{"title":"A time and memory efficient way to enumerate cycles in a graph","authors":"K. Sankar, A. Sarad","doi":"10.1109/ICIAS.2007.4658438","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658438","url":null,"abstract":"Enumerating the cycles in a graph finds numerous applications in communication systems. It is also possible to find given length cycles without enumerating all cycles in the graph. We enumerate the cycles in a directed and undirected graph, in a time and memory efficient manner and make the operations parallelizable, maintaining ease and simplicity to implement.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115722229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lim Kheng Kait, Chong Zan Kai, R. Khoshdelniat, S. M. Lim, Ewe Hong Tat
{"title":"Paddy Growth Monitoring with Wireless Sensor Networks","authors":"Lim Kheng Kait, Chong Zan Kai, R. Khoshdelniat, S. M. Lim, Ewe Hong Tat","doi":"10.1109/ICIAS.2007.4658529","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658529","url":null,"abstract":"The emergence of wireless sensor networks and micro-electro-mechanical systems (MEMS) technologies have brought thousands of evolutions to establish connections among human world, nature and computers. This paper presents a system design of Paddy growth monitoring with wireless sensor networks, which aimed to assist farmers in precise agriculture and increase of rice yield.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An HMM-based online recognition system for Farsi handwritten words","authors":"F. Faradji, K. Faez, M. H. Mousavi","doi":"10.1109/ICIAS.2007.4658572","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658572","url":null,"abstract":"In this paper, we propose a method for online Farsi handwritten words recognition. At first, words are broken to their sub-words. Each sub-word is made of some strokes. We assign a tag to each sub-word based on the positions and shapes of its sub-strokes. After that, we classify sub-words according to their tags. Some online features are extracted from the main-stroke after the preprocessing stage. Preprocessing contains operations such as dehooking, smoothing, normalization and boundary box equalization. Recognition process is consisted of some stages. First, the input word is divided into probable constructing sub-words, and recognition process is accomplished for each of them. For each sub-word, we find the class and sub-class of it, based on the tag and an extracted feature respectively. Some other features are extracted from the main-stroke of the sub-word, which are useful for training and testing the hidden Markov models as the classifier. These HMMs are the last level in our recognition system. In this paper, we use a 1000-sub-word database of the most frequently used Farsi words. The performance of the system in finding the classes and sub-classes of the sub-words is 99.45% and 99.91% respectively. The rate of correct performance of the HMMs is 82.96% making the total recognition rate of the system on the database 82.43%.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Akram, A. Naureen, R. Riaz, Ki Hyung Kim, H. Farooq
{"title":"Evaluation of hybrid security system with cluster based key management for Wireless Sensor Networks","authors":"A. Akram, A. Naureen, R. Riaz, Ki Hyung Kim, H. Farooq","doi":"10.1109/ICIAS.2007.4658417","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658417","url":null,"abstract":"Security critical applications of wireless sensor networks stipulate more efficient and secure architectures for security. Hybrid security system using both public and private key cryptography along with cluster based key management can be a step further in achieving more security and efficiency at a lower cost. The paper analyzes and evaluates the hybrid security system with cluster based key management for wireless sensor networks.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dimensional analysis for contamination severity assessment on high voltage insulators","authors":"A.S. Ahmad, S. Ahmed, S. Shahnawaz Ahmed","doi":"10.1109/ICIAS.2007.4658515","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658515","url":null,"abstract":"The environmental pollution which is mainly affected by the weather conditions are the main cause of flashovers on high voltage insulators leading to outages in power systems. It is generally recognized that the worst type of pollution that lead to the contamination flashovers is marine pollution as found in the immediate neighborhood of the coastal regions followed by solid pollution as found in the dense industrial areas. This research is directed towards the study of contamination of insulator under marine pollution. The effects of various meteorological factors on the pollution severity have been investigated thoroughly. The mathematical relations between equivalent salt deposit density (ESDD) with refer to meteorological conditions such as wind speed, rainfall and surface conductivity has been derived using Dimensional Analysis. It has been proved that the Dimensional Analysis technique is suitable for the contamination studies and assessment on the insulators. The predicted ESDD has been compared with the measured for a practical system.