2012 Third International Conference on Intelligent Systems Modelling and Simulation最新文献

筛选
英文 中文
Probabilistic Finite Element Prediction of the Active Lower Limb Model 活动下肢模型的概率有限元预测
C. Arsene, D. Al-Dabass
{"title":"Probabilistic Finite Element Prediction of the Active Lower Limb Model","authors":"C. Arsene, D. Al-Dabass","doi":"10.1109/ISMS.2012.54","DOIUrl":"https://doi.org/10.1109/ISMS.2012.54","url":null,"abstract":"The scope of this paper is to explore the input parameters of a Finite Element (FE) model of an active lower limb that are most influential in determining the size and the shape of the performance envelope of the kinematics and peak contact pressure of the knee implant introduced during the Total Knee Replacement (TKR) surgery. The active lower limb FE model simulates the stair ascent and it provides a more complicated setup than the isolated TKR model which includes only the implant femoral component and the implant tibial insert. It includes bones, TKR implant, soft tissues and applied forces. The kinematics of the FE model is reported in the Grood and Suntay system, where all motion is relative to the femoral component of the TKR. Reported tibial component kinematics are tibial-femoral flexion angle, anterior-posterior displacement, and internal-external rotation, while the reported patella kinematics are patella-femoral flexion angle, medial-lateral shift and medial-lateral tilt. Tibial-femoral and patella-femoral contact pressures are also determined. Two probabilistic methods are used together with the FE model, which is termed probabilistic FE analysis, to generate performance envelopes for the reported output kinematics and peak contact pressures and to explore the input parameters: the Monte Carlo Simulation Technique (MCST) and the Response Surface Method (RSM). It is considered a large set of 77 input variables of the FE active lower limb model which have associated a Gaussian variability. Following a sensitivity analysis with the RSM, a reduced set of 22 input variables is derived, which represent the key parameters which influence the performance envelopes. It is shown that the envelopes of performance obtained with the probabilistic FE analysis using the RSM with the reduced set of 22 input variables are similar with the envelopes of performance obtained with the probabilistic FE analysis using the MCST with 800 points for the same degree of variability in the 22 input key parameters. The findings of this work are paramount to the orthopedic surgeons who may want to know the key parameters that can influence the performance of the TKR for a given human activity.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swarm Intelligence Based Fuzzy Controller -- A Design for Nonlinear Water Level Tank 基于群智能的模糊控制器——非线性水箱的设计
M. Joshani, M. Khalid, R. Yusof, A. I. Cahyadi
{"title":"Swarm Intelligence Based Fuzzy Controller -- A Design for Nonlinear Water Level Tank","authors":"M. Joshani, M. Khalid, R. Yusof, A. I. Cahyadi","doi":"10.1109/ISMS.2012.143","DOIUrl":"https://doi.org/10.1109/ISMS.2012.143","url":null,"abstract":"Fuzzy direct controllers are being used widely in industry these days. One of the benefits of fuzzy controllers is their ability to control unidentified processes which lets a model free controlling scheme; but on the other hand, an efficient fuzzy direct controller design, strictly depends on human expert and knowledge of a certain process. This will limit the ability of noncontrol specialists to apply fuzzy controllers on various ranges of plants. In this paper, a fuzzy direct controller is optimized in rule base using Particle Swarm Optimization algorithm. The optimization is performed subjected to minimize the output error surface of a nonlinear water level tank process. An offline Sugeno-Fuzzy system identifier is employed to prepare the evaluation function for particle swarm algorithm. Results show that the proposed controller performance is much better than simple human knowledge tuned controller.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Insulation Degradation in Epoxy Insulators Using Finite Element Method 环氧绝缘子绝缘劣化的有限元分析
V. Padma, V. Raghavan
{"title":"Analysis of Insulation Degradation in Epoxy Insulators Using Finite Element Method","authors":"V. Padma, V. Raghavan","doi":"10.1109/ISMS.2012.132","DOIUrl":"https://doi.org/10.1109/ISMS.2012.132","url":null,"abstract":"The reliability of high voltage power apparatus depends upon the careful design of its insulation and configuration of electrostatic field. The most common failure of the insulation occurs due to the surface insulation failure and the discharges within the void. In this regard, the monitoring and prevention of insulation failure becomes essential for uninterrupted functioning of high voltage power apparatus. Hence the deterioration of Insulation in an Insulator is determined from the analysis of Partial Discharge signals. The Partial Discharge signals are produced by the localized ionization within the electrical field. The Numerical Analysis of Electric field can provide information about the Partial Discharges which is determined by using the Finite Element Method. In this paper the electric field analysis are performed using FEM for the Epoxy insulator at various voltages and frequencies. It can provide information about the degradation of insulation well in advance thus avoiding major break down of power system.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Discrete Hartley Transform Based OFDM Modulator and Demodulator 基于离散哈特利变换的OFDM调制器和解调器性能分析
