2008 Second Asia International Conference on Modelling & Simulation (AMS)最新文献

筛选
英文 中文
Trajectories Planning in Presence of Obstacles for Manipulator Robots 机械臂机器人存在障碍物时的轨迹规划
A. Hentout, B. Bouzouia, Z. Toukal
{"title":"Trajectories Planning in Presence of Obstacles for Manipulator Robots","authors":"A. Hentout, B. Bouzouia, Z. Toukal","doi":"10.1109/AMS.2008.64","DOIUrl":"https://doi.org/10.1109/AMS.2008.64","url":null,"abstract":"The problem of trajectories planning for manipulator robots in workspaces clustered with static obstacles is described as NP-hard. This pushed many researchers to adopt simplifying assumptions and consequently, to develop resolution methods dedicated to particular cases. In this article, we propose a general methodology, which deals with the problem by taking into account a large range of imposed constraints. The suggested methodology consists, initially, on finding a collision-free path connecting the initial to the final position, from a roadmap built offline, in a random way in the free C-space of the robot. Finally, the found path is injected into a stochastic optimization procedure based on cubic splines.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulative Performance Evaluation of Information Retrieval Systems 信息检索系统的仿真性能评估
D. Geetha, G. K. Naidu, T. Kumar, K. R. Kanth
{"title":"Simulative Performance Evaluation of Information Retrieval Systems","authors":"D. Geetha, G. K. Naidu, T. Kumar, K. R. Kanth","doi":"10.1109/AMS.2008.153","DOIUrl":"https://doi.org/10.1109/AMS.2008.153","url":null,"abstract":"The information explosion across the Internet and elsewhere offers access to an increasing number of document collections. Retrieval system evaluation plays an important role in judging the efficiency and effectiveness of the retrieval process. Validating the performance of information retrieval systems provides assurance that a system as a whole is likely to meet its quantitative performance goals. In this paper, we describe procedure to calculate the response time early in the life cycle and simulate the performance metrics for an information retrieval system in different architectures namely, centralized and distributed. We consider different characterizations for the hardware resources' configurations and simulate the results for two different architectures of Information retrieval systems.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129292378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantic Mining for Language Text Analysis 用于语言文本分析的语义挖掘
Natalie Eve Akam, D. Al-Dabass
{"title":"Semantic Mining for Language Text Analysis","authors":"Natalie Eve Akam, D. Al-Dabass","doi":"10.1109/AMS.2008.174","DOIUrl":"https://doi.org/10.1109/AMS.2008.174","url":null,"abstract":"Recent work into knowledge-mining algorithms has found that second order models can be used to approximate the inputs to systems by first calculating their time trajectories, and then obtaining the causal parameters of these trajectories. In this paper a new method of text analysis is proposed, and the application of knowledge-mining algorithms to text analysis is investigated. Mathcad is used to model relevant knowledge mining algorithms and test their performance with signals derived from ASCII codes of text excerpts. For the first time, time-varying signals relating to a series of input values have been analysed with knowledge mining algorithms. The Mathcad program which does this has been embedded into a user interface in MS Access to allow ease of text selection by users and automatic calculation of ASCII values for analysis.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybridization Model of Linear and Nonlinear Time Series Data for Forecasting 线性与非线性时间序列数据的杂交预测模型
R. Sallehuddin, S. Shamsuddin, S. Hashim
