2011 First International Conference on Informatics and Computational Intelligence最新文献

筛选
英文 中文
On the Problem of Delay and Packet Dropout in Networked Adaptive Systems 网络自适应系统中的延迟和丢包问题
K. George, M. Krishnapur, R. Makam
{"title":"On the Problem of Delay and Packet Dropout in Networked Adaptive Systems","authors":"K. George, M. Krishnapur, R. Makam","doi":"10.1109/ICI.2011.35","DOIUrl":"https://doi.org/10.1109/ICI.2011.35","url":null,"abstract":"The principal objectives in this paper are to achieve output tracking when the given unknown plant is part of a networked system and to simultaneously address the effects of both network-induced delay and packet dropout. It is demonstrated that an intelligent use of available information is sufficient to mitigate the effects of both delay and packet dropout. Specifically, we use locally available estimate of the output in lieu of the actual output whenever necessary for the dual purpose of identifying the plant and to determine the appropriate control law for tracking desired trajectories.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114674132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Probabilistic Analysis of Onion Routing Networks Using PRISM 基于PRISM的洋葱路由网络概率分析
M. Adithia
{"title":"Probabilistic Analysis of Onion Routing Networks Using PRISM","authors":"M. Adithia","doi":"10.1109/ICI.2011.42","DOIUrl":"https://doi.org/10.1109/ICI.2011.42","url":null,"abstract":"People require privacy when doing transaction via Internet connection. For example, some people do not want other people to know what web page they request. Anonymous cash is not anonymous anymore if the channel used for the connection identifies the identity of the participating entities. Email users sometimes want to hide their email addresses. These days, the Internet does not really care about privacy. Encryption is provided to protect privacy, but it only protects the content of a transaction. Thus an eavesdropper can still learn the IP addresses of the internet users to infer their identities. Special networks, called the anonymity network, were created to protect privacy, especially the identities of the entities participating in a communication via Internet connections. This paper discusses probabilistic analysis of the anonymity provided by anonymity networks, namely Onion Routing, by using a model-checker tool called PRISM.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aspects of a Standardized Automated System for Screening Children's Handwriting 筛选儿童笔迹的标准化自动化系统的各个方面
R. Sudirman, Narges Tabatabaey-Mashadi, I. Ariffin
{"title":"Aspects of a Standardized Automated System for Screening Children's Handwriting","authors":"R. Sudirman, Narges Tabatabaey-Mashadi, I. Ariffin","doi":"10.1109/ICI.2011.19","DOIUrl":"https://doi.org/10.1109/ICI.2011.19","url":null,"abstract":"Perceptual and practical aspects of child's drawing and handwriting, plus the importance of early identification of developmental disorders in children, arise the essential need for screening pupils' handwritings, testing their handwriting abilities and readiness. This research summarizes approaches in an automated screening system that can assist teachers, occupational therapist and psychologists monitor pupils for difficulties that result in improper handwriting. The following clarifies its importance and effects, discusses its aspects of system implementation and resources needed, plus its prospect benefits and outcomes. This new insight to children's handwriting assessment and screening systems provides new openings to targeted research in several fields of study interrelated to this issue. Ultimate system will in fact benefit educational system and public health in addition to generation of new knowledge about complicated human performances, children development and different languages inspirations. In the following, shortcoming in handwriting standards are mentioned, position features are introduced and global features are discussed. Multi-feature acquisition and fusion in different levels are considered in system implementation.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Maximizing the Effectiveness of Human Resources in the Context of Project Scheduling by an Evolutionary Algorithm 基于进化算法的项目调度中人力资源效率最大化
V. Yannibelli, Analía Amandi
