2011 First International Conference on Informatics and Computational Intelligence最新文献

筛选
英文 中文
Wireless Network Security Using Elliptic Curve Cryptography 利用椭圆曲线加密技术实现无线网络安全
Hero Modares, Amirhossein Moravejosharieh, R. Salleh
{"title":"Wireless Network Security Using Elliptic Curve Cryptography","authors":"Hero Modares, Amirhossein Moravejosharieh, R. Salleh","doi":"10.1109/ICI.2011.63","DOIUrl":"https://doi.org/10.1109/ICI.2011.63","url":null,"abstract":"As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it needs to be secured. It is an important challenge to find out suitable cryptography for wireless sensor networks due to limitations of energy, computation capability and storage resources. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC). We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MIDI Conversion to Musical Notation MIDI转换为音乐符号
Rikip Ginanjar, I. Iskandar
{"title":"MIDI Conversion to Musical Notation","authors":"Rikip Ginanjar, I. Iskandar","doi":"10.1109/ICI.2011.25","DOIUrl":"https://doi.org/10.1109/ICI.2011.25","url":null,"abstract":"Nowadays, music has become an integral part of human life. People live with music surrounding them. Almost everywhere in the world there is music playing. Playing music is no longer the work of musician only, as all humans like music. Musical Instrument Digital Interface (MIDI) was created to help people play numerous musical instruments alone and to help musicians enrich their music. As the development of music, people can only rely on hearing to know how to play/sing a song. However, not everybody is a capable singer. If the singer sing a wrong pitch, everybody learning from him will be false as well. To solve this problem, musical notation is needed. It is the same with MIDI. People cannot reproduce a song in MIDI if they do not know the chords to play it. Thus, musical notation is the solution. Converting MIDI file into musical notation is the goal of this project. The musical notation produced will help people who want to learn a certain song contained in a MIDI file which can be found across the internet for free or for a small fee.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing the Non-Linear PID Controller for a Missile 导弹非线性PID控制器的设计
K. Kianfar, R. Amiri, A. Bozorgmehr
{"title":"Designing the Non-Linear PID Controller for a Missile","authors":"K. Kianfar, R. Amiri, A. Bozorgmehr","doi":"10.1109/ICI.2011.36","DOIUrl":"https://doi.org/10.1109/ICI.2011.36","url":null,"abstract":"PID controllers are the most prevailing & operative controllers in industry in recent 50 years. NPID Method that is an optimized method of usual PID, leads to get better operation in response quickness and, also overshoot simultaneously. In this paper, it is used NPID method that is an efficient method for control. NPID includes a non-Linear gain and a defined linear gain that connected serial. Using this method results in setting responses based on closed loop system control operation, that kd (.), Ki (.) and Kp (.) are control gains varies with time and have constant values in linear proportional, integral, derivative controller. The missile control system contains a linear system to non-linear one. The missile control System responses to PID and NPID controller are shown at the end to compare their behaviors & effects.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cascading Collapse Assessment Considering Hidden Failure 考虑隐性故障的级联崩溃评估
N. A. Salim, Muhammad Murtadha Othman, I. Musirin, M. S. Serwan
{"title":"Cascading Collapse Assessment Considering Hidden Failure","authors":"N. A. Salim, Muhammad Murtadha Othman, I. Musirin, M. S. Serwan","doi":"10.1109/ICI.2011.59","DOIUrl":"https://doi.org/10.1109/ICI.2011.59","url":null,"abstract":"Hidden failure relay protection is the major cause of cascading failure in power system. Therefore, in this study, a hidden failure model has been developed to study the impact of certain parameter that could cause cascading collapse. The parameters that could lead to major blackout include system loading level, spinning reserve, hidden failure probability and other factors. As the overall load is the key factor that could affect the risk of cascading outages, this study will reveal the impact of it to the system. A test system of IEEE 24 bus RTS is used as a case study. The hidden failure model adopts here is the steady state analysis, which is caused by line tripping. The significant loads at which blackout risk sharply increases are identifiable for cascading collapse. This study can provide guidance for the utility on when and how to mitigate the cascading collapse from spreading to the entire power system. This study also can determine the critical loading in the risk of cascading failure.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Simulation of Lightning Flash and Detection Using Time of Arrival Method Based on Four Broadband Antennas 基于四宽带天线的闪电仿真及到达时间法检测
