2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)最新文献

筛选
英文 中文
Indoor Emergency Evacuation Model Based on Artificial Bee Colony Algorithm 基于人工蜂群算法的室内紧急疏散模型
Xinlu Zong, Jiayuan Du, Wei Liu, Lu Zhang, Qian Huang
{"title":"Indoor Emergency Evacuation Model Based on Artificial Bee Colony Algorithm","authors":"Xinlu Zong, Jiayuan Du, Wei Liu, Lu Zhang, Qian Huang","doi":"10.1109/IDAACS.2019.8924263","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924263","url":null,"abstract":"In order to quickly and efficiently simulate the crowd movement process under the evacuation scene, so as to reduce the casualties in emergency evacuation, this article proposes an indoor emergency evacuation model based on the improved artificial swarm algorithm. In this article, the cellular automata (CA) model is used to establish the evacuation environment, and then the artificial bee colony (ABC) algorithm is used to simulate the crowd evacuation. However, due to too many obstacles existing in the neighboring cells of some position, the individual in that position have to wait. If the distance equation is used to calculate the fitness, it may cause other individuals to choose these positions as new position and repeat the same mistake above. To reduce the occurrence of such cases, we improve the fitness function of the ABC algorithm. In the fitness function, the factors of attraction and repulsion force in social force model are introduced. And on the basis of the ABC algorithm, we propose the visual employed bee. The visual employed bee leads the onlooker bee to evacuate, so as to improve the efficiency of evacuation. The research results of this article can provide ideas for evacuation modeling and useful guidance for formulating evacuation strategies to reduce evacuation time and disaster losses.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Virtual Biomimetic Network: a Topology for Resilient Intelligent Wireless Sensor Networks 三维虚拟仿生网络:弹性智能无线传感器网络的拓扑结构
Y. E. Ahmed, K. Adjallah, Magdi B.M. Amin
{"title":"3D Virtual Biomimetic Network: a Topology for Resilient Intelligent Wireless Sensor Networks","authors":"Y. E. Ahmed, K. Adjallah, Magdi B.M. Amin","doi":"10.1109/IDAACS.2019.8924232","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924232","url":null,"abstract":"Wireless data communication has a key role in any updated information technology-based project. Mobility, flexibility, scalability, and easy-to-install are the main features of wireless data acquisition systems. While the limited lifetime, availability, failure risk, and reliability are still significant challenges. Inspired by the spider webs, as an attractive natural communication topology, this work proposes using the spider webs topology to design reliable and resilient, intelligent wireless sensor networks to be implemented for wireless data acquisition, aiming to provide promising solutions for such problems. The paper provides several definitions for innovated concepts and relevant notations such as the virtual thread, virtual thread thickness, virtual thread density, sensor nodes and base station deployment, data shortest path, data path resiliency, and reliability, from spider webs point of view. Then, it describes the significant research challenges to be addressed for applicable 3D Virtual spider webs. Also, it illustrates the customization approach of 3D virtual spider webs of wireless data acquisition for service, security, resources planning, and decision making.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Optimum Placement of Access Points in Indoor Positioning Systems 室内定位系统中接入点的最佳放置方法
R. Voronov, A. Moschevikin, A. Sikora
{"title":"A Method for Optimum Placement of Access Points in Indoor Positioning Systems","authors":"R. Voronov, A. Moschevikin, A. Sikora","doi":"10.1109/IDAACS.2019.8924405","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924405","url":null,"abstract":"When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessing the Success of R&D Projects and Innovation Projects through Project Management Life Cycle 通过项目管理生命周期评估研发项目和创新项目的成功
Mahboobeh Ramezani Farokhad, J. Otegi-Olaso, Leonardo Sastoque Pinilla, N. Toledo, L. N. L. Lacalle
{"title":"Assessing the Success of R&D Projects and Innovation Projects through Project Management Life Cycle","authors":"Mahboobeh Ramezani Farokhad, J. Otegi-Olaso, Leonardo Sastoque Pinilla, N. Toledo, L. N. L. Lacalle","doi":"10.1109/idaacs.2019.8924298","DOIUrl":"https://doi.org/10.1109/idaacs.2019.8924298","url":null,"abstract":"The success of R&D projects and innovation projects have a significant effect on technology enhancement and new product development, while developing project success criteria and customizing methods to measure the project success for R&D projects and innovation projects is a demanding task. In addition, the late assessment of project success in R&D projects and innovation projects has been associated with noticeable waste in time and budget. This research is based on previous studies of the authors that customized the new hybrid methodology to manage R&D&I projects in CFAA and validated the project success dimensions and criteria. In the previous researches of authors the hybrid project management methodology for R&D&I projects was developed and the project success dimensions and criteria were defined. This research aimed to answer the following question regarding the R&D&I project success evaluation. When is an appropriate time to assess the project success? Apparently the late assessment of project success is associated with significant drawbacks, therefore, the assessment of project success during the project management life cycle is the purpose of this research. The research methodology is based on the survey regarding the assessment of the project success from the project manager's perspective. The project's success criteria in the survey were translated into qualitative questions ranked through Likert scale and the survey was constructed through reviewing the literature regarding the project success criteria. The validity and reliability of survey were confirmed through smart PLS software to validate the relevancy of questions to measure the contribution of each project success dimensions in the project's success. Finally, the extension of the Hybrid R&D&I project management methodology is proposed which contains the gates to assess the project success criteria by means of this survey in each gate during the project management life cycle.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115655988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Abnormal Event Detection in Video Based on SVDD 基于SVDD的视频异常事件检测