{"title":"Hybridization Model of Linear and Nonlinear Time Series Data for Forecasting","authors":"R. Sallehuddin, S. Shamsuddin, S. Hashim","doi":"10.1109/AMS.2008.142","DOIUrl":"https://doi.org/10.1109/AMS.2008.142","url":null,"abstract":"The aim of this paper is to propose a novel approach in hybridizing linear and nonlinear model by incorporating several new features. The intended features are multivariate information, hybridization succession alteration, and cooperative feature selection. To assess the performance of the proposed hybrid model allegedly known as Grey Relational Artificial Neural Network (GRANN_ARIMA), extensive comparisons are done with individual model (Artificial Neural Network (ANN), Autoregressive integrated Moving Average (ARIMA) and Multiple Linear Regression (MR)) and conventional hybrid model (ARIMA_ANN) with Root Mean Square Error (RMSE), Mean Absolute Deviation (MAD), Mean Absolute Percentage Error (MAPE) and Mean Square error (MSE). The experiments have shown that the proposed hybrid model has outperformed other models with 99.5% forecasting accuracy for small-scale data and 99.84% for large-scale data. The obtained empirical results have also proved that the GRANN-ARIMA is more accurate and robust due to its promising performance and capability in handling small and large scale time series data. In addition, the implementation of cooperative feature selection has assisted the forecaster to automatically determine the optimum number of input factor amid with its importantness and consequence on the generated output.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Novel Approach for Intelligent Route Finding through Cumulative Proximity Evaluation 一种基于累积接近度评价的智能寻路方法
Yang Yaw Chang, S. Yung, R. Chiong
{"title":"A Novel Approach for Intelligent Route Finding through Cumulative Proximity Evaluation","authors":"Yang Yaw Chang, S. Yung, R. Chiong","doi":"10.1109/AMS.2008.163","DOIUrl":"https://doi.org/10.1109/AMS.2008.163","url":null,"abstract":"Today, the increased traffic and complex modern road network have made finding a good route from one location to another a non-trivial task. Many search algorithms have been proposed to solve the problem, and the most well-known being Dijkstra's algorithm, Johnson's algorithm and A*. While these algorithms are effective for path finding, they are wasteful in terms of computation. In this paper, we present a study to examine both uninformed search and heuristic search based on some major cities and towns in Borneo Island. We propose a novel algorithm for intelligent route finding using better evaluation criteria and the notion of cumulative proximity score. We show that this proposed technique is able to reduce the time and space required in computation, and also produce better result in terms of a.ccuracy and shortness of path found.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Performance Study of Two Genetic Algorithm Approaches for VLSI Macro-Cell Layout Area Optimization 超大规模集成电路宏单元布局面积优化的两种遗传算法性能研究
H. Rahim, A. Rahman, R. Ahmad, W. Ariffin, Muhammad Imran Ahmad
{"title":"The Performance Study of Two Genetic Algorithm Approaches for VLSI Macro-Cell Layout Area Optimization","authors":"H. Rahim, A. Rahman, R. Ahmad, W. Ariffin, Muhammad Imran Ahmad","doi":"10.1109/AMS.2008.117","DOIUrl":"https://doi.org/10.1109/AMS.2008.117","url":null,"abstract":"Very large scale integrated (VLSI) design has been the subject of much research since the early 1980s where the VLSI cell placement emerges to be a crucial stage in the chip design. Its area optimization is very important in order to reduce the delay and include more functionalities to the designed chip. The VLSI cell area optimization continues to become increasingly important to the performance of VLSI design due to the accelerating of the design complexities in VLSI. Thus, this paper addresses the performance comparisons of two different types of genetic algorithm (GA) techniques for VLSI macro-cell layout area optimization by utilizing the adopted method of cell placement that is binary tree method. Two GA approaches which are simple genetic algorithm (SGA) and steady-state genetic algorithm (SSGA) have been implemented and their performances in converging to their global minimums are examined and discussed. The performances of these techniques are tested on Microelectronics Center of North Carolina (MCNC) benchmark circuit's data set. The experimental results demonstrate that both algorithms achieve acceptable area requirement compared to the slicing floorplan approach (Lin et al., 2002). However, SSGA outperforms SGA where it achieves faster convergence rate and obtains more near optimum area.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Vibration Suppression Techniques in Feedback Control of a Very Flexible Robot Manipulator 一种非常柔性机器人机械臂反馈控制中的振动抑制技术
Mohd Ashraf Ahmad, Z. Mohamed, H. Ishak, A. Nasir