Z. Sembiring, M. Syahruddin
{"title":"Performance Analysis of Discrete Hartley Transform Based OFDM Modulator and Demodulator","authors":"Z. Sembiring, M. Syahruddin","doi":"10.1109/ISMS.2012.34","DOIUrl":"https://doi.org/10.1109/ISMS.2012.34","url":null,"abstract":"We are developing an alternative technique to replace the conventional complex DFT-Based OFDM system. The proposed technique is simpler and faster than conventional one because it requires only real arithmetic computations. This technique is known as discrete Hartley transform and has a closely related with Fourier transform. The performance of OFDM modulator and demodulator based on DHT was carried out with giving binary random data as the data sources. After processed by IDHT as the modulation function, the signals were then transmitted via the dispersive channel with using additive white Gaussian noise (AWGN) as the channel model. The transmitted signals were detected in receiver part with reverse processes as done in transmitter part. The measurements of parameters were repeated five times to obtain and to calculate the accuracy of the new system. The plotted graph of average BER versus SNR showed that the BER was decreased when the given value of SNR was increased. The analysis of system performance was also evaluated for several numbers of subcarriers used and the results showcased some advantages. The modification of DHT algorithm is expected to reduce the complexity and time consuming for long-length of computational on the performing of OFDM modulator and demodulator based on DHT.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reverse Engineering of TopHat: Splice Junction Mapper for Improving Computational Aspect TopHat的逆向工程:用于改进计算方面的拼接结映射器
O. Terzo, L. Mossucca, Andrea Acquaviva, Francesco Abate, E. Ficarra, Rosalba Provenzano
{"title":"Reverse Engineering of TopHat: Splice Junction Mapper for Improving Computational Aspect","authors":"O. Terzo, L. Mossucca, Andrea Acquaviva, Francesco Abate, E. Ficarra, Rosalba Provenzano","doi":"10.1109/ISMS.2012.76","DOIUrl":"https://doi.org/10.1109/ISMS.2012.76","url":null,"abstract":"TopHat is a fast splice junction mapper for Next Generation Sequencing analysis, a technology for functional genomic research. Next Generation Sequencing technology allows more accurate analysis increasing data to elaborate, this opens to new challenges in terms of development of tools and computational infrastructures. We present a solution that cover aspects both software and hardware, the first one, after a reverse engineering phase, provides an improvement of algorithm of TopHat making it parallelizable, the second aspect is an implementation of an hybrid infrastructure: grid and virtual grid computing. Moreover the system allows to have a multi sample environment and is able to process automatically totally transparent to user.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128597956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tutorial: Privacy Preservation in MANET: Issues and Challenges 教程:隐私保护在MANET:问题和挑战
D. K. Mishra
{"title":"Tutorial: Privacy Preservation in MANET: Issues and Challenges","authors":"D. K. Mishra","doi":"10.1109/ISMS.2012.148","DOIUrl":"https://doi.org/10.1109/ISMS.2012.148","url":null,"abstract":"Summary form only given. Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls under the category of Secure Multiparty Computation (SMC). The solution to SMC problems in Mobile Ad hoc Networks (MANET) can be found with the modification of the data inputs or with some anonymization technique. MANETs are the wireless networks of the mobile computing devices with no support of any fixed infrastructure. The mobile nodes use any of the radio technology like Bluetooth, IEEE 802.11 or Hiperlan for directly communicating with each other. The nodes behave as hosts as well as routers. The security challenges in the MANET arise due to its dynamic topology, vulnerable wireless link and nomadic environment. An identification mechanism is needed between the nodes using identification and the credentials. This security architecture simultaneously leads to privacy problems. Some mechanism is needed which prevents a node to learn the identity or the credentials of other nodes. To provide location privacy in MANET is a nontrivial task. Current routing protocols do not focus much on the security and the privacy issues. These aspects are postponed till further development. An authentication protocol is needed between nodes using some cryptographic technique. In service-oriented MANET the denial of the service must be taken care of so that the availability of the service is maintained. The security requirement of the ad hoc network depends on its application. For example, for a simple business meeting the requirement is mitigated and for the military battlefield it is severe. Thus no general security architecture can be developed for MANET. Specific security architecture is needed for specific application. Much security related work is still pending and will add to the standards as the physical deployment of the MANET will grow. In this talk, an emphasis is made on how SMC solutions can be used for privacy preservation during computation.