Xinlu Zong, Lu Zhang, Jiayuan Du, Liu Wei, Qian Huang
{"title":"Abnormal Event Detection in Video Based on SVDD","authors":"Xinlu Zong, Lu Zhang, Jiayuan Du, Liu Wei, Qian Huang","doi":"10.1109/IDAACS.2019.8924464","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924464","url":null,"abstract":"Abnormal event detection, as a hot research field in intelligent video monitoring system, has attracted many researchers' attention in recent years. In order to overcome the shortcomings of the semi-supervised model, namely the training sample is difficult to contain all possible situations, leading to the occurrence of error detection, we propose a method based on support vector data description (SVDD). The principle of the method is to train the model with normal data and abnormal data respectively to obtain two SVDD models, and then judge whether there are abnormal events according to the results of the two models. This method has been tested by existing data sets and achieved good results.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114369283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical Model of the Compact Inertial Navigation System of the Robot 机器人紧凑型惯性导航系统的数学模型
A. Lagunov, A. Orlov
{"title":"Mathematical Model of the Compact Inertial Navigation System of the Robot","authors":"A. Lagunov, A. Orlov","doi":"10.1109/IDAACS.2019.8924276","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924276","url":null,"abstract":"The article describes the mathematical apparatus of the inertial navigation system, developed algorithms for the functioning of the navigation system, in particular, motion detection and correction of inertial navigation system readings, which allow to improve the accuracy of coordinates, as well as the method of integrating data from a strapless inertial navigation system and tachometers based on Kalman filter. Based on the mathematical model, we built a flowchart of the navigation system operating in the form of functional diagrams by the DFD methodology. Based on the algorithm, we created a prototype of a robot with an inertial navigation system. The tests of the robot were successful.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117173395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method of Fraudster Fingerprint Formation During Mobile Application Installations 在安装流动应用程序时,欺诈者指纹的形成方法
T. Polhul, A. Yarovyi
{"title":"Method of Fraudster Fingerprint Formation During Mobile Application Installations","authors":"T. Polhul, A. Yarovyi","doi":"10.1109/IDAACS.2019.8924369","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924369","url":null,"abstract":"This study aimed to develop a method of fraudster fingerprint formation during mobile application installations, based on a fuzzy model for fraudster fingerprint formation and algorithms of its use for fraudster fingerprint formation. This method allows determining the reason of labeling user by a particular class during fraud detection. The use of the developed method in fraud detection tasks makes it possible to correctly identify 99.56% of users in general and 80.43% of correctly determined fraudsters in particular and speed up the fraud detection process.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion 格数据分析:不可约序集与MacNeille补全
G. Markowsky, L. Markowsky
{"title":"Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion","authors":"G. Markowsky, L. Markowsky","doi":"10.1109/IDAACS.2019.8924393","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924393","url":null,"abstract":"Automated and semi-automated systems that derive actionable information from massive, heterogeneous datasets are essential for many applications. The reasoning of such systems must be as clear as possible in order to earn our trust. Lattices have begun to play a key role in computer science finding applications in distributed computing, programming languages, concurrency theory, and data mining, thereby justifying G. C. Rota's belief that lattice theory will play an important role in 21st Century mathematics [1]. In some instances, researchers must deal with posets that are not necessarily lattices and the question arises how these posets can be embedded in lattices. A classic way to answer this question is to construct the MacNeille completion of the lattice, which is the most compact way to embed a poset into a lattice. In 1973 G. Markowsky introduced the poset of irreducibles construction in his dissertation and demonstrated that this was a very compact way to represent a lattice. In addition, the poset of irreducibles has many of the properties of the poset of join-irreducibles of distributive lattices that was introduced by G. Birkhoff and described in his book [2]. In this paper, we show how to construct the poset of irreducibles for the MacNeille completion of a poset efficiently. We conclude with some applications of these ideas.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model Of Management Of Resources Production In 4P-Environment Of Project-Oriented Enterprise 项目型企业4p环境下资源生产管理模式
N. Yehorchenkova, Iurii Teslia, Oleksii Yehorchenkov, Liubov Kubiavka, T. Latysheva, Yevheniia Kataieva, V. Olena
{"title":"Model Of Management Of Resources Production In 4P-Environment Of Project-Oriented Enterprise","authors":"N. Yehorchenkova, Iurii Teslia, Oleksii Yehorchenkov, Liubov Kubiavka, T. Latysheva, Yevheniia Kataieva, V. Olena","doi":"10.1109/IDAACS.2019.8924242","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924242","url":null,"abstract":"In the article authors present model of management of project and operational production what base on using of Monte-Carlo method. The main feature of the model is providing the ability to effective manage every stage of creating and using of resources in project activity of project-oriented enterprise.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Conference Co-Chairmen 会议主席
Conference Co-Chairmen, A. Sachenko, F. Guerriero, Carsten Wolff
{"title":"Conference Co-Chairmen","authors":"Conference Co-Chairmen, A. Sachenko, F. Guerriero, Carsten Wolff","doi":"10.1109/idaacs.2019.8924445","DOIUrl":"https://doi.org/10.1109/idaacs.2019.8924445","url":null,"abstract":"","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122982447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信