Saeed Vahabi Mashak, H. N. Afrouzi, Z. Abdul-Malek
{"title":"Simulation of Lightning Flash and Detection Using Time of Arrival Method Based on Four Broadband Antennas","authors":"Saeed Vahabi Mashak, H. N. Afrouzi, Z. Abdul-Malek","doi":"10.1109/ICI.2011.56","DOIUrl":"https://doi.org/10.1109/ICI.2011.56","url":null,"abstract":"Various methods are used to locate cloud-to ground lightning flash. The accuracy of the methods depends on the number of sensor stations, station topology, mathematical model adopted for the analyses, and the type of measuring equipment. For a single station with the configuration of short baseline in a measuring system, the accuracy of analysis is mostly based on the chosen mathematical equations (and assumptions) which can be solved in either linear or nonlinear mode. This paper concentrates on the simulation of a lightning flash and its detection based on the Time of Arrival (TOA) method by utilizing four broadband antennas. The accuracy of the TOA method is also evaluated in this work. A Matlab based simulation of the measuring system is implemented to construct a randomly located lightning flash with its corresponding electromagnetic radiation. Then, suitable mathematical models used as measurement systems based on the 3-antenna TOA method to determine the azimuth and elevation angles, which in turn can be used for the calculation of flash coordinates in term of (X, Y, Z) with the help of the fourth antenna.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Fitness Connector: Smart Wearable System 数字健身连接器:智能可穿戴系统
Nisheeth Gupta, Sruti Jilla
{"title":"Digital Fitness Connector: Smart Wearable System","authors":"Nisheeth Gupta, Sruti Jilla","doi":"10.1109/ICI.2011.70","DOIUrl":"https://doi.org/10.1109/ICI.2011.70","url":null,"abstract":"Sports and fitness are increasingly getting attention of companies and researchers around the world. In particular, recent mobile devices with hardware GPS and accelerometers, has made possible variety of sports and fitness applications that were not possible earlier. This paper investigates trends in fitness devices, proposes new fitness device system architecture. Proposed Digital Fitness Connector (DFC) architecture leverages existing technologies of smartphone and sports & fitness devices. This allows compatibility with over 80 ANT+ health and fitness sensors to track heart rate, speed, cadence, distance, pace, power (watts), and more. DFC works with majority of smartphone platforms - iPhone, Android, Windows. It allows users to monitor physical activity either in real-time or post workout. Moreover, DFC gives user flexibility to carry smartphone only if they wish to monitor physical activity real-time, otherwise user can just carry DFC to capture and store data from health and fitness sensors. To the best of our knowledge, our project is the first to make a digital fitness connector that works with variety of smartphone platforms and at same time is compatible with major health and fitness sensors.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Image Retrieval Technique Using Rearranged Freeman Chain Code 基于重排Freeman链码的图像检索技术
Jongan Park, Khaled Mohammad Mohiuddin Chisty, Jimin Lee, Youngeun An, Youngil Choi
{"title":"Image Retrieval Technique Using Rearranged Freeman Chain Code","authors":"Jongan Park, Khaled Mohammad Mohiuddin Chisty, Jimin Lee, Youngeun An, Youngil Choi","doi":"10.1109/ICI.2011.54","DOIUrl":"https://doi.org/10.1109/ICI.2011.54","url":null,"abstract":"An Image retrieval method based on the statistical representation of the freeman chain code is proposed. Freeman chain code is used for representing the contour of an image object. We do the feature extraction by smoothing the object for noise reduction, convert to binary image by thresholding, then the boundary of the object is detected and the first difference of the chain code is computed instead of the chain code itself. The histogram count of the chain code is computed and we rearrange the histogram count in ascending order. After computing the rearrange histogram count we compute the mean and variance of the rearrange chain code. Based on these feature we retrieved image from the database. We used the database that contains approximately one thousand images. The proposed method usually shows better results.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Solving Curriculum-Based Course Timetabling Problem with Artificial Bee Colony Algorithm 用人工蜂群算法解决基于课程的课程排课问题
