2007 International Conference on Intelligent and Advanced Systems最新文献

筛选
英文 中文
A time and memory efficient way to enumerate cycles in a graph 在图中枚举周期的一种节省时间和内存的方法
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658438
K. Sankar, A. Sarad
{"title":"A time and memory efficient way to enumerate cycles in a graph","authors":"K. Sankar, A. Sarad","doi":"10.1109/ICIAS.2007.4658438","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658438","url":null,"abstract":"Enumerating the cycles in a graph finds numerous applications in communication systems. It is also possible to find given length cycles without enumerating all cycles in the graph. We enumerate the cycles in a directed and undirected graph, in a time and memory efficient manner and make the operations parallelizable, maintaining ease and simplicity to implement.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115722229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Paddy Growth Monitoring with Wireless Sensor Networks 利用无线传感器网络监测水稻生长
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658529
Lim Kheng Kait, Chong Zan Kai, R. Khoshdelniat, S. M. Lim, Ewe Hong Tat
{"title":"Paddy Growth Monitoring with Wireless Sensor Networks","authors":"Lim Kheng Kait, Chong Zan Kai, R. Khoshdelniat, S. M. Lim, Ewe Hong Tat","doi":"10.1109/ICIAS.2007.4658529","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658529","url":null,"abstract":"The emergence of wireless sensor networks and micro-electro-mechanical systems (MEMS) technologies have brought thousands of evolutions to establish connections among human world, nature and computers. This paper presents a system design of Paddy growth monitoring with wireless sensor networks, which aimed to assist farmers in precise agriculture and increase of rice yield.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An HMM-based online recognition system for Farsi handwritten words 基于hmm的波斯语手写文字在线识别系统
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658572
F. Faradji, K. Faez, M. H. Mousavi
{"title":"An HMM-based online recognition system for Farsi handwritten words","authors":"F. Faradji, K. Faez, M. H. Mousavi","doi":"10.1109/ICIAS.2007.4658572","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658572","url":null,"abstract":"In this paper, we propose a method for online Farsi handwritten words recognition. At first, words are broken to their sub-words. Each sub-word is made of some strokes. We assign a tag to each sub-word based on the positions and shapes of its sub-strokes. After that, we classify sub-words according to their tags. Some online features are extracted from the main-stroke after the preprocessing stage. Preprocessing contains operations such as dehooking, smoothing, normalization and boundary box equalization. Recognition process is consisted of some stages. First, the input word is divided into probable constructing sub-words, and recognition process is accomplished for each of them. For each sub-word, we find the class and sub-class of it, based on the tag and an extracted feature respectively. Some other features are extracted from the main-stroke of the sub-word, which are useful for training and testing the hidden Markov models as the classifier. These HMMs are the last level in our recognition system. In this paper, we use a 1000-sub-word database of the most frequently used Farsi words. The performance of the system in finding the classes and sub-classes of the sub-words is 99.45% and 99.91% respectively. The rate of correct performance of the HMMs is 82.96% making the total recognition rate of the system on the database 82.43%.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of hybrid security system with cluster based key management for Wireless Sensor Networks 基于集群密钥管理的无线传感器网络混合安全系统评估
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658417
A. Akram, A. Naureen, R. Riaz, Ki Hyung Kim, H. Farooq
{"title":"Evaluation of hybrid security system with cluster based key management for Wireless Sensor Networks","authors":"A. Akram, A. Naureen, R. Riaz, Ki Hyung Kim, H. Farooq","doi":"10.1109/ICIAS.2007.4658417","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658417","url":null,"abstract":"Security critical applications of wireless sensor networks stipulate more efficient and secure architectures for security. Hybrid security system using both public and private key cryptography along with cluster based key management can be a step further in achieving more security and efficiency at a lower cost. The paper analyzes and evaluates the hybrid security system with cluster based key management for wireless sensor networks.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dimensional analysis for contamination severity assessment on high voltage insulators 高压绝缘子污染程度评定的量纲分析
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658515
A.S. Ahmad, S. Ahmed, S. Shahnawaz Ahmed
{"title":"Dimensional analysis for contamination severity assessment on high voltage insulators","authors":"A.S. Ahmad, S. Ahmed, S. Shahnawaz Ahmed","doi":"10.1109/ICIAS.2007.4658515","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658515","url":null,"abstract":"The environmental pollution which is mainly affected by the weather conditions are the main cause of flashovers on high voltage insulators leading to outages in power systems. It is generally recognized that the worst type of pollution that lead to the contamination flashovers is marine pollution as found in the immediate neighborhood of the coastal regions followed by solid pollution as found in the dense industrial areas. This research is directed towards the study of contamination of insulator under marine pollution. The effects of various meteorological factors on the pollution severity have been investigated thoroughly. The mathematical relations between equivalent salt deposit density (ESDD) with refer to meteorological conditions such as wind speed, rainfall and surface conductivity has been derived using Dimensional Analysis. It has been proved that the Dimensional Analysis technique is suitable for the contamination studies and assessment on the insulators. The predicted ESDD has been compared with the measured for a practical system.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frontal obstacle avoidance of an autonomous subsurface vehicle (ASV) using fuzzy logic method 基于模糊逻辑方法的自动潜航器正面避障研究
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658360
H.F. Fauadi, M. H. Nordin, Z. Zainon
