{"title":"SVM-based Discriminant Analysis for face recognition","authors":"Sangki Kim, K. Toh, Sangyoun Lee","doi":"10.1109/ICIEA.2008.4582892","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582892","url":null,"abstract":"In this paper, we introduce a novel variant of Linear Discriminant Analysis (LDA) for face recognition. The proposed method attempts to find an optimal LDA matrix by redesigning the between-class scatter matrix incorporating a Support Vector Machine (SVM). Our empirical evaluations show that the proposed method offers noticeable performance improvement over the conventional LDA.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126772003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new architecture for digital copyright protection system based on mobile agent","authors":"Liu Quan, Liu Hong","doi":"10.1109/ICIEA.2008.4582865","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582865","url":null,"abstract":"Mobile agent technology and digital watermark technology compensate each other and play very important roles in the industrial applications. The integration of the mobile agent technology and watermark technology has been intensively investigated in recent years. A new architecture using this integration technology to protect copyright is proposed. This architecture includes four functional blocks: author functional block, user functional block, watermark agent center functional block and mobile agent functional block. In the first functional part, author registers his ownership watermark in copyright management sever (CMS) after embedding the ownership watermark in the work. Then CMS embeds the second watermark in the digital work which is produced by watermark agent center (WAC). This is actually a hidden agent. In the second functional part, user submits detail information about personality and desired digital work to CMS. CMS gives user the digital work and user key according to the input information. In the third functional part, WAC creates the costume-built watermark agents and makes the route strategy. In the last functional part, WAC dispatches the watermark agents to the suspicious hosts and examines its copyright.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126409632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on VRPTW optimizing based on k-means clustering and IGA for electronic commerce","authors":"Chunyu Ren","doi":"10.1109/ICIEA.2008.4582481","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582481","url":null,"abstract":"Vehicle route problem with time windows of logistics distribution is the important step optimizing logistics distribution and indispensability content of electronic commerce activity. For VRPTW optimization under electronic commerce is a special problem that includes many aspects, hybrid strategy is usually introduced to classify and optimize route by two artificial intelligent methods. Therefore, the improved two-phase algorithm needs to be adopted to get solutions. Namely, the customer group can be divided into several regions using k-means algorithm in first phase. And in every region it can be decomposed into small scale subsets according with some restraint conditions using scan algorithm. In second phase, it is route optimization problems of several single TSPTW model. Therefore, the study proposes the improved genetic algorithm. Improved partially matched crossover operators can avoid destroying good gene parts during the course of crossover so as that the algorithm can be convergent to the optimization as whole. According to the traditional genetic algorithm shortcomings of slowly convergent speed, weakly partial searching ability and easily premature, the study adopts the strategy of protecting gene as whole, introduce adopts 2-exchange mutation operator, combine hill-climbing algorithm and construct new genetic algorithm on basis of establishing model of optimizing vehicle route with time windows. New algorithm offers a very effective method to solve problem of distribution vehicle schedule with time windows through the test.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiang Liu, D. Wong, J. Lim, X. Jia, F. Yin, Haizhou Li, Wei Xiong, Tien Yin Wong
{"title":"Optic cup and disk extraction from retinal fundus images for determination of cup-to-disc ratio","authors":"Jiang Liu, D. Wong, J. Lim, X. Jia, F. Yin, Haizhou Li, Wei Xiong, Tien Yin Wong","doi":"10.1109/ICIEA.2008.4582835","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582835","url":null,"abstract":"The ratio of the optic cup to disc (CDR) in retinal fundus images is one of the principal physiological characteristics in the diagnosis of glaucoma. Currently the CDR is manually determined which can be subjective and limits its use in mass screening. To automatically extract the disc, a variational level set method is proposed in this paper. For the cup, two methods making use of color intensity and threshold level set are evaluated. A batch of 73 retinal images from the Singapore Eye Research Centre was used to assess the performance of the determined CDR to the clinical CDR, and it was found that the threshold and variational level set methods produced 97% accuracy in the determined CDR results, an 18% improvement over the color intensity method. The results indicate potential applicability of the methods for automated and objective mass screening for early detection of glaucoma.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic modelling of a two-link flexible manipulator system incorporating payload","authors":"Mohd Ashraf Ahmad, Z. Mohamed, N. Hambali","doi":"10.1109/ICIEA.2008.4582487","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582487","url":null,"abstract":"This paper presents dynamic modelling of a two-link flexible manipulator based on closed-form equations of motion. The kinematic model is based on standard frame transformation matrices describing both rigid rotation and modal displacement, under small deflection assumption. The Lagrangian approach is used to derive the dynamic model of the structure. Links are modelled as Euler-Bernoulli beams with proper clamped-mass boundary conditions. A dynamic model of the system, incorporating structural damping, hub inertia and payload, is developed using finite assumed mode methods. Explicit equations of motions are detailed by assuming two modes of vibration for each link. Moreover, effects of payload on the response of the flexible manipulator are discussed. Extensive results that validate the theoretical derivation are presented in the time and frequency domains.