By Topic

Apperceiving Computing and Intelligence Analysis, 2008. ICACIA 2008. International Conference on

Date 13-15 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 101
  • Local Performance Analysis of Clustered Faults for Shared Structures

    Publication Year: 2008, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    The probabilistic diagnosis model is useful in many fields such as distributed network, digital system level testing, wafer fault testing. Some topologies and continuous defect units distributions are studied in the previous work. In this paper, we extend the model to arbitrary topology structure with share nodes and to the discrete defect distributions, such as Poission distribution and binomial ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Analysis of Nanoscale XOR Gate

    Publication Year: 2008, Page(s):4 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1311 KB) | HTML iconHTML

    The device failure must be taken into account in the nano-scale design. This paper presents the probabilistic logic model to model the probabilistic behavior of a nanoscale adder. The analysis shows that the device probability distribution highly depends on the system structures and other performance parameters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Asymptotical Stability Criterion for Fuzzy Neutral Systems

    Publication Year: 2008, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    In this paper, the asymptotical stability criterion for the fuzzy neutral systems is investigated. By means of the Lyapunov-Krasovskii functional, Barbalat lemma, Sala- Arino lemma, the descriptor model transformation and LMI approach, a novelty less conservative sufficient condition (in terms of LMIs) for asymptotical stability of the fuzzy neutral systems is deduced. Finally, an illustrative num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOM Classification Method based on Transduction Scheme

    Publication Year: 2008, Page(s):12 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1611 KB) | HTML iconHTML

    Transductive confidence machines (TCMs) when used in classification problems can provide us with reliability for every classification. Many machine learning algorithms, such as KNN algorithm, etc., have been incorporated with TCM, while there's no SOM classification method based on TCM. Considering properties of SOM map unit, this paper first designs a novel nonconformity measurement and TCM-SOM c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spline Interpolation Uesed in Electronchemical Impedance Spectroscopy

    Publication Year: 2008, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1595 KB) | HTML iconHTML

    Electrochemical impedance spectroscopy (EIS) is one of the important means in the study of surface dynamics during complex electrodes reaction. Two signal techniques are used in the EIS: the frequency-domain and time-domain techniques. Electrochemical impedance spectroscopy measurement based on the fast Fourier transformation (FFT), which can probe transient electrochemical processes, is highly re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivability Reconfiguration Framework: Issues and Aproaches

    Publication Year: 2008, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the systems operating environment or the failure of software or hardware components. The reconfiguration ability of system can recover operation in timely, also enhance the survivability of system by replacing current disabled configuration with a new one. In view of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization Design of Tip Clearance Shape

    Publication Year: 2008, Page(s):24 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2487 KB) | HTML iconHTML

    The background is one aero-engine's structure. The shape of turbine tip clearance is researched, by the means of numerical analysis. Parametric modeling, process integration, and optimization of tip clearance shape were proposed. The detailed information of flow field shows that the numerical results agree well with experiment data. The isentropic efficiency has been improved 0.395 percent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Definition of Misclassification Cost & Redistribution Strategy of Telecom Churn Analysis

    Publication Year: 2008, Page(s):31 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    Telecom churn prediction is one of the key factors which closely related to the development of telecommunications business. To solve the data imbalance problem exiting in this field, traditional researches always redistribute samples according to misclassification cost. But exiting researches in this area neither gave out the quantitative description of the misclassification cost nor set up a unif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Uniform Application Supporting Platform based on SOA

    Publication Year: 2008, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9609 KB) | HTML iconHTML

    The most important task in developing enterprise software is to implement application integrating and collaborating between information systems, and to solve the problem of `Isolated Information Islands' in running systems. Using uniform application supporting platform (UASP) is a good scheme to solve the problems in e-campus' information systems. This paper presents the design in architecture and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Sensor Information Fusion Algorithm based on SVM

    Publication Year: 2008, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1562 KB) | HTML iconHTML

    Support vector machine is an algorithm based on structural risk minimization, which has good generalization performance. In the course of multi-sensor information fusion of industrial control, sensor has bigger nonlinearity and fuzzy relation between coefficient and relevant parameter. This paper proposed an algorithm of multi-sensor information fusion based on support vector machine, which offere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rudiments of Granular Rough Theory

    Publication Year: 2008, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    The present paper is an introductory summary of an alternative roughness theory to classic rough set theory (RST), the granular rough theory (GrRT). GrRT differs from classic RST mainly in the underlying representation model, the granular representation calculus, which is designed to accommodate semi-structured information sources, to explicitly encode semantic contexts inherent in information sou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Wavelets Analysis in Image Denoising

    Publication Year: 2008, Page(s):49 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    Aiming at the problems of images denoising, wavelet algorithm is introduced simply. The technology of images denoising based on wavelet are analyzed in detail. Image denoising is achieved by Matlab. Two thresholding in the process of image denoising are compared by the results of experiments. Meanwhile, the advantages of image denoising by wavelet is proved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Improvement of Intelligent PID Control Algorithm based on Neural Network