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Approach to ECG Feature Extraction Methods 心电特征提取方法的比较研究
F. M. Vaneghi, M. Oladazimi, F. Shiman, A. Kordi, M. Safari, F. Ibrahim
{"title":"A Comparative Approach to ECG Feature Extraction Methods","authors":"F. M. Vaneghi, M. Oladazimi, F. Shiman, A. Kordi, M. Safari, F. Ibrahim","doi":"10.1109/ISMS.2012.35","DOIUrl":"https://doi.org/10.1109/ISMS.2012.35","url":null,"abstract":"This paper discusses six most frequent methods used to extract different features in Electrocardiograph (ECG) signals namely Autoregressive (AR), Wavelet Transform (WT), Eigenvector, Fast Fourier Transform (FFT), Linear Prediction (LP), and Independent Component Analysis (ICA). The study reveals that Eigenvector method gives better performance in frequency domain for the ECG feature extraction.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A New Algorithm for Shape Reconstruction by the Computational Geometry Approach 基于计算几何方法的形状重建新算法
A. Nourollah, S. Hosseini
{"title":"A New Algorithm for Shape Reconstruction by the Computational Geometry Approach","authors":"A. Nourollah, S. Hosseini","doi":"10.1109/ISMS.2012.41","DOIUrl":"https://doi.org/10.1109/ISMS.2012.41","url":null,"abstract":"The shape reconstruction problem is one of important and most applied problems in many branches of computer science. In this paper a new method is introduced which a graph as output and work on boundary samples as input, in the plan. The proposed method starts reconstruction from the random polygon production on input points and by calculating the Euclidean distance between points, it produces a set of new points. By adding produced points to the initial points and implementation of algorithm on a set of final point, this approach performs the shape reconstruction process. This method reduces reconstruction error compared to the initial shape and improves the process of shape reconstruction.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling Binary Tree Algorithm in 3-D Interactive Visualization: A Prototype 三维交互可视化中二叉树算法的建模:一个原型
Mohd Zulhisam, R. M. Rias
{"title":"Modeling Binary Tree Algorithm in 3-D Interactive Visualization: A Prototype","authors":"Mohd Zulhisam, R. M. Rias","doi":"10.1109/ISMS.2012.134","DOIUrl":"https://doi.org/10.1109/ISMS.2012.134","url":null,"abstract":"Multimedia technology is becoming increasingly popular in the field of education. The use of 3-D visualization in teaching and learning has proven its benefits, where it allows learners to learn and grasp the lessons being taught much faster than in a normal classroom. This is where visualization plays an interesting dimension in development of courseware. This paper reports on our approach in using 3-D visualization as a method for designing interactive multimedia courseware as an effective way of learning .The topic of binary tree in Data Structure was selected as the module content in this application. The nature of this subject which is complex and rather difficult to comprehend was an inspiration for choosing this topic as a domain in this study. This paper looks into the designing aspect of the 3-D animated multimedia application, the prototype and finally, the strength and weaknesses of the application.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generative Inspection: An Intelligent Model to Detect and Remove Software Defects 生成式检测:一种检测和消除软件缺陷的智能模型
N. Hashemitaba, S. H. Ow
{"title":"Generative Inspection: An Intelligent Model to Detect and Remove Software Defects","authors":"N. Hashemitaba, S. H. Ow","doi":"10.1109/ISMS.2012.48","DOIUrl":"https://doi.org/10.1109/ISMS.2012.48","url":null,"abstract":"Software inspection covers the defects related to software tests Incompetence. The proposed model of this research performs defect removal actions as an important duty of inspection, as well as, using the capabilities of collaborative and knowledge base systems. The process improvement is continuously in progress by creating swap iteration in inspection model kernel. Making and modifying some rules related to defects, adds intelligence and learning features to the model. In order to validate the model, it is implemented in a real software inspection project. The varieties of detected and removed defects show the potential performance of the model and make the process reliable.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信