2008 3rd IEEE Conference on Industrial Electronics and Applications最新文献

筛选
英文 中文
SVM-based Discriminant Analysis for face recognition 基于svm的人脸识别判别分析
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582892
Sangki Kim, K. Toh, Sangyoun Lee
{"title":"SVM-based Discriminant Analysis for face recognition","authors":"Sangki Kim, K. Toh, Sangyoun Lee","doi":"10.1109/ICIEA.2008.4582892","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582892","url":null,"abstract":"In this paper, we introduce a novel variant of Linear Discriminant Analysis (LDA) for face recognition. The proposed method attempts to find an optimal LDA matrix by redesigning the between-class scatter matrix incorporating a Support Vector Machine (SVM). Our empirical evaluations show that the proposed method offers noticeable performance improvement over the conventional LDA.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126772003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new architecture for digital copyright protection system based on mobile agent 一种基于移动代理的数字版权保护系统新架构
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582865
Liu Quan, Liu Hong
{"title":"A new architecture for digital copyright protection system based on mobile agent","authors":"Liu Quan, Liu Hong","doi":"10.1109/ICIEA.2008.4582865","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582865","url":null,"abstract":"Mobile agent technology and digital watermark technology compensate each other and play very important roles in the industrial applications. The integration of the mobile agent technology and watermark technology has been intensively investigated in recent years. A new architecture using this integration technology to protect copyright is proposed. This architecture includes four functional blocks: author functional block, user functional block, watermark agent center functional block and mobile agent functional block. In the first functional part, author registers his ownership watermark in copyright management sever (CMS) after embedding the ownership watermark in the work. Then CMS embeds the second watermark in the digital work which is produced by watermark agent center (WAC). This is actually a hidden agent. In the second functional part, user submits detail information about personality and desired digital work to CMS. CMS gives user the digital work and user key according to the input information. In the third functional part, WAC creates the costume-built watermark agents and makes the route strategy. In the last functional part, WAC dispatches the watermark agents to the suspicious hosts and examines its copyright.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126409632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on VRPTW optimizing based on k-means clustering and IGA for electronic commerce 基于k-均值聚类和IGA的电子商务VRPTW优化研究
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582481
Chunyu Ren
{"title":"Research on VRPTW optimizing based on k-means clustering and IGA for electronic commerce","authors":"Chunyu Ren","doi":"10.1109/ICIEA.2008.4582481","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582481","url":null,"abstract":"Vehicle route problem with time windows of logistics distribution is the important step optimizing logistics distribution and indispensability content of electronic commerce activity. For VRPTW optimization under electronic commerce is a special problem that includes many aspects, hybrid strategy is usually introduced to classify and optimize route by two artificial intelligent methods. Therefore, the improved two-phase algorithm needs to be adopted to get solutions. Namely, the customer group can be divided into several regions using k-means algorithm in first phase. And in every region it can be decomposed into small scale subsets according with some restraint conditions using scan algorithm. In second phase, it is route optimization problems of several single TSPTW model. Therefore, the study proposes the improved genetic algorithm. Improved partially matched crossover operators can avoid destroying good gene parts during the course of crossover so as that the algorithm can be convergent to the optimization as whole. According to the traditional genetic algorithm shortcomings of slowly convergent speed, weakly partial searching ability and easily premature, the study adopts the strategy of protecting gene as whole, introduce adopts 2-exchange mutation operator, combine hill-climbing algorithm and construct new genetic algorithm on basis of establishing model of optimizing vehicle route with time windows. New algorithm offers a very effective method to solve problem of distribution vehicle schedule with time windows through the test.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optic cup and disk extraction from retinal fundus images for determination of cup-to-disc ratio 从视网膜眼底图像中提取杯盘以确定杯盘比
