{"title":"The multi-deformable assembly contact analysis of rotate test tree","authors":"Jinghua Liu, G. Hu","doi":"10.1109/ICCI-CC.2012.6311185","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311185","url":null,"abstract":"In order to research contact force between mechanical components of the multi-deformable assembly and product's reliability, this paper explored the non-linear contact problems by employing the contact mechanics and the finite element method. On the basis of the Lagrange multiplier algorithm, taking multi-deformable assembly as a system, the finite element method is utilized in this paper to analyze the contact cases among deformable components in various conditions, the distribution rules of contact force, the distribution rules of stress and the deformation, with the purpose of figuring out the weakness regions and their solutions.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of BP neural network to prediction of library circulation","authors":"Runhua Wang, Yi Tang, Lei Li","doi":"10.1109/ICCI-CC.2012.6311183","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311183","url":null,"abstract":"In this paper, a research is made for a prediction model for library circulation established upon application of BP neural network, by which it is possible to predict circulation of books from a library. And the prediction model is subject to verification through simulation upon combination of actual statistical data in terms of library circulation, with a good verification effect. It is of great guiding and referential significance to make a quantitative and qualitative analysis of library circulation and improve library management.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security testing of a modular cryptosystem based on continuous cellular automata","authors":"J. D. T. Gonzalez, W. Kinsner","doi":"10.1109/ICCI-CC.2012.6311130","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311130","url":null,"abstract":"This paper presents specially designed tests performed in a cryptosystem based on chaotic continuous cellular automata (CCA). The degree of the cryptosystem security is evaluated by taking two approaches: (i) stationarity and (ii) spectral fractal dimension. These tools are verified with known signals before applying them to test the cryptosystem. This paper provides groundbreaking research about a robust method to determine the minimum stationary window in a given time series. This new ideas is relevant because the stationarity of a signal can be rapidly determined. This idea has never been done in the past, at least in the reported literature, outside this research group.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127707385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competences memory map: A model for the representation of competences applied in education","authors":"C. Ramírez, Erik Sanchez","doi":"10.1109/ICCI-CC.2012.6311175","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311175","url":null,"abstract":"A skill is a basic unit for cognitive processing that allows the use of concepts. A competence is the result of the application of a skill on a concept. Competences and their development play a central role in most educational and training programs. This paper presents a new formal model for the representation of competences in persons and machines, called Competences Memory Map, an extension of Memory Map [17], a model capable of representing skills and competences in an integrated, simple and flexible way. Competences Memory Map is a formal model described with set theory, handled with concept algebra, and computationally implementable. The formal description of algebraic and algorithmic operations over the model, as well as case studies demonstrate that Competences Memory Map model properties hold as expected in dealing with complex real structures.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123771095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Reynoso, Laura Sánchez, Jorge Rodríguez, Mabel Álvarez
{"title":"A collaborative management model in learning and teaching process (CollMMod-LTP): An application for problem solving and algorithms","authors":"L. Reynoso, Laura Sánchez, Jorge Rodríguez, Mabel Álvarez","doi":"10.1109/ICCI-CC.2012.6311190","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311190","url":null,"abstract":"This research aims at improving the management of learning and teaching process (LTP), more specifically observing the students' learning achievement and persistence, and teacher's interventions. To fulfill this purpose a Collaborative Management Model (CollMMod) has been defined during the last four years. In this paper we describe its main components (LTP-goals, LTP-stakeholders, LTP-variables, LTP-instruments, LTP-assessments) and its application in a course about Problem Solving and Algorithms at Universidad Nacional del Comahue using LTP-cognitive-variables. Results from the experience show that: collaborative members engaged in conducting and managing a TLP process may positively influence students' achievement; persistent practice activities where students can detect and correct their errors contribute to improve their achievement. Collected data were statistically analyzed; preliminary results show that there exists a moderate correlation between TLP cognitive variable-derived indicators and students' rate of success in final exams.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134026224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Researches on the topology optimization and simulation against attacks for MCN based on redundant links","authors":"Xi Wan, Shigang Lin, Hongqin Zhou, H. Gu","doi":"10.1109/ICCI-CC.2012.6311182","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311182","url":null,"abstract":"Based on the classical scale-free network model (BA model), this article designs an adjacent network of which key nodes are constructed to be like the structure of rotary interchange, and puts forward a method of the topology optimization for military communication networks by redundant links, and through researches on the arithmetic of the topology optimization. BA model and the method proposed are simulated by MATLAB etc. The results of the simulation show that the method can improve the ability of the scale-free network well to resist against attacks, which has less influence on the network.