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frontal obstacle avoidance of an autonomous subsurface vehicle (ASV) using fuzzy logic method","authors":"H.F. Fauadi, M. H. Nordin, Z. Zainon","doi":"10.1109/ICIAS.2007.4658360","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658360","url":null,"abstract":"Utilization of robots and autonomous vehicles to replace human being in executing remote, difficult, highly risk and dangerous tasks is the niche issue among robotic engineers. In order to develop such application, the main challenge is to integrate the advances of various engineering disciplines. This project proposes the design of frontal obstacle avoidance for ASV using fuzzy logic. This project also compares analyses done between Mamdani and Sugeno methods to control the maneuvering of ASV. This project uses MATLAB as the main designing tool.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent mininig for capturing processes through event logs to represent workflows using FP tree","authors":"M. Sathyanarayana, N. Kavya, N. Naveen","doi":"10.1109/ICIAS.2007.4658342","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658342","url":null,"abstract":"Data mining applications require an ability to understand unfiltered data embedded in event logs. The scalability of the data, end-user comprehensibility of the results, non-presumption of any canonical data distribution, and insensitivity to the order of input records will determine efficiency of data mining. Contemporary workflow management systems are driven by explicit process models based on completely specified workflow designs. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the actual workflow processes and the processes as perceived by the management. In this paper, we propose a Process Mining Architecture (PROARCH) model which involves capturing processes in a system through event logs containing information about the different processes under execution. We assume that events in logs bear timestamps. But these logs will also contain log of unformatted data which may be dirty data for our model. Hence this information needs to be filtered before further processing. After filtering, the clean data is represented in MXML format and will serve as input to our model. This MXML data is parsed into a Petri net representation. The nodes and transitions, are connected to form a workflow representation. Since the initial input logs are dirty we use FP tree approach to build our workflow model.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low cost capacitive security card system","authors":"M. Rehman, Lee Bee Koon","doi":"10.1109/ICIAS.2007.4658592","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658592","url":null,"abstract":"A low cost and reliable capacitive security card system is designed, fabricated and tested. It consists of capacitive card reader system, an integrator, rectifying circuit, an 8051 microcontroller and LED indicators. Initially rectangular patterns of different lengths are being recognized successfully with a success rate of 100%. The patterns on the security card are scanned with a thin conducting plate, which is the part of the reading system, when card is inserted in the reading system. The variations in the heights of the patterns are being converted into voltages with the help of an integrator. Output of the integrator, after rectification, is fed to the ADC of the microcontroller. It is converted into numbers by it and compared with the number stored in the memory of the microcontroller. The designed system is capable of recognizing up to five columns (patterns) in a single row with a maximum number of 99999.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PID dead-time predictor design for industrial DCS systems using Smith rule","authors":"A. Mehrafrooz, A. Yazdizadeh","doi":"10.1109/ICIAS.2007.4658548","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658548","url":null,"abstract":"A dead-time is usually associated with input and output of the industrial control systems, especially water and wastewater treatment systems. This dead-time is not a fixed time during process function, therefore, a conventional PID controller which is related to this dead-time can not be designed by the conventional methods. An adaptive scheme is designed to control an industrial water and wastewater treatment plant by using Smith adaptive rule. Stability of the proposed adaptive system is proved and the simulation results show the quality performance of the adaptive PID controller.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122547724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoupled sliding-mode with fuzzy neural network controller for EHSS velocity control","authors":"S.A. Mohseni, M. A. Shooredeli, M. Teshnehlab","doi":"10.1109/ICIAS.2007.4658338","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658338","url":null,"abstract":"In this paper a decoupled sliding-mode with fuzzy neural network controller for a nonlinear system is presented. To divided into two subsystems to achieve asymptotic stability by decoupled method for a class of three order nonlinear system. The fuzzy neural network (FNN) is the main regulator controller, which is used to approximate an ideal computational controller. The compensation controller is designed to compensate for the difference between the ideal computational controller and the FNN controller. A tuning methodology is derived to update weight parts of the FNN. Using Lyapunov law, we derive the decoupled sliding-mode control law and the related parameters adaptive law of FNN. The method can control one-input and multi-output nonlinear systems efficiently. Using this approach, the response of system will converge faster than that of previous reports.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}