{"title":"Maximizing the Effectiveness of Human Resources in the Context of Project Scheduling by an Evolutionary Algorithm","authors":"V. Yannibelli, Analía Amandi","doi":"10.1109/ICI.2011.41","DOIUrl":"https://doi.org/10.1109/ICI.2011.41","url":null,"abstract":"In this paper, we address the project scheduling problem to assist project managers at the early stage of scheduling. Thus, as part of the problem, we consider a priority optimization objective for managers at that stage. This objective involves assigning the most effective set of human resources to each project activity. We consider that the effectiveness of a human resource depend on its work context. To solve the problem, we propose an evolutionary algorithm. This algorithm designs feasible schedules for a given project, and evaluates these schedules in relation to the optimization objective. This evaluation is developed based on knowledge about the effectiveness of human resources. To evaluate the algorithm, we present the computational experiments carried out on six different problem sets. In this respect, the algorithm has reached an optimal effectiveness level on the first three sets and a high effectiveness level on the remaining three sets.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Repetitive Control of System Subject to Periodic Disturbance with Time-Varying Frequency 时变频率周期扰动系统的自适应重复控制
E. Kurniawan, Z. Cao, Z. Man
{"title":"Adaptive Repetitive Control of System Subject to Periodic Disturbance with Time-Varying Frequency","authors":"E. Kurniawan, Z. Cao, Z. Man","doi":"10.1109/ICI.2011.38","DOIUrl":"https://doi.org/10.1109/ICI.2011.38","url":null,"abstract":"Repetitive Control (RC) has been widely used to track/reject periodic signal. However, RC alone fails to track any non-periodic reference signal. Another control scheme such as Model Reference Control (MRC) or Model Reference Adaptive Control (MRAC) is required to do such task. MRC is employed when the plant parameters are known, while MRAC is used when the plant parameters are unknown. Therefore, MRC/MRAC needs to be combined with RC in order to simultaneously track any reference signal (not necessarily periodic) and reject the periodic disturbance. The design of RC mostly assumes the constant frequency of disturbance which leads to the selection of a fixed sampling period. In practical, disturbance is possibly time-varying in frequency. The sampling period has to be carefully adjusted in order to keep the number of samples per period remains constant. This sampling period adjustments change the plant parameters. This paper proposes the design of MRAC combined with RC for system subject to periodic disturbance with time-varying frequency. As a preliminary, the design of MRC combined with RC is also discussed here.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Large Scale Parallelization Method of 16S rRNA Probe Design Algorithm on Distributed Architecture: Application to Grid Computing 分布式架构下16S rRNA探针设计算法的大规模并行化方法:在网格计算中的应用
Mohieddine Missaoui, Faouzi Jaziri, Sébastien Cipière, David R. C. Hill, P. Peyret
{"title":"Large Scale Parallelization Method of 16S rRNA Probe Design Algorithm on Distributed Architecture: Application to Grid Computing","authors":"Mohieddine Missaoui, Faouzi Jaziri, Sébastien Cipière, David R. C. Hill, P. Peyret","doi":"10.1109/ICI.2011.16","DOIUrl":"https://doi.org/10.1109/ICI.2011.16","url":null,"abstract":"The microbial world represents the most important and diverse group of organisms living on earth. Because of this huge microbial bio complexity, high-throughput molecular tools allowing simultaneous analysis of existing populations are well adapted. Oligonucleotide micro array technologies have been widely used for gene detection and gene expression quantification, and more recently, they have been adapted to profiling environmental communities in a flexible and easy-to-use manner. Designing DNA micro arrays requires special attention to the design of specific and efficient probes in order to obtain an image of the microbial communities close to reality. The rapid growth of datasets, particularly environmental datasets, has led to an important increase in computational capacity requirements coupled with a fundamental change in the way algorithms are designed. Consequently, High Performance, including cluster and grid computing represents a solution to reduce the execution time of probe design algorithms in complex environments. In this paper, we present a method to parallelize probe design program for phylogenetic micro arrays dedicated to microbial ecology on distributed architecture. We implemented a mechanism that generates and monitors jobs over a grid. We obtained a complete design for 3513 genera including fungi and prokaryotes.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Implementation of Zoning for Winner Determination in Combinatorial Spectrum Auction 组合频谱拍卖中分区确定中标者的实现
Ayi Purbasari, Arief Zulianto
