{"title":"Eye Detection Algorithm on Facial Color Images","authors":"J. Nasiri, Sara Khanchi, H. Pourreza","doi":"10.1109/AMS.2008.55","DOIUrl":"https://doi.org/10.1109/AMS.2008.55","url":null,"abstract":"In many application suck as face detection or recognition a major phase would be eye detection. In addition, its wide use as a part of serious applications, made it an important task should be worked on. Using color characteristics is a useful way to detect eyes. We use special color space, YCbCr which its components give us worthwhile information about eyes. We make two maps according to its components and merge them to obtain a final map. Candidates are generated on this final map. We apply an extra phase on candidates to determine suitable eye pair. The extra phase consists of flexible thresholding and geometrical tests. Flexible thresholding makes generating candidates more carefully and geometrical tests allow proper candidates to be selected as eyes. Simulation results on CVI and Iranian Databases showed this phase improved the correct detection rate by about 12.4% and reach 98.5% success rate on the average.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Buffer Management Policy for Mars Intelligent Proximity Network","authors":"M. Prathaban, J. Kohlenberg","doi":"10.1109/AMS.2008.181","DOIUrl":"https://doi.org/10.1109/AMS.2008.181","url":null,"abstract":"Future Mars missions will require effective surface communications network supporting exploration activities and scientific field data collection. In order to meet the need for future Mars exploration missions, NASA has come up with various proximity networks. These proximity network are relatively small, fairly short-range, often ad hoc, wireless network typically dedicated to tasks such as transporting in site sensing data. This paper enlist the challenges in these proximity networks in general. We describe proximity network architecture with repeaters to increase the communication range of the Mars exploration rovers. We also describe the Mars reply protocol which make the network autonomous than remotely operated from Earth. In order to achieve data delivery in such challenging networking environments, researchers have proposed the use of store-carry-and-forward protocols. However, the buffer size in proximity network nodes (Mars rover for example) are unavoidably limited. Thus, efficient buffer management policies are necessary to decide which messages should be discarded, when node buffers are operated close to their capacity. In this paper, we have proposed buffer management policy for image data traffic. Using simulation we have shown that our buffer management policy provided optimal delivery ratio in all scenario when compared with other policies.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115743362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft Body Simulation with Leaking Effect","authors":"Jaruwan Mesit, R. Guha","doi":"10.1109/AMS.2008.85","DOIUrl":"https://doi.org/10.1109/AMS.2008.85","url":null,"abstract":"Though there is much research on physically-based animation of soft bodies, simulating soft body objects in real-time remains challenging problem. This paper presents an algorithm for simulating leaking effects in real-time soft body simulations where fast calculation is priority. To simulate leaking effects in a soft body, geometrical cases of broken springs are defined and an algorithm rearranges the topology of neighbors in which the broken springs are connected. Then, internal forces are applied to surface points to model the leaking effect and deform the soft body. Experiments show that the soft body objects with leaking effects can be realistically simulated at interactive speeds on common hardware.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors","authors":"M. Jazzar, A. Jantan","doi":"10.1109/AMS.2008.32","DOIUrl":"https://doi.org/10.1109/AMS.2008.32","url":null,"abstract":"Most of the intrusion detection sensors suffer from the high rate of fake alerts that the sensor produce. In this paper, we propose a new approach based on fuzzy cognitive maps (FCM) to reduce false alerts in SOM-based intrusion detection sensors. Initially, each neuron is mapped to its best matching unit in the self organizing map and then updated by the fuzzy cognitive map framework. This updating is achieved through the weights of the neighboring neurons. Based on the domain knowledge of network data (network packets) the SOM/FCM combination presents quantitative and qualitative matching correspondences which in turn reduce the number of suspicious neurons i.e. reduce the number of false alerts. This method work as a unique fuzzy clustering approach and we demonstrate its performance using DARPA 1999 network traffic data set.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Mathematic Model of Consciousness","authors":"Z. Yinsheng","doi":"10.1109/AMS.2008.54","DOIUrl":"https://doi.org/10.1109/AMS.2008.54","url":null,"abstract":"The thought referring homomorphism of a group to the model of transformation from physical structures to the psychological originated from Jean Piaget. How ever, Jean Piaget has not given a mathematic expression by which the psychological phenomena can be represented, and he has not taking the model as the common model of consciousness. In the paper, the homomorphic model of consciousness is given in a mathematic expression, by which the some important questions relevant to the consciousness are formalized and the answer can be acquired, the questions (with the followed answer solved by the homomorphic model of consciousness) are Chinese room argument, Turing machine question, Turing Test question, and about if animals have consciousness, in what the meaning of utilizing and making tools lies, if DNA and protein system have consciousness. And finally the paper concludes that consciousness exists when : (1) the units of system certainly map the entities outside the system; (2) the system operate by some rules; and (3) the rules certainly map some laws or relations in the entities. The essence of consciousness is certain correspondence between substance with some rules or laws.