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134584601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction and analysis of dynamic S-boxes based on spatiotemporal chaos","authors":"Jun Peng, Shangzhu Jin, Liang Lei, X. Liao","doi":"10.1109/ICCI-CC.2012.6311160","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311160","url":null,"abstract":"The substitution box (S-boxes) is a very important component of block cipher. This paper is devoted to presenting a novel approach for generating dynamically S-boxes using a spatiotemporal chaotic system. Within the algorithm, the key is mapped to system parameters and the hyper-chaotic sequences are generated to construct S-boxes. With different keys, lots of distinct S-boxes can be obtained dynamically. The analytic results indicate that all the criteria such as bijection, nonlinearity, SAC, BIC and differential approximation probability are found to hold in the obtained S-boxes. Furthermore, the S-box's sensitivity to the key is also satisfied well, indicating that the proposed approach can be suitable for designing block cipher with dynamic S-boxes.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Airi Tsuji, Tomoko Yonezawa, H. Yamazoe, Shinji Abe, N. Kuwahara, K. Morimoto
{"title":"Proposal and evaluation of the toilet timing suggestion method for the elderly","authors":"Airi Tsuji, Tomoko Yonezawa, H. Yamazoe, Shinji Abe, N. Kuwahara, K. Morimoto","doi":"10.1109/ICCI-CC.2012.6311144","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311144","url":null,"abstract":"We are researching and developing the toilet timing suggestion method for the elderly in order to support their comfortable outing because the elderly are likely to experience frequent urination and often encounter the difficult situation of searching for a restroom with holding their water. Our proposed system calculates the toilet timing in consideration with both their outing schedule and the amount of body water of them, and recommends going to a restroom sufficiently before they feel the need of urinating. In order to implement the system, we've come up with the physiological formula for non-invasive estimation of the amount of body water, and based on the estimation, the toilet timing is calculated. Also, we've devised the suggestion method of the toilet timing to the elderly in order both not to interfere their things to do while their outing and not to be ignored by them. In this paper, we describe our proposed system, and show the experimental result for evaluating both the toilet timing calculation and the suggestion method.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132461349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Oil/Gas and water zones in geological logging with Support-vector Machine","authors":"Hong Liu, Chunbi Xu, Xiaolu Wang, Tianyou Wang","doi":"10.1109/ICCI-CC.2012.6311161","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311161","url":null,"abstract":"Support Vector Machines (SVM) is systematic and properly motivated by Statistical Learning Theory (SLT). Training involves separating the classes with a surface that maximizes the margin between them. An interesting property of this approach is that it is an approximate implementation of Structural Risk Minimization (SRM) induction principle, therefore, SVM is more generalized performance and accurate as compared to artificial neural network which embodies the Embodies Risk Minimization (ERM) principle. The theory and method of Support Vector Machines based the Statistical Learning Theory and proposed a pattern recognition method based Support Vector Machine to determine oil, gas and water zones in geological logging are studied. The outline of the method is as follows: First, the basic parameters of the gasometry logging and geochemistry logging, and induced some significant parameters, such as hydrocarbon moistness index, pyrolysis hydrocarbon equilibrium index, gasometry hydrocarbon equilibrium index ,etc. are researched, which can help to distinguish the feature of reservoir; then the Support Vector Machine to study the relationship of those parameters is used, and the recognition mode and develop its program to determine of oil, gas and water zones are set up. Application and analysis of the experimental results in Xinjiang oilfield proved that SVM can achieve greater accuracy than the BP neural network does. It proved that identification of oil/gas and water zones in geological logging with SVM is reliable, adaptable, precise and easy to operate.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jamalian, R. Rezvani, Hossein Shams, Shamim Mehrabi
{"title":"A new learning automaton for interaction with triple level environments","authors":"A. Jamalian, R. Rezvani, Hossein Shams, Shamim Mehrabi","doi":"10.1109/ICCI-CC.2012.6311198","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2012.6311198","url":null,"abstract":"Heretofore, the most presented Learning Automata (LA) is invented to interact with double level environments (one level for reward and the other for penalty). Those LA are often expedient, optimal or both of them and can minimize their mean value of receiving penalties (or at least converge to the minimum point) during time an d work much better than a pure-chance automaton. However, in many operational applications, the environment has three level responses; one for reward, one for small scale penalty and the last one for large scale penalty. In these applications, the old LA not only can not minimize the mean value of receiving penalties, but also in some cases their mean value of receiving penalties are even more than a pure-chance automaton. In this paper, first the triple level environments with illustrative example are described precisely. Then, the new fixed structure stochastic LA (called TILA) is introduced and its properties are considered mathematically. The simulation results show the old LA can not converge to the minimum value of the mean value of receiving penalties, but TILA receives fewer penalties in comparison with the older ones.","PeriodicalId":427778,"journal":{"name":"2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}