, 0.192 and 0.687 for Jaccard, FPR, FNR and Dice indices. This method also can segment the lesions precisely.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimizing Cluster of Questions by Using Dynamic Mutation in Genetic Algorithm 基于动态变异遗传算法的问题聚类优化
Nur Suhailayani Suhaimi, Siti Nur Kamaliah, N. Arbin, Z. Othman
{"title":"Optimizing Cluster of Questions by Using Dynamic Mutation in Genetic Algorithm","authors":"Nur Suhailayani Suhaimi, Siti Nur Kamaliah, N. Arbin, Z. Othman","doi":"10.1109/AIMS.2015.81","DOIUrl":"https://doi.org/10.1109/AIMS.2015.81","url":null,"abstract":"Clustering dynamic data is a challenge in identifying and forming groups. This unsupervised learning usually leads to indirect knowledge discovery. The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures.Optimizing the clustered data with certain fixed values could be an issue. Depending on the parameters and attributes of the data, the results yielded probably either stuck in local optima or bias by attributes pattern. Performing Genetic Algorithm in the data cluster may increase the probability of the questions being clustered in the optimal group cluster. Dynamic Mutation in Genetic Algorithm used as repair mechanism to ensure the cluster is optimized enough and produce optimum indexed questions set.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121439672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Tree: Review of Techniques for Missing Values at Training, Testing and Compatibility 决策树:训练、测试和兼容性缺失值技术回顾
Sachin Gavankar, S. Sawarkar
{"title":"Decision Tree: Review of Techniques for Missing Values at Training, Testing and Compatibility","authors":"Sachin Gavankar, S. Sawarkar","doi":"10.1109/AIMS.2015.29","DOIUrl":"https://doi.org/10.1109/AIMS.2015.29","url":null,"abstract":"Data mining rely on large amount of data to make learning model and the quality of data is very important. One of the important problem under data quality is the presence of missing values. Missing values can occur in both at the time of training and at the time of testing. There are many methods proposed to deal with missing values in training data. Many of them resort to imputation techniques. However, Very few methods are there to deal with the missing values at testing/prediction time. In this paper, we discuss and summarize various strategies to deal with this problem both at training and testing time. Also, we have discussed the compatibility between various methods at training and testing to achieve better results.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Implementation of Greedy and Simulated Annealing Algorithms for Wireless Access Point Placement 贪婪和模拟退火算法在无线接入点布局中的实现
Nila Feby Puspitasari, Hanif Al Fatta, F. W. Wibowo
{"title":"Implementation of Greedy and Simulated Annealing Algorithms for Wireless Access Point Placement","authors":"Nila Feby Puspitasari, Hanif Al Fatta, F. W. Wibowo","doi":"10.1109/AIMS.2015.35","DOIUrl":"https://doi.org/10.1109/AIMS.2015.35","url":null,"abstract":"Optimization of the access point layout is one of the issues in the field of networking. This issue is relating to the layout of access point on the Wireless Fidelity (Wi-Fi) network that requires theoretical consideration and analysis. Because of these requirements, a good mechanism is applied in the minimizing aspects between both cost and time on the implementation of WiFi network that used by network designer to organize the layout of the access points in the proper place. In addition, the signal strength obtained by measuring of the two nodes using in SSIDer application and the parameter used to measure the signal strength is the value of RSSI (Receive Signal Strength Indication) generated by the receiver. Not only that aspects used in the implementation of optimal placement of wireless access point, but measurement of the propagation of Line of Sight (LoS) and propagation Non Line of Sight (NLoS) is also considered in the aspect of measurement. The data obtained from the measurements are used to model layout of the access point using Greedy and Simulated Annealing application which has been built and tested. The results determined by application are coverage area and the position coordinates of the wireless acces point.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132139912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信