2011 Second International Conference on Intelligent Systems, Modelling and Simulation最新文献

筛选
英文 中文
Averaged Segmental Partial Hausdorff Distance for Robust Face Recognition 鲁棒人脸识别的平均分段部分Hausdorff距离
Hamidreza Dastmalchi, Javad Jafaryahya, Reza Najafi, A. Daneshkhah
{"title":"Averaged Segmental Partial Hausdorff Distance for Robust Face Recognition","authors":"Hamidreza Dastmalchi, Javad Jafaryahya, Reza Najafi, A. Daneshkhah","doi":"10.1109/ISMS.2011.16","DOIUrl":"https://doi.org/10.1109/ISMS.2011.16","url":null,"abstract":"Face recognition is a non-contact biometric identification that tries to verify individuals automatically based on their images. Computational time and accuracy rate are important aspects to be considered for Face Recognition systems. Huasdorff distance is a dissimilarity measurement between two point sets which has been increasingly used for face recognition. In this paper, we have proposed a modified criterion based on Hausdorff distance, which conspicuously decreases the excessive computational time while increases the recognition rate of conventional face recognition methods, based on Hausdorff distance.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115129451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Basic Digital Watermarking Algorithm in Discrete Cosine Transformation Domain 离散余弦变换域的一种基本数字水印算法
Md. Nazmus Sakib, S. Alam, A. Sazzad, C. Shahnaz, S. Fattah
{"title":"A Basic Digital Watermarking Algorithm in Discrete Cosine Transformation Domain","authors":"Md. Nazmus Sakib, S. Alam, A. Sazzad, C. Shahnaz, S. Fattah","doi":"10.1109/ISMS.2011.72","DOIUrl":"https://doi.org/10.1109/ISMS.2011.72","url":null,"abstract":"Digital watermarking is the newfangled idea in digital media. As the replication and modification of digital media content is done frequently and without any significant obstruction, secrecy and authenticity become vulnerable to attacks. In the information hiding community digital watermarking has achieved immense popularity due to its righteous stronghold against piracy and non-repudiation. Many watermarking algorithm has been developed in recent years. From the context of the purposes, as they serve, they differ from each other. Here we propose some basic algorithms of digital watermarking technique using LSB (Least Significant Bit) and DCT (Discrete Cosine Transformation).","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125031414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Application of Imperialist Competitive Algorithm in Online PI Controller 帝国竞争算法在在线PI控制器中的应用
M. A. Movahed, A. Yazdani
{"title":"Application of Imperialist Competitive Algorithm in Online PI Controller","authors":"M. A. Movahed, A. Yazdani","doi":"10.1109/ISMS.2011.23","DOIUrl":"https://doi.org/10.1109/ISMS.2011.23","url":null,"abstract":"In this paper, imperialist competitive algorithm is applied to the problem of finding the optimum value for an online PI controller. The objective is to design an adaptive controller for temperature control of non-isothermal reactor with respect to the set point variations. The gain scheduling method is employed to construct an online PI controller. The PI controller is designed in such a way that it minimizes the sum of square error. Fixed gain PI controllers are also implemented on process plant. The results among former method and non-dynamic approaches when compared indicated that the proposed model offers a remarkable performance.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simulation Model, Warm-up Period, and Simulation Length of Cellular Systems 蜂窝系统的仿真模型、预热期和仿真长度
S. S. Kolahi
{"title":"Simulation Model, Warm-up Period, and Simulation Length of Cellular Systems","authors":"S. S. Kolahi","doi":"10.1109/ISMS.2011.63","DOIUrl":"https://doi.org/10.1109/ISMS.2011.63","url":null,"abstract":"In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. The warm-up period is studied because it affects the accuracy of the results in simulation of communication systems. During the warm-up period-when the simulation system has not reached the steady-state situation-, the system results (eg blocking probability) vary very rapidly from zero to 0.037 for the parameters used. In the batch-means method with 10,000 calls per batch and for 50 batches (500,000 calls), the CDMA blocking probability is 0.0192 with 99% confidence interval.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Qualified Analysis b/w ESB(s) Using Analytical Hierarchy Process (AHP) Method 使用层次分析法(AHP)对ESB进行合格分析
