{"title":"Building a Believable Agent for a 3D Boxing Simulation Game","authors":"M. Mozgovoy, I. Umarov","doi":"10.1109/ICCRD.2010.11","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.11","url":null,"abstract":"This paper describes an approach used to build a practical AI solution for a 3D boxing simulation game. The features of the designed AI agent are based on our deliberate concentration on believability, i.e. human-likeness of agent’s behavior. We show how learning by observation and case-based reasoning techniques can be used to create an AI decision-making system for an industrial-level computer game. The chosen AI design principles support high usability and maintainability, which is important for game developers. We prove experimentally that our AI system provides both believable and effective behavior.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126676063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Risk Assessment of Crime Prevention System Based on Risk Entropy Model","authors":"Guo Xi, Ruimin Hu, Yongjun Peng, Jingjing Dai","doi":"10.1109/ICCRD.2010.157","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.157","url":null,"abstract":"With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime prevention, defects exist in poorly designed systems targeting personnel protection, physical protection, and electronic protection. Therefore, it is a major strategic task to improve risk assessment techniques and promote the objective evaluation of the risk in such area. In this paper, we present the concept of risk entropy based on the Shannon information theory, derive the risk entropy model of security node, and further analyze the expression and calculation of security node risk entropy. On the other hand, we generate the abstract security network simulation model to study the path dependence of the calculation method on security network risk entropy with a broad crime prevention system formed by connecting security node with traffic network. Finally, we complete the risk assessment of crime prevention system according to the security network. The results show that the risk entropy model is in line with the objective reality. We believe this model can not only break through bottlenecks in the technology of objective risk assessment but also bear important scientific significance in the applications of scientific prediction and effective prevention for public safety emergency response system.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Over the Fracture Mechanics of Mindlin-Reissner Plates","authors":"Răducanu Răzvan","doi":"10.1109/ICCRD.2010.118","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.118","url":null,"abstract":"The present paper presents a possible implementation of the Element Free Galerkin method to the study of fracture of Mindlin- Reissner plates. The novelty of this paper resides on the fact that it uses an enriched meshless method: Moving Least Square around the crack tip in the theory of Mindlin-Reissner plates. This method is especially designed to characterize in a better way the behavior of cracks.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Trespasser Detection System Using Thermal Camera","authors":"Wai Kit Wong, Z. Chew, C. Loo, W. Lim","doi":"10.1109/ICCRD.2010.161","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.161","url":null,"abstract":"This paper presents a novel human detection algorithm embedded into a thermal imaging system to form a fast and effective trespasser detection system for smart surveillance purpose. To identify a human object, pattern recognization technique is employed where human head is detected and analyzed for its shape, dimension and position. The experimental result shows that the proposed trespasser detection algorithm is fast and accurate with accuracy of 98.62% in its optimum setting with short routine time of 112 milliseconds.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of an Intelligent Maintenance Prognosis Tool","authors":"S. A. Asmai, B. Hussin, M. M. Yusof","doi":"10.1109/ICCRD.2010.69","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.69","url":null,"abstract":"The technology of prognosis has become a significant approach but its implementation in maintenance has a major extension. The ability prognosis in the medical area has been established to estimate the future of human health. However, in maintenance, application of prognosis is not yet seen as a practical use for making better maintenance decision. To date, research in this area has been done in proposing prognosis techniques or model but leaving the implementation of prognosis as their future work. In this paper, an overview of prognosis in maintenance is presented. By using the data-driven approach, a framework for implementing of an intelligent maintenance prognosis tool is introduced. The framework utilizes the existing equipment operating performance data in the industry for prognosis process. Next, the framework combines the ability of prognosis in estimating remaining useful life (RUL) of equipment with the maintenance action knowledge to generate a well-received maintenance plan.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122065865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Retrieval from Distributed Relational Biodiversity Databases","authors":"K. Sarinder, L. Lim, A. Merican, K. Dimyati","doi":"10.1109/ICCRD.2010.27","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.27","url":null,"abstract":"This paper focuses on information retrieval from relational databases on biodiversity content of flora and fauna in Malaysia. The retrieval process was done considering factors such as the databases are distributed, located in Windows as well as Linux platforms, developed using a variety of Database Management Systems and the structure of the tables are not standardized. Structured Query Language (SQL) was used to generate query, ASP and PHP were used as scripting languages, database drivers such as ODBC, Oledb, DataDirect32 bit SequeLink 5.4 were used for communication with the DBMSs and finally XML for generating standard retrieval results from the databases queried.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Microcontrollers Interaction Using C","authors":"S. Muji, R. A. Rahim, M. Rahiman","doi":"10.1109/ICCRD.2010.42","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.42","url":null,"abstract":"This paper studied about micro controllers interaction using RS232 as a communication tool and C to programming the interaction. PIC18F4520 will be used in this prototype and MPLAB as a software tool. Before run it into the real hardware, some simulation must be done to make sure all the hardware connection and software writing is correct. Proteus 7.1 has been used for the simulation purpose. The result shows that interaction between micro controllers can be done using those entire gadgets.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Modeling of Efficient and Dynamic Broadcasting Algorithm in MANETs Routing Protocols","authors":"D. Dembla, Y. Chaba","doi":"10.1109/ICCRD.2010.82","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.82","url":null,"abstract":"A MANET (Mobile Adhoc NETwork) is an autonomous system consisting of a set of mobile hosts that are free to move without the need for a wired backbone or a fixed base station. Conventional on-demand route discovery for Adhoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. Broadcasting is an essential building block of any MANET, so it is imperative to utilize the most efficient broadcast methods possible, to ensure a reliable network. This paper proposes a new AODV-Efficient and dynamic probabilistic broadcasting approach which is quite efficient and dynamic in nature and solves the broadcast storm problem in AODV. The simulation is done on Global Mobile Simulator (GloMoSim). Average end-to-end delay and routing overhead are considered as main performance evaluation metrics. The results show that this proposed algorithm has better performance over the conventional AODV protocol having implemented with blind flooding and even with fixed probabilistic flooding approaches and also improves the performance of on demand routing protocols of MANETs by reducing the communication overhead incurred during the route discovery process on AODV protocol.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delaunay Triangulation Based Three Dimensional Anatomical Facial Reconstruction from 2D CT Slices","authors":"R. Menaka, Maya Eapen, C. Chellamuthu","doi":"10.1109/ICCRD.2010.19","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.19","url":null,"abstract":"A novel approach for 3D anatomical facial reconstruction from 2D CT images using Delaunay Triangulation is proposed in this paper. The method involves individual slice thresholding, contour finding, point cloud generation, Delaunay triangulation and redundant tetrahedron removal. The results are compared with standard marching cube algorithm and with standard commercial 3D software. The performance is studied based on time complexity and improvement in resolution.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Focal Activation Detection with MEG Signals Using Combination Method","authors":"Mehdi Rajabioun","doi":"10.1109/ICCRD.2010.53","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.53","url":null,"abstract":"Magnetoencephalography(MEG) is one of newest methods for detecting brain activations. But because of illposedness of this problem many papers are proposed to solving this problem and acquiring accurate unique solution. In this paper we propose a method whose solution is less sensitive to noise, is spatially unbiased, focal and has low computational complexity. We combine the ideas of weighting, regularization to provide a combination method. Simulation studies on focal activation detection in different location and signal to noise ratio (SNR) reveal that the proposed method provides accurate and focal solution in the presence of noise. This method has superior performance compared to non-iterative methods. Its performance is similar to the iterative methods (like FOCUSS) but with lower computational load.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}