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582835
Jiang Liu, D. Wong, J. Lim, X. Jia, F. Yin, Haizhou Li, Wei Xiong, Tien Yin Wong
{"title":"Optic cup and disk extraction from retinal fundus images for determination of cup-to-disc ratio","authors":"Jiang Liu, D. Wong, J. Lim, X. Jia, F. Yin, Haizhou Li, Wei Xiong, Tien Yin Wong","doi":"10.1109/ICIEA.2008.4582835","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582835","url":null,"abstract":"The ratio of the optic cup to disc (CDR) in retinal fundus images is one of the principal physiological characteristics in the diagnosis of glaucoma. Currently the CDR is manually determined which can be subjective and limits its use in mass screening. To automatically extract the disc, a variational level set method is proposed in this paper. For the cup, two methods making use of color intensity and threshold level set are evaluated. A batch of 73 retinal images from the Singapore Eye Research Centre was used to assess the performance of the determined CDR to the clinical CDR, and it was found that the threshold and variational level set methods produced 97% accuracy in the determined CDR results, an 18% improvement over the color intensity method. The results indicate potential applicability of the methods for automated and objective mass screening for early detection of glaucoma.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Dynamic modelling of a two-link flexible manipulator system incorporating payload 含载荷的两连杆柔性机械臂系统动力学建模
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582487
Mohd Ashraf Ahmad, Z. Mohamed, N. Hambali
{"title":"Dynamic modelling of a two-link flexible manipulator system incorporating payload","authors":"Mohd Ashraf Ahmad, Z. Mohamed, N. Hambali","doi":"10.1109/ICIEA.2008.4582487","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582487","url":null,"abstract":"This paper presents dynamic modelling of a two-link flexible manipulator based on closed-form equations of motion. The kinematic model is based on standard frame transformation matrices describing both rigid rotation and modal displacement, under small deflection assumption. The Lagrangian approach is used to derive the dynamic model of the structure. Links are modelled as Euler-Bernoulli beams with proper clamped-mass boundary conditions. A dynamic model of the system, incorporating structural damping, hub inertia and payload, is developed using finite assumed mode methods. Explicit equations of motions are detailed by assuming two modes of vibration for each link. Moreover, effects of payload on the response of the flexible manipulator are discussed. Extensive results that validate the theoretical derivation are presented in the time and frequency domains.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Functional safety in building automation and control systems 楼宇自动化和控制系统的功能安全
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582559
Pan Dongbo, Liu Feng, Zhou Xuelian, Li Tao
{"title":"Functional safety in building automation and control systems","authors":"Pan Dongbo, Liu Feng, Zhou Xuelian, Li Tao","doi":"10.1109/ICIEA.2008.4582559","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582559","url":null,"abstract":"The building automation and control systems (BACS) help building owners, property managers, and occupants realize their goals in the areas of cost, comfort, convenience, long-term flexibility and marketability. With the merging of computer, communication and control technology in BACS, the devices, communicationpsilas and controllerpsilas failure will lead to functional safety problems. Thus the functional safety depends on the accurately executing the functions of device, communication and controller. First, this paper gives a survey of functional safety in BACS. Possible risks and failures are discussed. Then, a systematic, bottom to up realization method is presented to ensure the function of BACS. It includes a design model of functional safety-related device, several functional safety mechanisms to guarantee the communication reliability. The relevant works such as human management, safety lifecycle are also mentioned.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new intrusion detection method based on Fuzzy HMM 一种新的基于模糊HMM的入侵检测方法
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582476
Yongzhong Li, Yang Ge, Xueyan Jing, Zhao Bo