Zeeshan Siddiqui, A. Abdullah, M. Khan
{"title":"Qualified Analysis b/w ESB(s) Using Analytical Hierarchy Process (AHP) Method","authors":"Zeeshan Siddiqui, A. Abdullah, M. Khan","doi":"10.1109/ISMS.2011.25","DOIUrl":"https://doi.org/10.1109/ISMS.2011.25","url":null,"abstract":"This research study stress upon the qualified or comparative analysis between commercial and non-commercial Enterprise Service Buses (ESB) for large-scale organizations. We have used Multi Criteria Decision Analysis (MCDA) method known as Analytical Hierarchy Process (AHP) based on three criteria i.e. Information Security, Interoperability & High availability. Many comparative analysis reports and papers are available having proven results of comparing non-commercial ESB(s), however, very few reports were found having performed their analysis on commercial ESB(s). We have performed this analysis on the basis of tabular and mathematical proofs by comparing commercially known ESB i.e. Oracle ESB with two non-commercial yet very famous ESB(s) i.e. Mule & Fuse. This research analysis will motivate decision makers to choose the best rated ESB on the basis of our criteria. To achieve our objective we have presented the problem as hierarchy, established the priorities, criteria and performed mathematical computing to prove our analysis.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
NSSA: A New Enterprise Architecture for Network Setup without Any Network Infrastructure NSSA:无需任何网络基础设施的网络设置的新企业架构
M. Bahrami, Marziyeh Shahrazadfard, Tooba Kerdkar
{"title":"NSSA: A New Enterprise Architecture for Network Setup without Any Network Infrastructure","authors":"M. Bahrami, Marziyeh Shahrazadfard, Tooba Kerdkar","doi":"10.1109/ISMS.2011.71","DOIUrl":"https://doi.org/10.1109/ISMS.2011.71","url":null,"abstract":"In this paper we introduced a new enterprise architecture as NSSA for the establishment of networks without any infrastructure. Enterprise architecture is the following general structure planning system using information technology to optimize IT strategies to achieve business direction leads. In this architecture we use a component in this architecture, it’s a framework of organizational architecture framework as C4ISR (Command, Control, Communications, Computer, intelligence, Surveillance and Detection) and other component it’s wireless network infrastructure as Ad-Hoc networks: in this model we can use wireless networks, using data transmission by radio wave, in the simplest case, the hardware equipment allows without of physical platforms such as cable and wire, together to communicate any data. In this enterprise architecture we introduced NSSA as a new framework to use AGC4ISR architecture by mapping of Zachman Framework.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation of Transmutation β by Decay Energetics 衰变能量学模拟β嬗变
S. Alam, Md. Nazmus Sakib, Md Sabbir Ahsan, Khaled Redwan, Imranul Kabir Chowdhury
{"title":"Simulation of Transmutation β by Decay Energetics","authors":"S. Alam, Md. Nazmus Sakib, Md Sabbir Ahsan, Khaled Redwan, Imranul Kabir Chowdhury","doi":"10.1109/ISMS.2011.80","DOIUrl":"https://doi.org/10.1109/ISMS.2011.80","url":null,"abstract":"As energy sources are going to be diminished, our future prognoses certainly run towards nuclear power as it is already weighed as a safe and clean alternative energy. As, tralatitious waste disposal system is hazardous, rumination about nuclear waste management, treatment and processing via adopting different physical and chemical technologies is of grave importance. Virility of nuclear waste needs to be controlled and mitigated for safe industrial purposes and fuel consumptions. In this paper, physical explanations and simulation of β transmutation by Decay Energetics has been given.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swimming Motion Control for Biometric Fish Robot by Utilizing Turning Coefficient 基于转向系数的生物识别鱼类机器人游泳运动控制
Yoong Hou Pin, Lin Boon Hoe, K. T. T. Kin, I. Saad