    Publication Year: 2008, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    A kind of adaptive PID control algorithm is analyzed, and the drawbacks of the existing algorithms are commented. As an improvement, a neural network intelligent control algorithm based on one-step prediction is developed. Result show that the new control method is more adaptable to the control of time-varying and nonlinear control systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Face Recognition with Partial Distortion and Occlusion from Small Number of Samples Per Class

    Publication Year: 2008, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (833 KB) | HTML iconHTML

    The posterior union decision-based neural network (PUD-BNN) has been proposed in our previous work for dealing with face recognition task subject to partial occlusion and distortion. However, one difficult of this method is inaccurate to model classes with only a single, or a small number of training samples. In this paper, we proposed an extern approach to tackle above problem by two strategies. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Face Recognition Method based on Cognitive Mechanism

    Publication Year: 2008, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (875 KB) | HTML iconHTML

    A face recognition method similar to human cognitive mechanism has been proposed. Motivated by the continuity rule of a same class samples, face recognition can be regarded as face pattern cognition. Compared with traditional statistical pattern based face recognition, it has a kind of relationship with human's cognitive mechanism. When face coverage of different people overlap, a person's face di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Multi-Biometric Feature Fusion and Recognition Model

    Publication Year: 2008, Page(s):66 - 69
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7264 KB) | HTML iconHTML

    The single biometric identification technology has the inherent and difficult overcoming shortcomings, so multi-modal biometric fusion and identification techniques were proposed to improve the performance and accurate rate of identification system. This paper proposed a model combined with 2-dimensional Fisher linear discriminant analysis for face and iris feature fusion and recognition. First fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Watermarking Algorithm based on Slowly Feature Analysis

    Publication Year: 2008, Page(s):70 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB) | HTML iconHTML

    Recently, Blind Source Separate (BSS) technique has been extended to digital watermarking field. Slowly Feature Analysis (SFA)-a kind of BSS technique-is a new unsupervised learning algorithm to learn nonlinear functions that extract slowly varying signals out of the input data. It expediently can be used to extract image feature and separate the mixed signals. Making use of the advantages of SFA,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Taint-Based Malware Detection

    Publication Year: 2008, Page(s):73 - 77
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7803 KB) | HTML iconHTML

    Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Theorem of Quasi-Conformal Homomorphism in n-Space

    Publication Year: 2008, Page(s):78 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    Let Rn be a n-dimension Euclidean space (n ges 2), D sub Rn is a proper sub-domain of Rn, for x, y isinD, 0 < c < 1, kD(x, y) > log(1/(1-c)). There is a quasi-conformal homomorphism F:Rn rarr Rn with the following properties: (1) kD (x,F(y)) les log(1/(1-c)); (2) F:RnD rarr RnD is the identi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ant Colony Optimization Approach to Disassembly Planning

    Publication Year: 2008, Page(s):81 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1841 KB) | HTML iconHTML

    This paper proposes an ant colony optimization approach to disassembly planning. The mechanism of ant colony optimization in disassembly planning is discussed, and the objectives to be optimized in disassembly planning are introduced. For more effective search for feasible non-dominated solutions, a multi-objective searching algorithm with uniform design is investigated to guide the ants searching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Choice of Parameters in Arc Length Algorithm

    Publication Year: 2008, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1510 KB) | HTML iconHTML

    To improve the efficiency of the arc length (AL) algorithm, the paper presents a quantitative method to choose the parameters of AL. The paper analyzes the condition to guarantee the correctness of AL, and gives the approaches to set the parameters. Moreover, the latency of AL under the new method is discussed in detail. The analysis and simulation shows that the latency of AL with the parameters ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Audio Watermarking Algorithm based on Neural Networks

    Publication Year: 2008, Page(s):89 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB) | HTML iconHTML

    Digital audio watermarking is embedded inaudible information into digital audio data for the purposes of copyright protection, ownership verification, covert communication, and/or auxiliary data carrying. In this paper, a new digital audio watermarking algorithm is proposed, which based on Neural Networks and in the Wavelet Domain and corresponding algorithms of watermark generation, embedding, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Algorithm of Mining the Leading Users from SMS Network

    Publication Year: 2008, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB) | HTML iconHTML

    Majority information promulgators adopt the messages deliver technology to achieve coverage rates, simultaneously have also caused the massive trash short messages. This paper presents an algorithm of mining the leading users in the network and sends them the user-targeted SMS message. First, build the SMS network, and define the relations, then analyze the network and mining the users who have mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite-Element Analysis the Vibrancies of Floating Steel-Pipeline on Sea

    Publication Year: 2008, Page(s):97 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    The vibrancies of floating steel-pipelines on sea was analyzed by the inherent vibrancies character analysis method; a finite-element model was established to simulate the lateral bending vibration of the pipelines by ADINA software, the conclusion was obtained that the lateral bending vibration of pipelines was able to meet with the requirements of pipelines' function on the 4 class sea-condition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Exponential Stabilization of Stochastic Neural Networks with Markovian Switching

    Publication Year: 2008, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    This letter concerns with robust exponential stability of stochastic neural networks with Markovian switching. By applying Lyapunov functional method, a sufficient stabilization condition is developed in terms of matrix inequalities. The result is also compared with the previously reported results in the literature. Finally, one simulation example is provided to illustrate the effectiveness of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.