{"title":"A Clustering-Based Multiple Ant Colony System for the Waste Collection Vehicle Routing Problems","authors":"Jie Liu, Yanfeng He","doi":"10.1109/ISCID.2012.197","DOIUrl":"https://doi.org/10.1109/ISCID.2012.197","url":null,"abstract":"The waste collection vehicle routing problems with time windows and intermediate facilities (WCVRPTW-IF) is actually belong to a well-known generalization of VRP, the Multi-Depot Vehicle Routing Problem with Inter-Depot Routes (MDVRPI), which is a combinatorial optimization problem and holds a central place in reverse logistics management. in order to improve the route compactness, which is very important in practical application, we presents a clustering-based multiple ant colony system approach called CMACS algorithm to solve CVRPTW-IF. Our CMACS possesses a new strategy to construct solutions, called clustering-based strategy, and mutation operation. Tests are conducted on two standard instances. the results show that CMACS algorithm exhibits a robust behavior and the clustering-based strategy is effective.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ya Zhou, Shenghao Jing, Guimin Huang, Shaozhong Liu, Yan Zhang
{"title":"A Correcting Model Based on Tribayes for Real-Word Errors in English Essays","authors":"Ya Zhou, Shenghao Jing, Guimin Huang, Shaozhong Liu, Yan Zhang","doi":"10.1109/ISCID.2012.108","DOIUrl":"https://doi.org/10.1109/ISCID.2012.108","url":null,"abstract":"This paper addresses the problem of real-word spelling errors, and also the problem of omission of effective features due to deficiency of training set in spelling correction. then a method called RCW (real-word correction with Word Net) based on Tribayes is introduced, and it solves these problems to a certain extent. Drawing upon the context information, the score of ambiguous words are calculated and regarded as decisive factor for real-word errors correction in RCW. Moreover, the synonyms of the effective features ignored are extracted from Word Net, and we use them as feature so as to improve the accuracy of real-word errors correction. Experiment shows that RCW is able to provide a better performance than Microsoft Word 2007 on real-word errors correction.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Holistic and Object-Based Approaches for Scene Classification","authors":"Zenghai Chen, Z. Chi, Hong Fu, D. Feng","doi":"10.1109/ISCID.2012.25","DOIUrl":"https://doi.org/10.1109/ISCID.2012.25","url":null,"abstract":"There are two main approaches for scene classification: holistic and object-based. Holistic approach is good at representing scenes with simple content. However, since it does not take into account the internal object relationship, holistic approach does not well characterize complex scenes with multiple objects. by contrast, object-based approach estimates the scene class by analyzing the object co-occurrence information, as a result of which it is advantageous in characterizing scenes with complex content. but object-based approach is not good at classifying simple scenes. in this paper, we combine holistic and object-based approaches for scene classification. the proposed combinatory approach is able to take advantages of the two approaches. Several state-of-the-art holistic and object-based approaches are compared. the experiments conducted on a widely-used scene dataset demonstrate the superiors performance of the combinatory approach.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Design of Fiber-Optic Sagnac Current Sensor","authors":"Hui Cao, N. Shi, Jintao Xu","doi":"10.1109/ISCID.2012.174","DOIUrl":"https://doi.org/10.1109/ISCID.2012.174","url":null,"abstract":"The principle of in-line Sagnac interferometer current sensor is presented. To simplify the modulation and eliminate the error caused by cross coupling, a new structure of current sensor is proposed here. Two end mirrored sensing fibers are winded around the conductor reversely. The modulating is much simpler and a simple analysis using Jones matrix has shown that this current sensor is feasible.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"550 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yun-yuan Dong, Yang Jun, Qi-jun Liu, Zhenghua Wang
{"title":"From the Topological View to Explain Why False Hub is Not Essential","authors":"Yun-yuan Dong, Yang Jun, Qi-jun Liu, Zhenghua Wang","doi":"10.1109/ISCID.2012.29","DOIUrl":"https://doi.org/10.1109/ISCID.2012.29","url":null,"abstract":"Centrality-lethality rule demonstrates that proteins with high degree in the protein-protein interaction (PPI) network are more likely to be essential than those selected by chance. Nevertheless, in PPI network, there are still many proteins with high degree are not essential (false hubs). Comparing the difference between false hubs and essential hubs from topological perspective, such as centrality measures, damage, clustering coefficient and interactions between neighbors, there are distinguishable significant properties of false hubs. False hubs have lower sub graph centrality and less interactions between neighbors, which could explain why they are not essential in some extent.