{"title":"Vibration Suppression Techniques in Feedback Control of a Very Flexible Robot Manipulator","authors":"Mohd Ashraf Ahmad, Z. Mohamed, H. Ishak, A. Nasir","doi":"10.1109/AMS.2008.58","DOIUrl":"https://doi.org/10.1109/AMS.2008.58","url":null,"abstract":"This paper presents the use of angular position control approaches for a flexible robot manipulator with disturbances effect in the dynamic system. Delayed Feedback Signal (DFS) and Proportional-Derivative (PD) controller are the techniques proposed in this investigation to actively control the vibrations of flexible structure. A constrained planar single-link flexible manipulator is considered and the dynamic model of the system is derived using the assume mode method. A complete analysis of simulation results for each technique is presented in time domain and frequency domain respectively. Performances of the controller are examined in terms of vibration suppression and disturbances cancellation. Finally, a comparative assessment of the impact of each controller on the system performance is presented and discussed.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132118312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Probabilistic Approach for Network Intrusion Detection 一种网络入侵检测的概率方法
Kok-Chin Khor, Choo-Yee Ting, S. Phon-Amnuaisuk
{"title":"A Probabilistic Approach for Network Intrusion Detection","authors":"Kok-Chin Khor, Choo-Yee Ting, S. Phon-Amnuaisuk","doi":"10.1109/AMS.2008.92","DOIUrl":"https://doi.org/10.1109/AMS.2008.92","url":null,"abstract":"This study aims to propose a probabilistic approach for detecting network intrusions using Bayesian networks (BNs). Three variations of BN, namely, naive Bayesian network (NBC), learned BN, and handcrafted BN, were evaluated and from which, an optimal BN was obtained. A standard dataset containing 494020 records, a category for normal network traffics, and four major attack categories (denial of service, probing, remote to local, user to root and normal), were used in this study. The dataset went through an 80-20 split to serve the training and testing phases. 80% of the dataset were treated with a feature selection algorithm to obtain a set of features, from which the three BNs were constructed. During the evaluation phase, the remaining 20% of the dataset were used to obtain the classification accuracies of the BNs. The results show that the hand-crafted BN, in general, has outperformed NBC and Learned BN.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130208574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Internet Attack Methods and Internet Security Technology 网络攻击方法与网络安全技术
Olalekan Adeyinka
{"title":"Internet Attack Methods and Internet Security Technology","authors":"Olalekan Adeyinka","doi":"10.1109/AMS.2008.68","DOIUrl":"https://doi.org/10.1109/AMS.2008.68","url":null,"abstract":"The Internet is a complex and dynamic environment in terms of both topology and emerging technology. In such an environment, security measures applied for small well-defined networks cannot work effectively. The lack of adequate knowledge and understanding of software and security engineering leads to security vulnerabilities, e.g. by inappropriate programming, getting even worse under deadline pressure and rush-to-market issues. Some solution may be effective today, but as technology changes, new risks and challenges appear. Moreover, different solutions must be combined to be effective against different types of attacks and the security of the system must be constantly monitored. This paper investigates common Internet attack methods and different Internet security technologies.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment HiNFRA:层次神经模糊学习在线风险评估
K. Haslum, A. Abraham, S. J. Knapskog
{"title":"HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment","authors":"K. Haslum, A. Abraham, S. J. Knapskog","doi":"10.1109/AMS.2008.120","DOIUrl":"https://doi.org/10.1109/AMS.2008.120","url":null,"abstract":"Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPPS sensors, instead of merely preventing the attackers or blocking traffic, we propose a fuzzy logic based online risk assessment scheme. This paper propose a Hierarchical Neuro-Fuzzy online Risk Assessment (HiNFRA) model to aid the decision making process of a DIPPS. The fine tuning of fuzzy logic based risk assessment model is achieved using a neural network learning technique. Preliminary results indicate that the neural learning technique could improve the fuzzy controller performance and make the risk assessment model more robust.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信