Si-Wu He, Chao-ying Liu, Zhe-ying Song, Zeng-Kang Wang
{"title":"Real-time intelligent control of liquid level system based on MCGS and MATLAB","authors":"Si-Wu He, Chao-ying Liu, Zhe-ying Song, Zeng-Kang Wang","doi":"10.1109/ICMLC.2014.7009105","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009105","url":null,"abstract":"Intelligent control has been greatly developed and theoretically researched, but it is usually limited to the off-line simulation research. In order to put advanced control algorithms into practice, using a reliable OPC (OLE for Process Control) technology to connect the field process and control equipment, and to realize the data reading in real time, the specific implementations way to achieve real-time control of field devices by combining with the powerful operation ability of MATLAB and the advantage of real-time data collection and monitor of MCGS configuration software. In this paper, we apply this way to PCS-C type process control device, using Fuzzy PID control algorithm to achieve double-tank water level control, which can achieve good control effect.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android malware detection using the dendritic cell algorithm","authors":"Deniel V. Ng, J. G. Hwang","doi":"10.1109/ICMLC.2014.7009126","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009126","url":null,"abstract":"Most smartphones run on Android OS, which facilitates the installation of third-party applications. Unfortunately, malware also exists for the Android. Malware can perform various harmful activities. In this paper, we have collected the behaviors of 100 Android applications. These collected applications consist of 50 benign applications and 50 pieces of malware. The invoked system calls were logged to serve as the behaviors of these applications. Then, the data were input to the dendritic cell algorithm (DCA). The DCA was inspired by a danger model of the human immune system and is able to detect anomalies. We used the features of the DCA to perform anomaly detection and classified the collected applications as either benign or malicious. Our experiment results showed that the DCA could achieve a higher accuracy than either the decision tree, the naive Bayes, or the support vector machine.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and practice of digital fingerprinting encryption algorithm based on QR code","authors":"Guowei Zhang, Saisai Xu","doi":"10.1109/ICMLC.2014.7009695","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009695","url":null,"abstract":"The common digital fingerprinting encryption algorithm has problems such as the code character is too long and the calculation is complicated, etc. Besides, the fingerprints generated are mostly meaningless binary sequence with bad intuition and no practical value. In this paper, a new type of digital fingerprinting encryption algorithm based on QR code is put forward, and experiments prove that this algorithm has sound resistivity to conspiracy attack and could trace the conspiracy user effectively.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115995278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A chameleon-like two-eyed visual surveillance system","authors":"Jichiang Tsai, Chih-Wei Wang, Che-Cheng Chang, Kou-Chih Hu, Ting-Hsuan Wei","doi":"10.1109/ICMLC.2014.7009701","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009701","url":null,"abstract":"In this paper, we construct a visual surveillance system,in which each monitoring device works like the eyes of a chameleon. Particularly, each device is built based on embedded systems, with the motion tracking and simple stereo matching functions. As the embedded systems lack strong computing capability for image processing, we introduce some methods to reduce the load of the device. More importantly, in our system, all monitoring devices are operated based on a distributed collaborative mechanism to automatically and efficiently assign the proper number of cameras to track an object. In summary, the technologies of computer vision, distributed computation and embedded systems are elaborately integrated into our work.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental study of phase sensitive detection technique in ECT system","authors":"X. Ren, Shi Liu","doi":"10.1109/ICMLC.2014.7009103","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009103","url":null,"abstract":"Electrical capacitance tomography (ECT) techniques have been developed to visualize industrial processes with dielectric materials. Phase sensitive demodulation is a key part of ECT system to improve speed and accuracy. Methods of demodulation are demonstrated in this paper, including analogue and digital methods. The problems about applying digital quadrature demodulation in ECT were simulated by SIMULINK. Validation shows that the digital phase sensitive demodulation is complete enough to meet the requirements of ECT system in accuracy and speed.