2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology最新文献

筛选
英文 中文
Assessment of Flicker Due to Vertical Wind Shear in a Wind Turbine Mounted on a Hill with Linear Approach 用线性方法评估安装在山上的风力机垂直风切变引起的闪烁
Dr. Prof. Datta S Chavan Ph.D., P. Karandikar
{"title":"Assessment of Flicker Due to Vertical Wind Shear in a Wind Turbine Mounted on a Hill with Linear Approach","authors":"Dr. Prof. Datta S Chavan Ph.D., P. Karandikar","doi":"10.1109/ICAIET.2014.50","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.50","url":null,"abstract":"Wind energy is now one of the prime renewable energy sources. Power quality of wind energy is one of the prime issues. In this paper model of flicker produced in a wind turbine mounted on a hill is deliberated. Vertical wind shear is one the important factors affecting flicker producing in wind turbine. In this paper mathematical model of flicker initiated in wind turbine mounted on a hill is developed with linear approach. The parameters considered for the development of the model are vertical wind shear, blade length, turbine height. Hill height and hill slope is also considered. The tower considered is tubular tower. The model is developed for a three bladed horizontal axis upwind wind turbine. The validation of the model is also done with experimentation.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"2342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130381446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Review of Frequent Itemsets Mining in High Dimensional Dataset 高维数据集频繁项集挖掘研究综述
Mohammad Arsyad Mohd Yakop, S. Mutalib, S. A. Rahman
{"title":"Review of Frequent Itemsets Mining in High Dimensional Dataset","authors":"Mohammad Arsyad Mohd Yakop, S. Mutalib, S. A. Rahman","doi":"10.1109/ICAIET.2014.19","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.19","url":null,"abstract":"Nowadays, there are abundant of big data collection and to understand its patterns would need a thorough analysis. Analyzing big data would depend highly on the purpose and the tasks involved would be various. One of the significant tasks is frequent itemsets mining and the strategy has been evolved in many ways in order to improve the efficiency and effectiveness of the mining process. In this paper, we briefly reviewed mining frequent itemsets algorithms from year 1998 until year 2013 that focus on maximal and closed frequent itemsets. We discussed these algorithms based on three main areas namely: the searching strategy, space reduction method, and data representation. These three main areas are concluded as the optimization strategy and are designed to improve the efficiency and scalability using a different approach in different areas to adapt to numerous growth of the dataset. This work is beneficial for researchers in designing and enhancing the algorithm based on their own purposes.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Natural Language Processing for Sentiment Analysis: An Exploratory Analysis on Tweets 面向情感分析的自然语言处理:对tweet的探索性分析
Wei Yen Chong, Bhawani Selvaretnam, Lay-Ki Soon
{"title":"Natural Language Processing for Sentiment Analysis: An Exploratory Analysis on Tweets","authors":"Wei Yen Chong, Bhawani Selvaretnam, Lay-Ki Soon","doi":"10.1109/ICAIET.2014.43","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.43","url":null,"abstract":"In this paper, we present our preliminary experiments on tweets sentiment analysis. This experiment is designed to extract sentiment based on subjects that exist in tweets. It detects the sentiment that refers to the specific subject using Natural Language Processing techniques. To classify sentiment, our experiment consists of three main steps, which are subjectivity classification, semantic association, and polarity classification. The experiment utilizes sentiment lexicons by defining the grammatical relationship between sentiment lexicons and subject. Experimental results show that the proposed system is working better than current text sentiment analysis tools, as the structure of tweets is not same as regular text.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Characterization Study of Using Acoustic Signals for Underwater Non-Destructive Testing 利用声信号进行水下无损检测的表征研究
Sien Yan Kong, B. Chua, K. Teo, R. Chin
{"title":"Characterization Study of Using Acoustic Signals for Underwater Non-Destructive Testing","authors":"Sien Yan Kong, B. Chua, K. Teo, R. Chin","doi":"10.1109/ICAIET.2014.33","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.33","url":null,"abstract":"Non-destructive testing in structural inspection is a list of techniques that is used to evaluate the condition of a structure in order to determine whether cracks, flaws defects or damages occur in structural build without causing any damage to the test object. This work presents the characterization study of using acoustic signals for underwater non-destructive testing. The optimum operating frequency for sensors, transmission angle between the transmitter and receiver and operating distance between the sensors with reflecting medium are determined. Early results can be implied in exploring the possibility of using acoustic signals in underwater structural inspection with non-destructive testing methods.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Novel Generic, Reconfigurable Neural Network FPGA Architectures 两种新型通用可重构神经网络FPGA架构
A. Youssef, K. Mohammed, Amin Nasar
{"title":"Two Novel Generic, Reconfigurable Neural Network FPGA Architectures","authors":"A. Youssef, K. Mohammed, Amin Nasar","doi":"10.1109/ICAIET.2014.11","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.11","url":null,"abstract":"Two novel generic, scalable, and reconfigurable neural network architectures implemented using field programmable gate arrays (FPGAs) are presented in this paper. Previous Implementations of feed-forward Neural Networks face two major issues: 1) Limited resources available on the FPGA compared to the large number of multiplications required by Neural-Networks, 2) Limited reusability of the design when applied to the Neural-Network applications with different architectures. Our proposed implementations circumvent both issues. The designs' scalability allows the user to program and implement different applications with variable number of neurons, starting from one neuron to the maximum number of neurons in any layer, this is performed with programming-like ease and flexibility. A GUI was implemented to allow automatic configuration of the processors for different applications. Finally, Propositions for future work are outlined.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SiFEB -- A Simple, Interactive and Extensible Robot Playmate for Kids SiFEB -一个简单的,交互式的,可扩展的孩子机器人玩伴
