2009 Ninth International Conference on Hybrid Intelligent Systems最新文献

筛选
英文 中文
A Novel Data Purification Algorithm Based on Outlier Mining 一种新的基于离群值挖掘的数据净化算法
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.231
Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao
{"title":"A Novel Data Purification Algorithm Based on Outlier Mining","authors":"Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao","doi":"10.1109/HIS.2009.231","DOIUrl":"https://doi.org/10.1109/HIS.2009.231","url":null,"abstract":"This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm complexity within polynomial complexity.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Application of Intelligent Control to Combustion Control System of CFB Boiler 智能控制在循环流化床锅炉燃烧控制系统中的应用
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.145
Qingjin Meng, B. Xing, Hongliang Yu, Jingjian Wu
{"title":"The Application of Intelligent Control to Combustion Control System of CFB Boiler","authors":"Qingjin Meng, B. Xing, Hongliang Yu, Jingjian Wu","doi":"10.1109/HIS.2009.145","DOIUrl":"https://doi.org/10.1109/HIS.2009.145","url":null,"abstract":"The combustion in circulated fluidized-bed (CFB) boiler is a complex and multi-variables coupling process. It is too difficult to build an exact mathematic model to describe the process. The main stream pressure control is an important subsystem of burning system, and it is difficult for the norm PID algorithm to control it. According to these, the human-simulated intelligent control technique is applied to the main steam pressure. It compensates the disadvantages of traditional control method and had perfect advantages in economy and in reality. The control rules of the controller can be modified, compensated and perfect in the practical operation. The practice shows that this controller has strong self-adaptability.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Developed Restricted Rotation for Binary Trees Transformation 二叉树变换的一种发展的受限旋转
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.23
Ro-Yu Wu, Jou-Ming Chang, Chir-Ho Chang
{"title":"A Developed Restricted Rotation for Binary Trees Transformation","authors":"Ro-Yu Wu, Jou-Ming Chang, Chir-Ho Chang","doi":"10.1109/HIS.2009.23","DOIUrl":"https://doi.org/10.1109/HIS.2009.23","url":null,"abstract":"In this paper, we use four types of restricted rotations for tree transformation proposed by Wu et al [13] and develop their algorithm to transform weight sequences between any two binary trees. Converting a source tree to a destination tree, it is not necessary to rotate each pair of corresponding nodes whose weights are the same. From the proposed algorithm, we can also obtain an upper bound of n - 1 between any two binary trees.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSB Algorithm Research Based on Chaos 基于混沌的LSB算法研究
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.201
Guang-ming Yang, Yang Zhou
{"title":"LSB Algorithm Research Based on Chaos","authors":"Guang-ming Yang, Yang Zhou","doi":"10.1109/HIS.2009.201","DOIUrl":"https://doi.org/10.1109/HIS.2009.201","url":null,"abstract":"In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the Least Significant Bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable and robust to attacks; it can improve the performance of image watermarking.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link 基于E1链路的嵌入式智能网络自愈设备的研究与实现
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.157
Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li
{"title":"Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link","authors":"Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li","doi":"10.1109/HIS.2009.157","DOIUrl":"https://doi.org/10.1109/HIS.2009.157","url":null,"abstract":"An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper. The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure. The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Design of Embedded VideoTelephone Based on PJSIP Stack 基于PJSIP栈的嵌入式可视电话软件设计
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.261
Lifeng Wei, Qinghui Wang, Hongwei Ren
{"title":"Software Design of Embedded VideoTelephone Based on PJSIP Stack","authors":"Lifeng Wei, Qinghui Wang, Hongwei Ren","doi":"10.1109/HIS.2009.261","DOIUrl":"https://doi.org/10.1109/HIS.2009.261","url":null,"abstract":"Considering the high requirement of the ability to process data, BF561 is chosen as hardware platform, which is the new microprocessor especially designed for multimedia application, so are the embedded operation system uClinux whose kernel can be configured freely and the PJSIP stack to develop the endpoint. The video telephone endpoint is achieved which integrates software and hardware, transmit data through networks, has lower power consumption. By means of online test, this endpoint works smoothly.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Concealment Searching Model in P2P Network P2P网络中一种有效的隐藏搜索模型
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.194
Hongfeng Zhu, Tianhua Liu, Zhenhua Tan
{"title":"An Efficient Concealment Searching Model in P2P Network","authors":"Hongfeng Zhu, Tianhua Liu, Zhenhua Tan","doi":"10.1109/HIS.2009.194","DOIUrl":"https://doi.org/10.1109/HIS.2009.194","url":null,"abstract":"Abstract With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay. Aimed at the privacy preservation of searching content in P2P network, especially the network without searching server, a concealment searching model based on one-way function and Soundex algorithm is proposed. It can protect searching content of peers and resist attacks of snooping, replay, disguise and so on, meanwhile the model support accurate search and fuzzy search. According to the analysis, this concealment searching model achieves relatively high security as well as searching effectively.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies 基于规则的正则EL+本体查询方法的实现与评估
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.314
Yuting Zhao, Jeff Z. Pan, Y. Ren
{"title":"Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies","authors":"Yuting Zhao, Jeff Z. Pan, Y. Ren","doi":"10.1109/HIS.2009.314","DOIUrl":"https://doi.org/10.1109/HIS.2009.314","url":null,"abstract":"Recent years have witnessed the wide recognition of the importance of ontology and rule in the AI research. In this paper, we report our implementation and evaluation of a rule-based approach to querying regular EL+, a restriction of a well known description logics based ontology language EL+, by only allowing regular role axioms. It is known that, without such a restriction, query answering in EL+ in general is undividable. In our approach, a regular EL+ ontology is first translated into a logic program which contains a set of rules, and then by forward chaining reasoning the pseudo model of the above logic program is calculated. Query answering for EL+ is rewritten to instance checking in the pseudo model of a logic program. To the best of our knowledge, this is the first report of implementation and evaluation for regular EL+ ontologism.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography 基于光学相干层析成像的海水珍珠珍珠层厚度自动测量
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.72
Chengkun Xue, Yankui Sun, Daoshun Wang, Peng Li
{"title":"Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography","authors":"Chengkun Xue, Yankui Sun, Daoshun Wang, Peng Li","doi":"10.1109/HIS.2009.72","DOIUrl":"https://doi.org/10.1109/HIS.2009.72","url":null,"abstract":"The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using OCT raw data. This approach made use of the signal characteristic of OCT scan line, integrated with support vector machine (SVM), hidden markov model (HMM) and circle fitting technologies to measure the thickness of the nacreous layer of seawater pearls. The experimental results show this approach is accurate and adaptable.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"89 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Self-Reference Watermarking Scheme Based on Wet Paper Coding 基于湿纸编码的自参考水印方案
2009 Ninth International Conference on Hybrid Intelligent Systems Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.52
Chinchen Chang, Pei-Yu Lin, Jung-San Lee
{"title":"A Self-Reference Watermarking Scheme Based on Wet Paper Coding","authors":"Chinchen Chang, Pei-Yu Lin, Jung-San Lee","doi":"10.1109/HIS.2009.52","DOIUrl":"https://doi.org/10.1109/HIS.2009.52","url":null,"abstract":"Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image integrity. For achieving these purposes, we first utilize the concept of self-reference to preserve the significant information of a protected image. Then we embed the information into the protected image using the technique of wet paper coding. According to experimental results, the new scheme is highly sensitive to detect and locate the tampered area. In particular, the results show that the quality of recovery image is satisfactory.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信