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"280 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Approaches for Oasis Desert Vegetation Information Abstraction Based on Medium-Resolution Lansat TM Image: A Case Study in Desert wadi Hadramut Yemen","authors":"A. Almhab, I. Busu","doi":"10.1109/AMS.2008.143","DOIUrl":"https://doi.org/10.1109/AMS.2008.143","url":null,"abstract":"This paper present two issues namely; firest is oasis desert brightness inversion correction, and secondly, the classifying method of oasis desert vegetation through remote sensing image data. Oasis desert brightness inversion is known reduce the classification accuracy in medium-resolution images. In this study, the radiation correction and the brightness inversion adjustment models was analysis. The model's parameters were obtained from the image pixel values. The result of brightness inversion correction shows that the model can correct oasis desert brightness inversion. After brightness inversion correction, the vegetation's pixel value in brightness inversion area is similar with the pixel value of vegetation in other area. Brightness inversion correction increases classification accuracy. In the second part of this study, three methods are studied to derive oasis desert vegetations information, including vegetation index method, back propagation neural network method, and texture method. Three methods' classification accuracies are calculated and appraised. And a conclusion is drawn, which is the texture classification method is a good classification method. The accuracy of texture classification method can reach up to 82.31%.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124728200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Simulating Chopping Process Using Workspace5","authors":"Z. Sukimin, H. Haron","doi":"10.1109/AMS.2008.74","DOIUrl":"https://doi.org/10.1109/AMS.2008.74","url":null,"abstract":"Simulation and visualization have been developed for the ease of the chopping process. This project is chosen based on the analysis that had been done at the organization where the work of chopped product is done manually using human workforce. The problem that happened here is human workforce will easily get tired and bored with the repeating work. Measurement of the product is also conducted manually. Therefore, the productivity is affected due the manual measurement. The project objective is to overcome the problems by designing and simulating a Cartesian robot to perform the chopping task The result from the simulation shows that the chopping process can be perform effectively and give accurate measurement of the product. In simulating the proposed Cartesian robot, it is suitable with the chopping process. The software used in this project is Workspaces.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bipartite Graph for Protein Structure Matching","authors":"Fazilah Othman, R. Abdullah, R. A. Salam","doi":"10.1109/AMS.2008.89","DOIUrl":"https://doi.org/10.1109/AMS.2008.89","url":null,"abstract":"Bipartite graph-based matching technique has a powerful ability to give a global and optimized matching result. At the same time, we can take the advantage of graph-based data representation used with the technique. Graph-based representation has the ability to encapsulate the attribute of the objects and also the relationship details among the elements of the compared objects. The combination of graph-based matching technique and graph-based data structure are best applied in protein tertiary structure matching because protein structure has rich information that needs to be handled with care. The main contribution of the paper is (1) to design bipartite graph matching for protein matching and also (2) to incorporate graph-based data structure called 'reference frame' originally used in computer vision into bipartite graph matching. The matching result is measured using exponential similarity function.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of a Kraft Pulping System: Using Particle Swarm Optimization and Differential Evolution","authors":"M. Pant, R. Thangaraj, A. Abraham","doi":"10.1109/AMS.2008.123","DOIUrl":"https://doi.org/10.1109/AMS.2008.123","url":null,"abstract":"Expectation of profit is the economic driving force motivating business activity in a free-enterprise economy. An increase in this profit for a given organization can be accomplished by discovering and following any of a number of courses of improved action. This paper presents an economic optimization of a hypothetical but realistic Kraft pulping system, which forms an integral part of a Pulp and Paper industry, using Particle Swarm Optimization (PSO) and Differential Evolution (DE). Simulation results obtained are comparable (and are slightly better) with the given results which show that these algorithms are quite competent for solving large scale industrial optimization problems in a very small time.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling Database Security through Agent-Based Simulation","authors":"R. Chiong, Sandeep Dhakal","doi":"10.1109/AMS.2008.164","DOIUrl":"https://doi.org/10.1109/AMS.2008.164","url":null,"abstract":"This paper presents an implementation on modelling the database security using agent-based simulation (ABS). While ABS has been widely used for social simulations since the 1990s, not many previous studies have tried simulating scenarios in more technical domains and it is the main objective of this work to fill in the gap. We develop a database security simulation program that includes permission rules and immediate fixing of corrupted data. We show that when privileges are selectively granted based on certain rules and regulations, database security can be dramatically improved. We also demonstrate that if corrupted data are fixed immediately, the database will not collapse. In the concluding remarks, we present our observation on the advantages of ABS.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123008067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}