{"title":"Frontal obstacle avoidance of an autonomous subsurface vehicle (ASV) using fuzzy logic method","authors":"H.F. Fauadi, M. H. Nordin, Z. Zainon","doi":"10.1109/ICIAS.2007.4658360","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658360","url":null,"abstract":"Utilization of robots and autonomous vehicles to replace human being in executing remote, difficult, highly risk and dangerous tasks is the niche issue among robotic engineers. In order to develop such application, the main challenge is to integrate the advances of various engineering disciplines. This project proposes the design of frontal obstacle avoidance for ASV using fuzzy logic. This project also compares analyses done between Mamdani and Sugeno methods to control the maneuvering of ASV. This project uses MATLAB as the main designing tool.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent mininig for capturing processes through event logs to represent workflows using FP tree 智能挖掘,通过事件日志捕获进程,使用FP树表示工作流
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658342
M. Sathyanarayana, N. Kavya, N. Naveen
{"title":"Intelligent mininig for capturing processes through event logs to represent workflows using FP tree","authors":"M. Sathyanarayana, N. Kavya, N. Naveen","doi":"10.1109/ICIAS.2007.4658342","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658342","url":null,"abstract":"Data mining applications require an ability to understand unfiltered data embedded in event logs. The scalability of the data, end-user comprehensibility of the results, non-presumption of any canonical data distribution, and insensitivity to the order of input records will determine efficiency of data mining. Contemporary workflow management systems are driven by explicit process models based on completely specified workflow designs. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the actual workflow processes and the processes as perceived by the management. In this paper, we propose a Process Mining Architecture (PROARCH) model which involves capturing processes in a system through event logs containing information about the different processes under execution. We assume that events in logs bear timestamps. But these logs will also contain log of unformatted data which may be dirty data for our model. Hence this information needs to be filtered before further processing. After filtering, the clean data is represented in MXML format and will serve as input to our model. This MXML data is parsed into a Petri net representation. The nodes and transitions, are connected to form a workflow representation. Since the initial input logs are dirty we use FP tree approach to build our workflow model.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low cost capacitive security card system 一种低成本电容式安全卡系统
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658592
M. Rehman, Lee Bee Koon
{"title":"A low cost capacitive security card system","authors":"M. Rehman, Lee Bee Koon","doi":"10.1109/ICIAS.2007.4658592","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658592","url":null,"abstract":"A low cost and reliable capacitive security card system is designed, fabricated and tested. It consists of capacitive card reader system, an integrator, rectifying circuit, an 8051 microcontroller and LED indicators. Initially rectangular patterns of different lengths are being recognized successfully with a success rate of 100%. The patterns on the security card are scanned with a thin conducting plate, which is the part of the reading system, when card is inserted in the reading system. The variations in the heights of the patterns are being converted into voltages with the help of an integrator. Output of the integrator, after rectification, is fed to the ADC of the microcontroller. It is converted into numbers by it and compared with the number stored in the memory of the microcontroller. The designed system is capable of recognizing up to five columns (patterns) in a single row with a maximum number of 99999.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PID dead-time predictor design for industrial DCS systems using Smith rule 应用Smith规则设计工业DCS系统的PID死区预测器
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658548
A. Mehrafrooz, A. Yazdizadeh
{"title":"PID dead-time predictor design for industrial DCS systems using Smith rule","authors":"A. Mehrafrooz, A. Yazdizadeh","doi":"10.1109/ICIAS.2007.4658548","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658548","url":null,"abstract":"A dead-time is usually associated with input and output of the industrial control systems, especially water and wastewater treatment systems. This dead-time is not a fixed time during process function, therefore, a conventional PID controller which is related to this dead-time can not be designed by the conventional methods. An adaptive scheme is designed to control an industrial water and wastewater treatment plant by using Smith adaptive rule. Stability of the proposed adaptive system is proved and the simulation results show the quality performance of the adaptive PID controller.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122547724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Decoupled sliding-mode with fuzzy neural network controller for EHSS velocity control 解耦滑模模糊神经网络控制器用于EHSS速度控制
2007 International Conference on Intelligent and Advanced Systems Pub Date : 2007-11-01 DOI: 10.1109/ICIAS.2007.4658338
S.A. Mohseni, M. A. Shooredeli, M. Teshnehlab
{"title":"Decoupled sliding-mode with fuzzy neural network controller for EHSS velocity control","authors":"S.A. Mohseni, M. A. Shooredeli, M. Teshnehlab","doi":"10.1109/ICIAS.2007.4658338","DOIUrl":"https://doi.org/10.1109/ICIAS.2007.4658338","url":null,"abstract":"In this paper a decoupled sliding-mode with fuzzy neural network controller for a nonlinear system is presented. To divided into two subsystems to achieve asymptotic stability by decoupled method for a class of three order nonlinear system. The fuzzy neural network (FNN) is the main regulator controller, which is used to approximate an ideal computational controller. The compensation controller is designed to compensate for the difference between the ideal computational controller and the FNN controller. A tuning methodology is derived to update weight parts of the FNN. Using Lyapunov law, we derive the decoupled sliding-mode control law and the related parameters adaptive law of FNN. The method can control one-input and multi-output nonlinear systems efficiently. Using this approach, the response of system will converge faster than that of previous reports.","PeriodicalId":228083,"journal":{"name":"2007 International Conference on Intelligent and Advanced Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信