D. Junaedi, N. Maulidevi
{"title":"Solving Curriculum-Based Course Timetabling Problem with Artificial Bee Colony Algorithm","authors":"D. Junaedi, N. Maulidevi","doi":"10.1109/ICI.2011.28","DOIUrl":"https://doi.org/10.1109/ICI.2011.28","url":null,"abstract":"There is a trend in the scientific community to create and solve optimization models for complex problems based on the life in nature, one of which is Artificial Bee Colony Algorithm (Algorithm ABC). This paper discussed the ABC Algorithm to solve CBT (Curriculum-Based Course Timetabling) problems in the ITC-2007 (International timetabling Competition - 2007). The composition of the ABC algorithm to solve the problems is demonstrated in this paper. The proposed ABC algorithm consisting of four phases: initialization, Employed Bee phase, Onlooker Bee phase and phase Scout Bee. Initialization phase generating solution candidates which subjects were randomly placed in the slot and the space available. In Employed bee phase and Onlooker Bee phase, a search of existing slots and room around the subjects that violate the constraint with the aim of minimizing constraint violation is conducted. Based on the experimental results show that the ABC algorithm can solve problems of CBT on the ITC-2007 with fewer number of soft constraint violations compared to the results of Asaju et. Al, who proposed similar approach to solve CBT problems in the ICT-2007. However, the proposed ABC Algorithm is still not able to achieve results comparable with the best approach reported in the ITC-2007.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling Intelligent Inter-Layer Interaction in 4G Wireless Networks 4G无线网络层间智能交互建模
P. Pileggi, P. Kritzinger
{"title":"Modeling Intelligent Inter-Layer Interaction in 4G Wireless Networks","authors":"P. Pileggi, P. Kritzinger","doi":"10.1109/ICI.2011.67","DOIUrl":"https://doi.org/10.1109/ICI.2011.67","url":null,"abstract":"In current and Next Generation Networks (NGN), Connection Admission Control and Scheduling are important Resource and Connection Management (RaCM) functions that are subject to a principle known as Intelligent Inter-layer Interaction (3I). That is, each is not only responsible for considering performance and system status information across different layers (like cross-layer design), but additionally make intelligent inferences as to the feedback effect their decision will have on particular performance measures. System-specific factors complicate these decision processes as well, such as the fluctuating radio channel quality and usage profiles. Simulation is usually preferred to model such systems but are limited by the high complexity of NGNs. Traffic-Centric Modeling is a proposed novel paradigm that has been shown to be a useful hybrid modeling approach. In this paper, we elaborate on 4G hybrid models using the proposed paradigm to study and take advantage of the synergy evident in the RaCM.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"180 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133323048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Non-Linear Readout Nodes Enhance the Performance of Reservoir-Based Speech Recognizers? 非线性读出节点能提高基于库的语音识别器的性能吗?
Fabian Triefenbach, J. Martens
{"title":"Can Non-Linear Readout Nodes Enhance the Performance of Reservoir-Based Speech Recognizers?","authors":"Fabian Triefenbach, J. Martens","doi":"10.1109/ICI.2011.50","DOIUrl":"https://doi.org/10.1109/ICI.2011.50","url":null,"abstract":"It has been shown for some time that a Recurrent Neural Network (RNN) can perform an accurate acoustic-phonetic decoding of a continuous speech stream. However, the error back-propagation through time (EBPTT) training of such a network is often critical (bad local optimum) and very time consuming. These problems hamper the deployment of sufficiently large networks that would be able to outperform state-of-the-art Hidden Markov Models. To overcome this drawback of RNNs, we recently proposed to employ a large pool of recurrently connected non-linear nodes (a so-called reservoir) with fixed weights, and to map the reservoir outputs to meaningful phonemic classes by means of a layer of linear output nodes (called the readout nodes) whose weights form the solution of a set of linear equations. In this paper, we collect experimental evidence that the performance of a reservoir-based system can be enhanced by working with non-linear readout nodes. Although this calls for an iterative training, it boils down to a non-linear regression which seems to be less critical and time consuming than EBPTT.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信