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional safety in building automation and control systems","authors":"Pan Dongbo, Liu Feng, Zhou Xuelian, Li Tao","doi":"10.1109/ICIEA.2008.4582559","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582559","url":null,"abstract":"The building automation and control systems (BACS) help building owners, property managers, and occupants realize their goals in the areas of cost, comfort, convenience, long-term flexibility and marketability. With the merging of computer, communication and control technology in BACS, the devices, communicationpsilas and controllerpsilas failure will lead to functional safety problems. Thus the functional safety depends on the accurately executing the functions of device, communication and controller. First, this paper gives a survey of functional safety in BACS. Possible risks and failures are discussed. Then, a systematic, bottom to up realization method is presented to ensure the function of BACS. It includes a design model of functional safety-related device, several functional safety mechanisms to guarantee the communication reliability. The relevant works such as human management, safety lifecycle are also mentioned.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new intrusion detection method based on Fuzzy HMM","authors":"Yongzhong Li, Yang Ge, Xueyan Jing, Zhao Bo","doi":"10.1109/ICIEA.2008.4582476","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582476","url":null,"abstract":"Because of the excellent performance of the HMM (Hidden Markov Model), it has been widely used in pattern recognition. In recent years, the HMM has also been applied to the intrusion detection. The intrusion detection method based on the HMM is more efficient than other methods. Due to the high false alarm rate in the classical IDS based on HMM, this paper proposes a Fuzzy approach to the Hidden Markov Models (HMM), called Fuzzy Hidden Markov Models (FHMM). It is introduced with the Fuzzy logic. The system has the simplicity and flexibility to adapt pattern changes. With the IDS based on FHMM, its robustness and accurate rate of detection model are greatly improved. For these reasons, a new intrusion detection method based on FHMM was proposed in this paper. The proposed method differs from STIDE in that only one profile is created for the normal behavior of all applications using short sequences of system calls issued by the normal runs of the programs. Subsequent to this, HMM with simple states along with STIDE is used to categorize an unknown programpsilas sequence of system calls to be either normal or an intrusion. The results on 1998 DARPA data show that the our method results in low false positive rate with high detection rate.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115256088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research the effectiveness of neural network for telecom planning prediction","authors":"Zhenyu Zhang, Xiao Xie","doi":"10.1109/ICIEA.2008.4582480","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582480","url":null,"abstract":"Today, the telecom planning prediction based on quantitative analysis is becoming more necessary. It need consider many influential factors, such as the consumption of products, the quality of services, the quantity of customers, the performance of equipment, incomes, investment and so on. To verify and analyze the effectiveness of Neural Network for telecom planning prediction, the model of planning prediction Neural Network design is constructed in the paper. And a case study was implemented in the paper, while a specific city and the practical data were selected as samples for the case.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel dual-section space vector PWM for three-level rectifier","authors":"Wu Wen-jun, Zhong Yan-ru, Wang Jian-yuan, Duan Bo","doi":"10.1109/ICIEA.2008.4582628","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582628","url":null,"abstract":"In two-dimensional abc-coordinates system, the effects of medium vectors and small vectors on the neutral point are analyzed and derived. Because the small vectors in pair have opposite effects on the neutral-point potential (NPP), the medium vectors are considered as the most important factor that lead to the neutral-point potential imbalance (NPPI). The dual-section space vector PWM is proposed in this paper. The NPPI led by medium vectors has been dramatically eliminated in this PWM. At the same time, the four-quadrant mirror-image algorithm and adjustable neutral point balancing factor are introduced to improve the running efficiency of three-level PWM rectifier. The simulating result shows that the algorithms adopted in this paper are correct, and they have made the programming of controller simpler. Specially, the NPP has been excellently balanced too.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital imaging system for physiological analysis by tongue colour inspection","authors":"Lijun Jiang, Wang Xu, Jianfeng Chen","doi":"10.1109/ICIEA.2008.4582836","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582836","url":null,"abstract":"Tongue diagnosis is one of the valuable diagnostic methods in traditional Chinese medicine (TCM). The salient advantage of tongue diagnosis lies in its simplicity and immediacy. However, tongue diagnosis lack of precision due to many reasons, like subjective interpretation of tongue color, etc. This paper presents a survey on recent research status of automated tongue color detection. Then some results of tongue color detection to allow interactive and more objective tongue analysis based on digital imaging and color image processing is introduced. A RGB based color segmentation method is used to segment out the tongue portion. An Asian tongue database with comprehensive information is also constructed.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}