{"title":"On the Problem of Delay and Packet Dropout in Networked Adaptive Systems","authors":"K. George, M. Krishnapur, R. Makam","doi":"10.1109/ICI.2011.35","DOIUrl":"https://doi.org/10.1109/ICI.2011.35","url":null,"abstract":"The principal objectives in this paper are to achieve output tracking when the given unknown plant is part of a networked system and to simultaneously address the effects of both network-induced delay and packet dropout. It is demonstrated that an intelligent use of available information is sufficient to mitigate the effects of both delay and packet dropout. Specifically, we use locally available estimate of the output in lieu of the actual output whenever necessary for the dual purpose of identifying the plant and to determine the appropriate control law for tracking desired trajectories.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114674132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Analysis of Onion Routing Networks Using PRISM","authors":"M. Adithia","doi":"10.1109/ICI.2011.42","DOIUrl":"https://doi.org/10.1109/ICI.2011.42","url":null,"abstract":"People require privacy when doing transaction via Internet connection. For example, some people do not want other people to know what web page they request. Anonymous cash is not anonymous anymore if the channel used for the connection identifies the identity of the participating entities. Email users sometimes want to hide their email addresses. These days, the Internet does not really care about privacy. Encryption is provided to protect privacy, but it only protects the content of a transaction. Thus an eavesdropper can still learn the IP addresses of the internet users to infer their identities. Special networks, called the anonymity network, were created to protect privacy, especially the identities of the entities participating in a communication via Internet connections. This paper discusses probabilistic analysis of the anonymity provided by anonymity networks, namely Onion Routing, by using a model-checker tool called PRISM.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sudirman, Narges Tabatabaey-Mashadi, I. Ariffin
{"title":"Aspects of a Standardized Automated System for Screening Children's Handwriting","authors":"R. Sudirman, Narges Tabatabaey-Mashadi, I. Ariffin","doi":"10.1109/ICI.2011.19","DOIUrl":"https://doi.org/10.1109/ICI.2011.19","url":null,"abstract":"Perceptual and practical aspects of child's drawing and handwriting, plus the importance of early identification of developmental disorders in children, arise the essential need for screening pupils' handwritings, testing their handwriting abilities and readiness. This research summarizes approaches in an automated screening system that can assist teachers, occupational therapist and psychologists monitor pupils for difficulties that result in improper handwriting. The following clarifies its importance and effects, discusses its aspects of system implementation and resources needed, plus its prospect benefits and outcomes. This new insight to children's handwriting assessment and screening systems provides new openings to targeted research in several fields of study interrelated to this issue. Ultimate system will in fact benefit educational system and public health in addition to generation of new knowledge about complicated human performances, children development and different languages inspirations. In the following, shortcoming in handwriting standards are mentioned, position features are introduced and global features are discussed. Multi-feature acquisition and fusion in different levels are considered in system implementation.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximizing the Effectiveness of Human Resources in the Context of Project Scheduling by an Evolutionary Algorithm","authors":"V. Yannibelli, Analía Amandi","doi":"10.1109/ICI.2011.41","DOIUrl":"https://doi.org/10.1109/ICI.2011.41","url":null,"abstract":"In this paper, we address the project scheduling problem to assist project managers at the early stage of scheduling. Thus, as part of the problem, we consider a priority optimization objective for managers at that stage. This objective involves assigning the most effective set of human resources to each project activity. We consider that the effectiveness of a human resource depend on its work context. To solve the problem, we propose an evolutionary algorithm. This algorithm designs feasible schedules for a given project, and evaluates these schedules in relation to the optimization objective. This evaluation is developed based on knowledge about the effectiveness of human resources. To evaluate the algorithm, we present the computational experiments carried out on six different problem sets. In this respect, the algorithm has reached an optimal effectiveness level on the first three sets and a high effectiveness level on the remaining three sets.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Repetitive Control of System Subject to Periodic Disturbance with Time-Varying Frequency","authors":"E. Kurniawan, Z. Cao, Z. Man","doi":"10.1109/ICI.2011.38","DOIUrl":"https://doi.org/10.1109/ICI.2011.38","url":null,"abstract":"Repetitive Control (RC) has been widely used to track/reject periodic signal. However, RC alone fails to track any non-periodic reference signal. Another control scheme such as Model Reference Control (MRC) or Model Reference Adaptive Control (MRAC) is required to do such task. MRC is employed when the plant parameters are known, while MRAC is used when the plant parameters are unknown. Therefore, MRC/MRAC needs to be combined with RC in order to simultaneously track any reference signal (not necessarily periodic) and reject the periodic disturbance. The design of RC mostly assumes the constant frequency of disturbance which leads to the selection of a fixed sampling period. In practical, disturbance is possibly time-varying in frequency. The sampling period has to be carefully adjusted in order to keep the number of samples per period remains constant. This sampling period adjustments change the plant parameters. This paper proposes the design of MRAC combined with RC for system subject to periodic disturbance with time-varying frequency. As a preliminary, the design of MRC combined with RC is also discussed here.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohieddine Missaoui, Faouzi Jaziri, Sébastien Cipière, David R. C. Hill, P. Peyret