Hashini Senaratne, Pubudu Gunatilaka, Udith Gunaratna, Yasura Vithana, Chathura De Silva, Piyum Fernando
{"title":"SiFEB -- A Simple, Interactive and Extensible Robot Playmate for Kids","authors":"Hashini Senaratne, Pubudu Gunatilaka, Udith Gunaratna, Yasura Vithana, Chathura De Silva, Piyum Fernando","doi":"10.1109/ICAIET.2014.32","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.32","url":null,"abstract":"In this paper we present work in progress on SiFEB, a simple, interactive and extensible robot playmate for kids intended to nurture the engagement in STEM (Science, Technology, Engineering and Mathematics) related activities through playing. SiFEB's simplified and interactive hardware and software modules present users without prior experience, with the ability to build robots without going deep in either aspect. Kids can build robots of their interest using attachable hardware modules and related programming components using an easy to understand visual programming language that resembles natural commands. The potential developers may utilize the framework provided, to build hardware and software components to the system expanding the existing capabilities. Preliminary results from the prototypes show that SiFEB has the potential of being an effective learning platform for young children in STEM related areas.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Linear Model of Flicker Due to Vertical Wind Shear for a Turbine Mounted on a Green Building 绿色建筑上风力机垂直风切变闪变线性模型
Dr. Prof. Datta S Chavan Ph.D., P. Karandikar
{"title":"Linear Model of Flicker Due to Vertical Wind Shear for a Turbine Mounted on a Green Building","authors":"Dr. Prof. Datta S Chavan Ph.D., P. Karandikar","doi":"10.1109/ICAIET.2014.49","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.49","url":null,"abstract":"Use of wind energy is increased day by day. Power quality is one of the prime issues. Computation of flicker is very necessary to improve the quality of wind power generation. In this paper flicker is computed with linear approach. Vertical wind shear has major impact on the production of the flicker in wind generation. Computation of flicker in this paper is carried out considering impact of vertical wind shear. Other parameters considered for computation of flicker are turbine blade length and tower height. Mathematical model to compute the flicker is developed using these parameters. Validation of the model is also done.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131745850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Verifying Solutions to the Dining Philosophers Problem with Activity-Oriented Petri Nets 用面向活动的Petri网验证用餐哲学家问题的解决方案
R. Davidrajuh
{"title":"Verifying Solutions to the Dining Philosophers Problem with Activity-Oriented Petri Nets","authors":"R. Davidrajuh","doi":"10.1109/ICAIET.2014.35","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.35","url":null,"abstract":"Petri Nets is a family of modeling formalisms, consisting of various types of Petri nets with different interpretations and abstraction levels. General Purpose Petri Net Simulator (GPen SIM) is a new Petri Net simulator that implements many of the Petri Net types. Activity-Oriented Petri Nets (AOPN) is a new approach that facilitates modeling of some specific problems (e.g. Modeling systems that include large number of resources), AOPN is also implemented in GPen SIM. In this paper, firstly, a short introduction to AOPN is given. Secondly, the modeling capability of AOPN is tested using the classical benchmark known as the Dining Philosophers Problem. The modeling approach shown in this paper proves that AOPN can be conveniently used for modeling of discrete event systems.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trajectory Clustering for Behavioral Pattern Learning in Transportation Surveillance 交通监控中行为模式学习的轨迹聚类
M. Y. Choong, R. Chin, K. Yeo, K. Teo
{"title":"Trajectory Clustering for Behavioral Pattern Learning in Transportation Surveillance","authors":"M. Y. Choong, R. Chin, K. Yeo, K. Teo","doi":"10.1109/ICAIET.2014.41","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.41","url":null,"abstract":"The development of an efficient traffic flow monitoring system has been the main focus for many researchers working in the field. Due to the rapid development in urbanization, the complexity of traffic intersections provides challenges for researchers to detect the underlying traffic scenes. With the emerging video based surveillance system, vehicle trajectory can be extracted for observation and prediction via behavioral pattern learning. Prior to the learning, clustering of the extracted vehicle trajectory data is performed to group the data based on similarity measures. In this paper, the implementation of clustering algorithm on the trajectory data is analyzed and issues concerning the trajectory clustering are discussed.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Partial Image Encryption Algorithm Using Pixel Position Manipulation Technique: The SMART Copyback System 使用像素位置操纵技术的部分图像加密算法:SMART回拷系统
P. D., Rajashe Karappa, K. Soyjaudah, Sumithra Devi K A
{"title":"Partial Image Encryption Algorithm Using Pixel Position Manipulation Technique: The SMART Copyback System","authors":"P. D., Rajashe Karappa, K. Soyjaudah, Sumithra Devi K A","doi":"10.1109/ICAIET.2014.37","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.37","url":null,"abstract":"Nowadays, the most important locomotive to provide confidentiality is image encryption. In real-time applications the classical and modern ciphers are not appropriate because of vast quantity of data. However, certain applications like Pay-TV or Payable Internet Imaging Albums do not require entire part of an encryption, but requires a part of the image to be transparent to all users. Partial encryption is an approach to encode only the most essential portion of the data in order to afford a proportional confidentiality and to trim down the computational requirements and also execution time for encryption is reduced. In this paper, partial image encryption of color images using pixel position manipulation technique based on region of interest is proposed. It offers the amenities of partial encryption and reconstructs the images partially. Here input image is divided into sub blocks, and then selected blocks are encrypted using the proposed technique. The proposed technique achieves quick security by encrypting the selected blocks of an image. Encrypted data can be store long term without fail using SMART (Self Monitoring Analysis and Reporting Technology Copyback) system.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信