{"title":"A new intrusion detection method based on Fuzzy HMM","authors":"Yongzhong Li, Yang Ge, Xueyan Jing, Zhao Bo","doi":"10.1109/ICIEA.2008.4582476","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582476","url":null,"abstract":"Because of the excellent performance of the HMM (Hidden Markov Model), it has been widely used in pattern recognition. In recent years, the HMM has also been applied to the intrusion detection. The intrusion detection method based on the HMM is more efficient than other methods. Due to the high false alarm rate in the classical IDS based on HMM, this paper proposes a Fuzzy approach to the Hidden Markov Models (HMM), called Fuzzy Hidden Markov Models (FHMM). It is introduced with the Fuzzy logic. The system has the simplicity and flexibility to adapt pattern changes. With the IDS based on FHMM, its robustness and accurate rate of detection model are greatly improved. For these reasons, a new intrusion detection method based on FHMM was proposed in this paper. The proposed method differs from STIDE in that only one profile is created for the normal behavior of all applications using short sequences of system calls issued by the normal runs of the programs. Subsequent to this, HMM with simple states along with STIDE is used to categorize an unknown programpsilas sequence of system calls to be either normal or an intrusion. The results on 1998 DARPA data show that the our method results in low false positive rate with high detection rate.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115256088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Research the effectiveness of neural network for telecom planning prediction 研究了神经网络在电信规划预测中的有效性
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582480
Zhenyu Zhang, Xiao Xie
{"title":"Research the effectiveness of neural network for telecom planning prediction","authors":"Zhenyu Zhang, Xiao Xie","doi":"10.1109/ICIEA.2008.4582480","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582480","url":null,"abstract":"Today, the telecom planning prediction based on quantitative analysis is becoming more necessary. It need consider many influential factors, such as the consumption of products, the quality of services, the quantity of customers, the performance of equipment, incomes, investment and so on. To verify and analyze the effectiveness of Neural Network for telecom planning prediction, the model of planning prediction Neural Network design is constructed in the paper. And a case study was implemented in the paper, while a specific city and the practical data were selected as samples for the case.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel dual-section space vector PWM for three-level rectifier 一种用于三电平整流器的新型双段空间矢量PWM
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582628
Wu Wen-jun, Zhong Yan-ru, Wang Jian-yuan, Duan Bo
{"title":"A novel dual-section space vector PWM for three-level rectifier","authors":"Wu Wen-jun, Zhong Yan-ru, Wang Jian-yuan, Duan Bo","doi":"10.1109/ICIEA.2008.4582628","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582628","url":null,"abstract":"In two-dimensional abc-coordinates system, the effects of medium vectors and small vectors on the neutral point are analyzed and derived. Because the small vectors in pair have opposite effects on the neutral-point potential (NPP), the medium vectors are considered as the most important factor that lead to the neutral-point potential imbalance (NPPI). The dual-section space vector PWM is proposed in this paper. The NPPI led by medium vectors has been dramatically eliminated in this PWM. At the same time, the four-quadrant mirror-image algorithm and adjustable neutral point balancing factor are introduced to improve the running efficiency of three-level PWM rectifier. The simulating result shows that the algorithms adopted in this paper are correct, and they have made the programming of controller simpler. Specially, the NPP has been excellently balanced too.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital imaging system for physiological analysis by tongue colour inspection 舌色检测生理分析数字成像系统
2008 3rd IEEE Conference on Industrial Electronics and Applications Pub Date : 2008-06-03 DOI: 10.1109/ICIEA.2008.4582836
Lijun Jiang, Wang Xu, Jianfeng Chen
{"title":"Digital imaging system for physiological analysis by tongue colour inspection","authors":"Lijun Jiang, Wang Xu, Jianfeng Chen","doi":"10.1109/ICIEA.2008.4582836","DOIUrl":"https://doi.org/10.1109/ICIEA.2008.4582836","url":null,"abstract":"Tongue diagnosis is one of the valuable diagnostic methods in traditional Chinese medicine (TCM). The salient advantage of tongue diagnosis lies in its simplicity and immediacy. However, tongue diagnosis lack of precision due to many reasons, like subjective interpretation of tongue color, etc. This paper presents a survey on recent research status of automated tongue color detection. Then some results of tongue color detection to allow interactive and more objective tongue analysis based on digital imaging and color image processing is introduced. A RGB based color segmentation method is used to segment out the tongue portion. An Asian tongue database with comprehensive information is also constructed.","PeriodicalId":309894,"journal":{"name":"2008 3rd IEEE Conference on Industrial Electronics and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信