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new fuzzy multiple criteria decision making method based on likelihood-based comparison relations of hesitant fuzzy linguistic term sets and a-cuts of fuzzy sets","authors":"Li-Wei Lee, Shyi-Ming Chen","doi":"10.1109/ICMLC.2014.7009137","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009137","url":null,"abstract":"In this paper, we propose the concept of likelihood-based comparison relations of hesitant fuzzy linguistic term sets to compare two hesitant fuzzy linguistic term sets based on a-cuts of fuzzy sets. We also propose a new fuzzy multiple criteria decision making method based on likelihood-based comparison relations of hesitant fuzzy linguistic term sets and the a -cuts of fuzzy sets. The proposed fuzzy multiple criteria decision making method has the following advantages: 1) it can overcome the drawback of the existing methods which cannot distinguish the preference order of alternatives in some situations and 2) it allows experts to use a fuzzy target to reflect his/her attitude for increasing the flexibility.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the outpatient waiting time based on CBR algorithm using smartphone","authors":"Yuh-Tzong Liu, Yi-Han Chen, Nei-Phon Wang, Chun-Jung Lin, Yung-An Chen","doi":"10.1109/ICMLC.2014.7009659","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009659","url":null,"abstract":"Many people who live in Taiwan may have the experience of medical treatment so called \"three longer, two shorter\" situations. The \"Three longer\" phenomenon means we must keep in line waiting for registration, waiting to see a doctor in the clinic room and waiting for prescriptions. The \"Two shorter\" phenomenon means a doctor has many patients on his hands so the visit and the in-query time of out-patient diagnostic will be relatively short. With the development of medical information system and the application of the internet, registration and prescription have made a rapid progress. Because the complexity of the disease and the doctor's regular practice of diagnosis, medical institutions usually can't reduce the waiting time for outpatient efficiently. This study will introduce the smart phone apps as the carrier, using Case-Based Reasoning (CBR) algorithm to construct an Expert System, so as to inform patients the right time needed to go to the clinic. For the patients using this apps, we not only can reduce the waiting time but also improve the satisfaction of patients'. Besides, we believe the quality of care will also be improved.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face detection using combination of skin color pixel detection and Viola-Jones face detector","authors":"G. Luh","doi":"10.1109/ICMLC.2014.7009143","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009143","url":null,"abstract":"This paper presents a human face detection scheme by combining a novel hybrid color models and Viola-Jones face detector. A hybrid skin color model RGB-CbCrCg was proposed for classifying skin and non-skin pixels. The extraction of skin region is carried out using a set of bounding rules optimized employing multi-objective differential evolution method. Afterward the segmented face regions are identified using Viola-Jones algorithm built in MATLAB Computer Vision System Toolbox™. The performances of skin and face detection were evaluated using the ECU face and skin database. Experimental results show that the proposed scheme outperforms the other skin color space methods.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129741607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 2D to 3D conversion method based on support vector machine and image classification","authors":"Yudong Guan, Bo-Liang Yu, Chunli Ti, Yan Ding","doi":"10.1109/ICMLC.2014.7009097","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009097","url":null,"abstract":"With the development of 3D technology, converting 2D videos available into 3D videos has been an important way to gain 3D contents. In the conversion, a crucial step is how to obtain a more accurate depth map. This paper proposes a method for depth extraction based on color and geometric information of the original image. Firstly, we generate a qualitative depth map by SVM and classify image scenes into three categories. Then depending on geometric information, a geometric depth map can be generated by vanishing lines detection and gradient plane assignment. At last, we blend two depth maps to get a final depth map, which has more widely application and improves accuracy of depth better.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on pattern encoding of local binary patterns for texture-based image segmentation","authors":"Chih-Hung Wu, Li-Wei Lu, Yao-Yu Li","doi":"10.1109/ICMLC.2014.7009674","DOIUrl":"https://doi.org/10.1109/ICMLC.2014.7009674","url":null,"abstract":"Image segmentation is an important technique for image analysis. For image clustering, the homogeneity of pixel features is usually measured using the Euclidean distance. When textures are used as features for clustering, an encoding scheme that can rationally describe the variations of textures in terms of Euclidean distance, which provides effective clustering results. This study discusses on the problem mentioned above, where the local binary pattern (LBP) is employed as features for clustering. A heuristic algorithm is designed for rearranging the LBP codes. The fuzzy c-means algorithm is used as the clustering method. Some images are applied for evaluation and the results are analyzed. Clustering results using our proposed method and the original LBP encoding are compared. Experimental results show that proper arrangement of LBP encoding improves the performance of image segmentation, without modifying the clustering algorithms.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}