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Illumination Invariant Face Recognition by Local Image Descriptor in Logarithm Domain","authors":"Shun Li, Fei Long, Xuefeng Cheng, Jie Song","doi":"10.1109/ISCID.2012.58","DOIUrl":"https://doi.org/10.1109/ISCID.2012.58","url":null,"abstract":"Making recognition more reliable under uncontrolled lighting conditions is one of great challenges for practical face recognition systems. In this paper, inspired by the local binary pattern, we present a simple but effective illumination invariant image descriptor in the logarithm domain. In the proposed approach, the logarithm transform is used firstly. Then the subtraction of each pixel with the neighborhood is implemented. Based on the reflectance model [2], and the assuming that the illumination is constant if the facet is small enough, the differentials are illumination invariant and can be treated as the illumination invariant features. In order to make the recognition task simpler, the sum of the differentials of each pixel with the neighborhood is considered as each pixel's new vale and we use the new image to recognize directly. The experimental results on the Yale B and Extended Yale B prove the out performance of the proposed method compared to other existing methods.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"2154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust -Based Collaborative Filtering Algorithm","authors":"Xiaowei Xu, Fudong Wang","doi":"10.1109/ISCID.2012.88","DOIUrl":"https://doi.org/10.1109/ISCID.2012.88","url":null,"abstract":"The rapid development of internet has brought us into the era of information explosion, which brings the widespread application of the personalized recommendation system. Collaborative filtering recommendation algorithm is the most widely used algorithms in the personalized recommended system, but it faces problems like the data sparsity, cold start,\" idler\" attack. with the development of social network, many e-commerce sites, social network sites introduce the trust mechanism, which becomes the new approach to overcome the problems of the traditional collaborative filtering algorithms. This paper first introduces the collaborative filtering recommendation algorithm and the existing problems, and then summarizes the current trust based collaborative filtering algorithms. for the trust based collaborative filtering algorithms, this paper summarizes the trust expressions and metrics, and focus on analyzing the representative trust models.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Algorithm Against A/D and D/A Attacks","authors":"Yu Huang, Chao Zhou, He Sun","doi":"10.1109/ISCID.2012.214","DOIUrl":"https://doi.org/10.1109/ISCID.2012.214","url":null,"abstract":"In this paper, an audio watermarking algorithm is proposed which can resistant to A/D and D/A attacks. In the proposed algorithm, the randomized watermark image is coded based on OFDM. Then orthogonal transformation is used to reduce the PARR of the coded signal. The obtained watermark sequence is embedded into the audio based on the energy ratio of the wavelet coefficients in each audio period. The experiment result shows that the algorithm has good robustness and the watermark has better imperceptibility.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm of Cigarette Authentication Based on Morphological Processing and SVM","authors":"Yuanyuan Zhang, Guangmin Sun, Qian Ren, Dequn Zhao","doi":"10.1109/ISCID.2012.199","DOIUrl":"https://doi.org/10.1109/ISCID.2012.199","url":null,"abstract":"It is obvious that the characters are illegible and the printing is rough on the package of fake cigarettes compared to genuine ones. According to the differences of comparison, we can make a two-class classifier to conduct cigarette authentication. in this paper, we firstly both extract morphological features of fake and genuine cigarettes and then use them as training sample sets to train a two-class SVM classifier. This algorithm has been tested on five brands of cigarettes and it gives results with more than 95% accuracy.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Vehicle Detection Algorithm Based on Three-Frame Differencing and Background Subtraction","authors":"Haiying Zhang, Kun Wu","doi":"10.1109/ISCID.2012.45","DOIUrl":"https://doi.org/10.1109/ISCID.2012.45","url":null,"abstract":"A vehicle detection algorithm based on three-frame differencing and background subtraction is presented in this paper. Firstly, improved GMM is for background subtraction, then the moving object region is gained using background subtraction, and then the background subtraction is combined with three-frame differencing to detect the motion information. The simulation results show that the proposed algorithm runs veraciously and can lower the false detection rate, and fits for real time detection.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}