{"title":"The Implementation of Zoning for Winner Determination in Combinatorial Spectrum Auction","authors":"Ayi Purbasari, Arief Zulianto","doi":"10.1109/ICI.2011.15","DOIUrl":"https://doi.org/10.1109/ICI.2011.15","url":null,"abstract":"Computational complexity is a problem faced in the frequency spectrum auction and is called the Winner Determination Problem. The complexity increases when the object auction increases and partitioned into groups of objects based on some pre-defined zone. With the zoning scheme, there are three alternative determination of winners, the bidders get the whole object of auction at the entire zone (also called all or nothing scheme), auction bidders get the whole object in some specific zones (also called partially zone scheme), bidders are assigned some object in some zones certain (partially block zone). In this paper the issue is viewed as a matter of Knapsack auctions, both Knapsack 0/1 and Bounded Knapsack. The issue is then simulated for the three alternatives to obtain the best solution based on the consideration of the highest revenue. We uses 14 data sets for simulation, with the technique used is the Brute Force and Dynamic Programming which has been implemented in the Java programming language. For the same data sets, the simulation results establish that the partially zone is producing the highest revenue, followed by partually block zone scheme, then the all or nothing scheme","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Gold Codes Using Higher-Order Statistics 基于高阶统计量的金码检测
M. Gouda, A. El-Hennawy, A. E. Mohamed
{"title":"Detection of Gold Codes Using Higher-Order Statistics","authors":"M. Gouda, A. El-Hennawy, A. E. Mohamed","doi":"10.1109/ICI.2011.65","DOIUrl":"https://doi.org/10.1109/ICI.2011.65","url":null,"abstract":"In this paper the higher-order statistics (HOS) specified in terms of triple correlation function (TCF) of Gold code which is commonly used in spread-spectrum systems is studied. A detection method of Gold sequence is presented and the proposed gold code receivers based on the peak feature of the TCF are analysed. These receivers take advantage of the TCF and use it for self-synchronization. We study two types of TCF receivers, one-stage receiver which is used with divisible by three code length and two-stage receiver which can be used with any code length. A comparison between the performances of both receivers in Additive White Gaussian Noise (AWGN) channel is performed to prove the immunity of the receivers against different noise levels.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Motion Detection Based Surveillance System (MDSS) 一种基于运动检测的监控系统
Atif Ali Khan, Muneeb Iqbal
{"title":"A Motion Detection Based Surveillance System (MDSS)","authors":"Atif Ali Khan, Muneeb Iqbal","doi":"10.1109/ICI.2011.31","DOIUrl":"https://doi.org/10.1109/ICI.2011.31","url":null,"abstract":"Security is one of the biggest issues in today's world. According to Metropolitan Police Service there have been a total of 33,471 robberies out of which 90% of them were personal and rest business and there has been a total of 92,135 burglaries out of which 70% of them were residential and the rest were non residential. The above figure shows that no doubt the crime is happing and let it be residential or non-residential places are not safe. There is surely a need for a system which can act as a surveillance for our offices and home and which is easy to use, which can run on a PC, which can be accessed via different medium like mobile phone, email or PDA. Human eye has always been considered as the most reliable source of surveillance. This paper concentrates on developing a computer based system which would replace human eye in surveillance. Machine vision is implemented to detect intruders and notify humans about the unexpected motion using SMS and email communication technologies. The system is a distributed application and can interact with its users from all over the world. Various motion detection algorithms were discussed and suitable choice was made for the project. There are more efficient algorithms available if the required reliability of the system is higher.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Car Body Paint Defect Inspection Using Rotation Invariant Measure of the Local Variance and One-Against-All Support Vector Machine 基于局部方差旋转不变测度和单对全支持向量机的车身油漆缺陷检测
Parisa Kamani, A. Afshar, F. Towhidkhah, Ehsan Roghani
{"title":"Car Body Paint Defect Inspection Using Rotation Invariant Measure of the Local Variance and One-Against-All Support Vector Machine","authors":"Parisa Kamani, A. Afshar, F. Towhidkhah, Ehsan Roghani","doi":"10.1109/ICI.2011.47","DOIUrl":"https://doi.org/10.1109/ICI.2011.47","url":null,"abstract":"This paper presents a novel computer vision method for automatic detection and classification of car body paint defects. This new system analyzes the images sequentially acquired from car body to detect and classify different kinds of defects. First, the defect region is located by using rotation invariant measure of the local variance (VAR) operator. Next, detected defects are classified into different defect types by using One-Against-All Support Vector Machine (OAA-SVM) classifier. The experimental results demonstrated the effectiveness of the proposed approach.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信