{"title":"Swimming Motion Control for Biometric Fish Robot by Utilizing Turning Coefficient","authors":"Yoong Hou Pin, Lin Boon Hoe, K. T. T. Kin, I. Saad","doi":"10.1109/ISMS.2011.76","DOIUrl":"https://doi.org/10.1109/ISMS.2011.76","url":null,"abstract":"In this paper turning coefficient had been utilize for the swimming motion equation of a biometric fish robot. The swimming equation based on Carangiform Wave is cascaded with the arc equation to change the oscillating axis during turning movement (Chao Zhou). Usually turning movement is generated by defining the turning radius of the arc equation to bend the Carangiform oscillating axis. This involves the computation of turning radius power of two and infinite radius value during straight movement. Thus turning coefficient had been introduced to the arc equation to simplify the computation process and the turning coefficient can set as zero during straight movement. With the implementation of turning coefficient, the turning radius is fixed at a minimum value. This reduces the computational time of about 9% and maintaining the ability to perform smooth turning movement. Infrared sensor provides environment feedback for altering the turning coefficient linearly. The rate of change for the turning coefficient can be adjusted to define the sensitivities of the fish reacting to the environment.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125407308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
B-MIPT: A Case Tool for Biomedical Image Processing and Their Classification Using Nearest Neighbor and Genetic Algorithm B-MIPT:生物医学图像处理与遗传算法分类的案例工具
Pardeep Kumar Naik, N. Nitin, A. Janmeja, Sushain Puri, Kunal Chawla, Manav Bhasin, Kunal Jain
{"title":"B-MIPT: A Case Tool for Biomedical Image Processing and Their Classification Using Nearest Neighbor and Genetic Algorithm","authors":"Pardeep Kumar Naik, N. Nitin, A. Janmeja, Sushain Puri, Kunal Chawla, Manav Bhasin, Kunal Jain","doi":"10.1109/ISMS.2011.26","DOIUrl":"https://doi.org/10.1109/ISMS.2011.26","url":null,"abstract":"A high rate of expression of Endothelin protein in the placental cell is very much regulated by inhalation of tobacco smoke and leads to placental abnormalities subjected to birth failure. Our application developed using Image Processing [1-7], Nearest Neighbor algorithm (NN) and Genetic Algorithms (GA) [8-12], automates the study of these proteins to assist pathologists and lab technicians in achieving a more efficient and faster diagnosis. Using three distinct parameters, recognition of images with high protein expression was accurate up to 91% of the times. The tool has achieved a Matthews Correlation Coefficient (MCC) of 0.91. Other performance measures are = 91.1%, sensitivity = 0.91 and specificity = 0.82. These showed that computer aided diagnosis can be a helpful tool, especially in a field that lacks experienced specialists.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Theoretical Model to Calculate the Bandwidth of IMS Session Establishment IMS会话建立带宽计算的理论模型
W. A. Aziz, D. Sisalem, S. El-Ramly, M. M. Tantawy, Magdy M. Ibrahim
{"title":"A Theoretical Model to Calculate the Bandwidth of IMS Session Establishment","authors":"W. A. Aziz, D. Sisalem, S. El-Ramly, M. M. Tantawy, Magdy M. Ibrahim","doi":"10.1109/ISMS.2011.64","DOIUrl":"https://doi.org/10.1109/ISMS.2011.64","url":null,"abstract":"Over the last years the IP Multimedia Subsystem (IMS) has continuously gained in importance as the next generation communication network. The Session Initiation Protocol (SIP) was chosen the signaling protocol for session establishment and control in IMS. Losses caused by network or server overload would cause retransmissions and delays in the session establishment and would hence reduce the perceived service quality of the users. In order to be able to take counter measures network and service planers require detailed models that would allow them to predict such effects in advance. This paper presents a theoretical model of SIP that can be used for determining various parameters such the number of messages required for establishing a call in IMS networks when taking losses into account. The model also provides a method to calculate the bandwidth required for session establishment in IMS.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信