2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)最新文献

筛选
英文 中文
A novel wireless lighting control strategy using RBF neural networks and genetic algorithm 一种基于RBF神经网络和遗传算法的无线照明控制策略
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865782
Yuan Gao, Yaojie Sun, Yandan Lin
{"title":"A novel wireless lighting control strategy using RBF neural networks and genetic algorithm","authors":"Yuan Gao, Yaojie Sun, Yandan Lin","doi":"10.1109/CYBERNETICSCOM.2013.6865782","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865782","url":null,"abstract":"This paper presents an intelligent lighting control system based on a wireless sensor network (WSN). The novel concept of an illuminance matrix (I-matrix) is implemented in the lighting control system of a cockpit. The I-matrix of a target working plane is obtained from some wireless photosensors through an RBF (Radial Basis Function) neural network. Then a genetic algorithm (GA) is used to optimize the distribution and the number of sensors. Calculation results show that the proposed control strategy with I-matrix is more accurate than conventional control practices. Particularly, the application of the I-matrix is useful for the scenario requiring a high quality of illuminance (e. g. a cockpit or an operation room). As a criterion of illuminance quality, the I-matrix is a potential standard for high-quality lighting design, and opens new areas of research in lighting and human factors.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating resilience strategies based on an evolutionary multi-agent system 基于进化多智能体系统的弹性策略评价
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865776
Kazuhiro Minami, Tomoya Tanjo, H. Maruyama
{"title":"Evaluating resilience strategies based on an evolutionary multi-agent system","authors":"Kazuhiro Minami, Tomoya Tanjo, H. Maruyama","doi":"10.1109/CYBERNETICSCOM.2013.6865776","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865776","url":null,"abstract":"Many social infrastructures fail in an unexpected way, and thus it is important to make a system resilient such that it can recover from various damages in a dynamic and flexible way. There seems to be a consensus among many researchers in this field that redundancy, diversity, and adaptability are the three key characteristics of resilient systems that can absorb shocks and recover from damages gracefully. However, it is still not clear how we quantitatively combine those strategies to build a resilient system of a given domain. In this paper, we present an evolutionary multi-agent system for evaluating the effectiveness of those strategies and show several insights drawn from our preliminary results.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust image watermarking using DWT, SVD and Torus automorphism 基于小波变换、奇异值分解和环面自同构的鲁棒图像水印
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865802
K. Kakkirala, S. Chalamala, Jyoti Dhillon
{"title":"A robust image watermarking using DWT, SVD and Torus automorphism","authors":"K. Kakkirala, S. Chalamala, Jyoti Dhillon","doi":"10.1109/CYBERNETICSCOM.2013.6865802","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865802","url":null,"abstract":"Digital watermarking is a process to provide authenticity by hiding a data into an image or audio or document. Hiding of data in an image can be done in frequency domain. Since frequency domain based techniques are more robust against signal processing and geometric attacks than time domain techniques. One such frequency domain technique is developed based on combination of discrete wavelet transform, singular value decomposition and torus automorphism and is presented in this paper. This results prove that this method robust against different attacks and has good PSNR ratio.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Swarm fuzzy inference system and R wave features for ventricular premature beat detection 群模糊推理系统及R波特征在室性早搏检测中的应用
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865790
N. Nuryani, I. Yahya, Anik Lestari
{"title":"Swarm fuzzy inference system and R wave features for ventricular premature beat detection","authors":"N. Nuryani, I. Yahya, Anik Lestari","doi":"10.1109/CYBERNETICSCOM.2013.6865790","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865790","url":null,"abstract":"This article introduces a new strategy to detect a ventricular premature beat (VPB). The strategy utilized a swarm fuzzy inference system (SFIS) and features of the R wave of electrocardiogram. SFIS was a FIS optimized using particle swarm optimization (PSO). The PSO was used to find the optimal parameters of the FIS. The fuzzification part of the FIS used a Gaussian function. The inputs of the FIS were the width and the gradient of the R wave. Using clinical data, the proposed strategy performed well for VPB detection with sensitivity, specificity and accuracy of 99.05%, 99.64% and 99.59%, respectively.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131457770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding of cyberspace using cybernetics: An imperative need for cybersecurity of enterprises 利用控制论理解网络空间:企业网络安全的迫切需要
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865791
T. Vinnakota
{"title":"Understanding of cyberspace using cybernetics: An imperative need for cybersecurity of enterprises","authors":"T. Vinnakota","doi":"10.1109/CYBERNETICSCOM.2013.6865791","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865791","url":null,"abstract":"Cyber-security continue to be at the center stage due to the ever increasing growth in automation and growing cyber attacks in cyberspace of business enterprises. Though cyber-security is at center stage the approaches to deal with it are of fragmented nature. There is a need to gain knowledge and understand the cyberspaces' influences on enterprises cybernetically in order to deal with cyber-security effectively for enterprises' survival, success and further growth. In this paper, we propose a cybernetics approach to study the cyberspace of any enterprise. Demonstrated its usefulness to improve the awareness and understanding of the influences of cyberspace on enterprises to build credible cyber threat detection capabilities and develop effective cyber-security solutions for enterprises.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"36 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113938759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indonesian dialogue management system using information state for independent closed domain 印尼语对话管理系统采用信息状态为独立封闭域
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865775
M. Wijanto, A. Purwarianti
