Scheduled System Maintenance
On Tuesday, February 28, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (18:00-22:00 UTC).
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

2008 Second International Symposium on Intelligent Information Technology Application

20-22 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 193
  • [Front cover - Vol 3]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (451 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2008, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Message from the IITA 2008 Symposium Chairs - Volume 3

    Publication Year: 2008, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees - Volume 3

    Publication Year: 2008, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Committee Members - Volume 3

    Publication Year: 2008, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • A Novel IP Traffic Prediction Method of Chaos Theory with Support Vector Regression

    Publication Year: 2008, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    IP traffic prediction plays an important role in network-layout, traffic-management, as well as the emphasis of traffic-project, congestion-control and network management. Poor prediction performance would be acquired generally as a result of intense nonlinearity of networks traffic. To tackle it, a modeling method for exact representing IP trafficpsilas movement tendency and a regression algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Speeding Up RBF-Based Interpolation Methods

    Publication Year: 2008, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2794 KB) | HTML iconHTML

    A popular and effective method for interpolation of data is by means of radial basis functions, but the most significant drawback of this method, which made researchers unwilling to use it for practical purposes, is its severe computational cost. Introduction of different methods by the researchers active in this field, however, has alleviated this problem. This paper presents a new method for red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Counting Method of Bus Passenger Flow Based on Kinematics of Human Body and SVM

    Publication Year: 2008, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (649 KB) | HTML iconHTML

    According to the current research on the bus passengers flow counting, this paper proposes a new counting method of bus passenger flow based on kinematics of human body and SVM. This method solves the problem that low cost device canpsilat count the number of passengers accurately and canpsilat distinguish the direction of passengerspsila movement. Finally, this paper proves the feasibility and ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conjunction Graph-Based Frequent-Sets Fast Discovering Algorithm

    Publication Year: 2008, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Existing algorithms that mine graph datasets to discover patterns corresponding to frequently occurring sub-graphs can operate efficiently on graphs that are sparse, contain a large number of relatively small connected components, have vertices with low and bounded degrees, and contain well-labeled vertices and edges. However, for graphs those do not share these characteristics, these algorithms b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining User Interest Change for Improving Collaborative Filtering

    Publication Year: 2008, Page(s):24 - 27
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Collaborative filtering recommendation system is a widely used method of providing recommendations using explicit ratings on items from users, which provides personalized recommendations on products or services to customers. However, the current research on recommendation has paid little attention to the use of time-related data in the recommendation process and the study on collaborative filterin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Collaborative Filtering Algorithm with Item Hierarchy

    Publication Year: 2008, Page(s):28 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Recommender systems are becoming increasingly popular with the evolution of the Internet, and collaborative filtering that using explicit ratings on items from users is the most successful technology for building recommendation systems. But traditional collaborative filtering algorithm is not suitable for itempsilas multiple content and multiple level recommendations. So, a new concept hierarchy m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Algorithm and Its Application in Artificial Immune System

    Publication Year: 2008, Page(s):32 - 36
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Analyses were made on the basic principles of evolutionary algorithm, evolution strategies and evolution programming. Considering the superiority of evolutionary algorithm in intellectual computing, we analyze a typical optimizing algorithm for artificial immune system (AIS). Combining evolutionary algorithm and artificial immunity, we present an immune intrusion analysis scheme based on statistic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Reversible Semi-Fragile Watermarking Algorithm of MPEG-4 Video for Content Authentication

    Publication Year: 2008, Page(s):37 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV video to MPEG-4 format. One watermark using hash function aims to authenticate the contents and embed the frame number for manipulation location between frames, and the other one bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of BP Network and Principal Component Analysis to Forecasting the Silicon Content in Blast Furnace Hot Metal

    Publication Year: 2008, Page(s):42 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    A novel method for forecasting the silicon content in hot metal is proposed using principal component analysis (PCA) and BP network. PCA can consider the correlations among multiple quality characteristics to obtain uncorrelated principal components. These principal components are then taken as the input parameters of the BP neural network. Then the BP network models are established and trained to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Semi-Supervised SVM Based on Tri-Training

    Publication Year: 2008, Page(s):47 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    One of the main difficulties in machine learning is how to solve large-scale problems effectively, and the labeled data are limited and fairly expensive to obtain. In this paper a new semi-supervised SVM algorithm is proposed. It applies tri-training to improve SVM. The semi-supervised SVM makes use of the large number of unlabeled data to modify the classifiers iteratively. Although tri-training ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm of Learning the Parametric Map of Locally Linear Embedding

    Publication Year: 2008, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    A method is presented to obtain maps between the high-dimensional data and the low-dimensional space deduced by locally linear embedding (LLE). Since LLE does not provide a parametric function that build maps between the image space and the low-dimensional manifold. In this paper, multivariate linear regression is applied to deduce the maps. It can successfully project a new data point onto the em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm of Gray Projection Cyclostyle Matching to Image Retrieval

    Publication Year: 2008, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper presents an improved image retrieval algorithm which based on the gray projection cyclostyle matching to overcome the shortcomings of conventional content-based image retrieval methods. The algorithm based on the analysis that gray scale projection curves of horizontal and vertical direction of the images fully reflects the feature of gray distribution in the corresponding direction, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Isomap-Eigenanalysis-Regression Pose Estimation Algorithm of Three-Dimentional Object

    Publication Year: 2008, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Diverse pose estimation of three-dimensional (3D) object in the whole view-space remains a challenge in the field of pattern recognition. In this paper, a pose estimation algorithm of 3D object named isomap-eigenanalysis-regression (Isomap-E-R), which estimates arbitrary pose of 3D object in the whole view space, is proposed. For the training set, the low-dimensional embedding of input pattern set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Efficient Reality Mining with Contexts and Semantics: A Case Study of Telecommunication

    Publication Year: 2008, Page(s):66 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Recommendation systems need to employ efficient reality mining module to find out whether social relationships extracted from a collected dataset are really meaningful in real world. Also, the recommendation should be generated by taking current contexts (e.g., location and time) account into. In this paper, we want to propose an ontology-based framework to discover real social networks from a lar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying Documents with Maximum Likelihood Approximation of the Dirichlet Multinomial Gibbs Model

    Publication Year: 2008, Page(s):71 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In the text analysis, the Dirichlet compound multinomial (DCM)distribution has recently been shown to be a good model for documents because it captures the phenomenon of word burstiness, unlike the standard multinomial distribution. In this paper, for the sake of improving performance of modeling documents, we propose a variant of DCM and Gibbs distribution called Dirichlet multinomial Gibbs (DMG)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Dynamical Evolutionary Algorithm for Classification Rule Discovery

    Publication Year: 2008, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    This paper studies hybrid dynamical evolutionary algorithm in the context of classification rule discovery. Nature inspired search algorithms such as genetic algorithms, Ant colonies and particle swarm optimization have been previously studied on data mining tasks, in particular, classification rule discovery. We extended this work by applying a hybrid algorithm which combines dynamical evolutiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet Transform Using Neyman-Pearson Criterion in Speech Recognition

    Publication Year: 2008, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB)

    To obtain a high robust of speech recognition for noisy conditions, a new pre-processing stage based on wavelet thresholding algorithm is proposed in this paper. The purpose of using the DWT is to benefit from its localization property in the time and frequency domains. Compromise function is proposed compared with hard and soft thresholding function. A new thresholding value, Neyman-Pearson crite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.