{"title":"Large Scale Parallelization Method of 16S rRNA Probe Design Algorithm on Distributed Architecture: Application to Grid Computing","authors":"Mohieddine Missaoui, Faouzi Jaziri, Sébastien Cipière, David R. C. Hill, P. Peyret","doi":"10.1109/ICI.2011.16","DOIUrl":"https://doi.org/10.1109/ICI.2011.16","url":null,"abstract":"The microbial world represents the most important and diverse group of organisms living on earth. Because of this huge microbial bio complexity, high-throughput molecular tools allowing simultaneous analysis of existing populations are well adapted. Oligonucleotide micro array technologies have been widely used for gene detection and gene expression quantification, and more recently, they have been adapted to profiling environmental communities in a flexible and easy-to-use manner. Designing DNA micro arrays requires special attention to the design of specific and efficient probes in order to obtain an image of the microbial communities close to reality. The rapid growth of datasets, particularly environmental datasets, has led to an important increase in computational capacity requirements coupled with a fundamental change in the way algorithms are designed. Consequently, High Performance, including cluster and grid computing represents a solution to reduce the execution time of probe design algorithms in complex environments. In this paper, we present a method to parallelize probe design program for phylogenetic micro arrays dedicated to microbial ecology on distributed architecture. We implemented a mechanism that generates and monitors jobs over a grid. We obtained a complete design for 3513 genera including fungi and prokaryotes.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Implementation of Zoning for Winner Determination in Combinatorial Spectrum Auction","authors":"Ayi Purbasari, Arief Zulianto","doi":"10.1109/ICI.2011.15","DOIUrl":"https://doi.org/10.1109/ICI.2011.15","url":null,"abstract":"Computational complexity is a problem faced in the frequency spectrum auction and is called the Winner Determination Problem. The complexity increases when the object auction increases and partitioned into groups of objects based on some pre-defined zone. With the zoning scheme, there are three alternative determination of winners, the bidders get the whole object of auction at the entire zone (also called all or nothing scheme), auction bidders get the whole object in some specific zones (also called partially zone scheme), bidders are assigned some object in some zones certain (partially block zone). In this paper the issue is viewed as a matter of Knapsack auctions, both Knapsack 0/1 and Bounded Knapsack. The issue is then simulated for the three alternatives to obtain the best solution based on the consideration of the highest revenue. We uses 14 data sets for simulation, with the technique used is the Brute Force and Dynamic Programming which has been implemented in the Java programming language. For the same data sets, the simulation results establish that the partially zone is producing the highest revenue, followed by partually block zone scheme, then the all or nothing scheme","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Gold Codes Using Higher-Order Statistics","authors":"M. Gouda, A. El-Hennawy, A. E. Mohamed","doi":"10.1109/ICI.2011.65","DOIUrl":"https://doi.org/10.1109/ICI.2011.65","url":null,"abstract":"In this paper the higher-order statistics (HOS) specified in terms of triple correlation function (TCF) of Gold code which is commonly used in spread-spectrum systems is studied. A detection method of Gold sequence is presented and the proposed gold code receivers based on the peak feature of the TCF are analysed. These receivers take advantage of the TCF and use it for self-synchronization. We study two types of TCF receivers, one-stage receiver which is used with divisible by three code length and two-stage receiver which can be used with any code length. A comparison between the performances of both receivers in Additive White Gaussian Noise (AWGN) channel is performed to prove the immunity of the receivers against different noise levels.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Motion Detection Based Surveillance System (MDSS)","authors":"Atif Ali Khan, Muneeb Iqbal","doi":"10.1109/ICI.2011.31","DOIUrl":"https://doi.org/10.1109/ICI.2011.31","url":null,"abstract":"Security is one of the biggest issues in today's world. According to Metropolitan Police Service there have been a total of 33,471 robberies out of which 90% of them were personal and rest business and there has been a total of 92,135 burglaries out of which 70% of them were residential and the rest were non residential. The above figure shows that no doubt the crime is happing and let it be residential or non-residential places are not safe. There is surely a need for a system which can act as a surveillance for our offices and home and which is easy to use, which can run on a PC, which can be accessed via different medium like mobile phone, email or PDA. Human eye has always been considered as the most reliable source of surveillance. This paper concentrates on developing a computer based system which would replace human eye in surveillance. Machine vision is implemented to detect intruders and notify humans about the unexpected motion using SMS and email communication technologies. The system is a distributed application and can interact with its users from all over the world. Various motion detection algorithms were discussed and suitable choice was made for the project. There are more efficient algorithms available if the required reliability of the system is higher.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parisa Kamani, A. Afshar, F. Towhidkhah, Ehsan Roghani
{"title":"Car Body Paint Defect Inspection Using Rotation Invariant Measure of the Local Variance and One-Against-All Support Vector Machine","authors":"Parisa Kamani, A. Afshar, F. Towhidkhah, Ehsan Roghani","doi":"10.1109/ICI.2011.47","DOIUrl":"https://doi.org/10.1109/ICI.2011.47","url":null,"abstract":"This paper presents a novel computer vision method for automatic detection and classification of car body paint defects. This new system analyzes the images sequentially acquired from car body to detect and classify different kinds of defects. First, the defect region is located by using rotation invariant measure of the local variance (VAR) operator. Next, detected defects are classified into different defect types by using One-Against-All Support Vector Machine (OAA-SVM) classifier. The experimental results demonstrated the effectiveness of the proposed approach.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}