{"title":"Indonesian dialogue management system using information state for independent closed domain","authors":"M. Wijanto, A. Purwarianti","doi":"10.1109/CYBERNETICSCOM.2013.6865775","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865775","url":null,"abstract":"In order to make the development process of a closed domain dialogue system become easier and faster, we proposed an easily independent closed domain dialogue system by using information state approach. To handle the adaptability of domain, we employed the concept of operand, operator and expression. These concepts are used in the knowledge representation and in the information state used in dialogue system. By this, in order to build the dialogue system for a new domain, the modification is only on the knowledge database entry, not the knowledge database structure. The complete architecture of the dialogue system consists of input analyzer, dialogue moves determiner, scenario detection, dialogue resolves, and dialogue manager which combine all results from previous steps in information-state model with knowledge domain to get system response. The interaction between user and system is arranged in the form of scenario which suitable with the information-state model. The scenarios can be handled by this system are direct answer, specification, generalization, and out of topic. This architecture has been tested for each scenario to five different domains, both lecture material and non-lecture material domains.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131531271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic nipple detection based on face detection and ideal proportion female using random forest 基于人脸检测和理想女性比例的随机森林乳头自动检测
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865772
Verapluth Thaweekote, P. Songram, C. Jareanpon
{"title":"Automatic nipple detection based on face detection and ideal proportion female using random forest","authors":"Verapluth Thaweekote, P. Songram, C. Jareanpon","doi":"10.1109/CYBERNETICSCOM.2013.6865772","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865772","url":null,"abstract":"Currently pornographic image on the online world, teenagers and kids can visit easily. Which stimulate sexual desire. Resulting behavior of sexual abuse, enticing a child under the age of 15 years increased, cause problems getting pregnant and sexually transmitted diseases. Pornographic detection is essential to prevent to access through analyzing image content. Many researchers are interested in pornographic detection of nipple using extended Haar-like for extracting the features, color, texture and shape that are used for classification using various algorithms cascaded AdaBoost. However, this disadvantage is the templates for nipple which require a lot of training set and it consumes the time to detect a multiple possible position similar to nipples such as eyes and navel. This research proposed the novel algorithm without using templates for detecting the nipple. Our proposed creates the novel model based on ideal proportion detection. The result of this algorithm shows the high accuracy and reducing the computational time when compares with the existing method.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Compressive sensing-based image encryption with optimized sensing matrix 基于压缩感知的优化感知矩阵图像加密
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865794
Rudy Susanto Endra
{"title":"Compressive sensing-based image encryption with optimized sensing matrix","authors":"Rudy Susanto Endra","doi":"10.1109/CYBERNETICSCOM.2013.6865794","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865794","url":null,"abstract":"The dimentional reduction of the signal can be obtained by projecting the signal into a sensing matrix, the technique is known as Compressive Sensing (CS). The CS also provides a mechanism for data security (encryption) because the signal can only be reconstructed if the dictionary and the sensing matrix are known. This technique is better compared to the conventional technique because the compression and encryption is done simultaneously through the signal projection into the sensing matrix. Moreover the signal projection into the sensing matrix is relatively simple and doesn't need heavy computational load so it will be very effective to implement in a portable device. We proposed a scheme of simultaneous image compression-encryption based on CS by using a novel method of optimized sensing matrix. The simulation results showed that by using optimized sensing matrix improved the quality of reconstructed image compared with random sensing matrix that is usually used in CS-based encryption.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Visual-based fire detection using local binary pattern-three orthogonal planes 基于视觉的局部二值模式-三个正交平面火灾探测
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865801
F. Sthevanie, H. Nugroho, F. A. Yulianto
{"title":"Visual-based fire detection using local binary pattern-three orthogonal planes","authors":"F. Sthevanie, H. Nugroho, F. A. Yulianto","doi":"10.1109/CYBERNETICSCOM.2013.6865801","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865801","url":null,"abstract":"This paper discussed a proposed method to detect fire with the main focus is to extract the fire features to increase the accuracy and using LBP-TOP feature extraction scheme to accelerate the process. The fire features produced by LBP-TOP was modeled by using dustering K-Means method as the reference model when the classification process was done by using K-NN method. By using those methods, the accuracy of the detection process can reach 92% and the computational cost can be reduced.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison between colour models in automatic identification of cane sugar 蔗糖自动识别中颜色模型的比较
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865799
A. R. Putri, Litasari, A. Susanto
{"title":"Comparison between colour models in automatic identification of cane sugar","authors":"A. R. Putri, Litasari, A. Susanto","doi":"10.1109/CYBERNETICSCOM.2013.6865799","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865799","url":null,"abstract":"In automation and standardization of quality of cane sugar in sugar factory, quantized identification process needs to be done. Identification of cane sugar was done based on image of cane sugar. In classification and identification based on image, colour models used could influence success rate of identification. This paper presents comparative study among RGB, HSV, HSI, YCbCr, and L*a*b colour models in automatic identification of cane sugar. System designed could identify 8 kinds of cane sugar based on their image with success rate of 85%. System was designed with Artificial Neural Network classifier with one hidden layer using Levenberg-Marquardt algorithm. Colour and textural features were extracted from 120 images of cane sugar for Artificial Neural Network inputs. HSV was the best colour model for identification, with highest result of 87.5%, followed by YCbCr, L*a*b, and RGB.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131231649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信