By Topic

Intelligent Ubiquitous Computing and Education, 2009 International Symposium on

Date 15-16 May 2009

Filter Results

Displaying Results 1 - 25 of 150
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (995 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Conference Information

    Publication Year: 2009, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • A GA-Based Feature Extraction and Its Application

    Publication Year: 2009, Page(s):3 - 5
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    In order to obtain an explicit and non-linear regress function, a new feature extraction was presented on the basis of linear support vector regression and genetic algorithm. Firstly, the linear input space in training data was mapped to a polynomial space, which can solve non-linear regression questions without complex and vague kernel skills. Then, a genetic algorithm was used to extract feature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-oriented Component Composition Approach Based on Ant Colony Algorithm

    Publication Year: 2009, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    All kinds of information systems in service-oriented have been applied many relation fields, Therefore, according to service-oriented component, we proposed a component composition model and algorithm, and established a component composition model oriented service, which employ a immune genetic ant colony algorithm to solve. Finally, make experiments showed that have improved efficiency of compone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Scheduling Algorithm for Grid Tasks

    Publication Year: 2009, Page(s):9 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Based on the research of existing scheduling algorithms, max-min algorithm and min-min algorithm was analyzed, a modified scheduling algorithm filter-min-min algorithm was proposed. Simulation shows it is reasonable and efficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ESB Infrastructure's Autonomous Mechanism of SOA

    Publication Year: 2009, Page(s):13 - 17
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1408 KB) | HTML iconHTML

    Service-oriented architecture (SOA) is the architecture of software or information system, as well as a concept of coarse-grained components and loosely coupled framework. But SOA is generally believed as a simple Web service integration. This paper deeply discusses some concepts on SOA, insists that SOA is a developing methodology rather than a specific technology. Moreover, the paper expatiates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GA and RBF Based Real-Time FDD for Refrigeration Units

    Publication Year: 2009, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Purpose of this research is to describe the application of a radius basis function (RBF) network to the problem of real-time fault detection and diagnosis (FDD) in a vapor compression refrigeration system. First, we analyze the common refrigeration system faults and their dominant symptoms. Next, an FDD strategy for the refrigeration system is proposed which adopts a RBF network to model the causa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARTMAP-Based Data Mining Approach and Its Application to Library Book Recommendation

    Publication Year: 2009, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    To overcome some disadvantages of the conventional data mining methods, a model based-approach to data mining by using supervised ARTMAP neural network is proposed and applied to a library book recommendation system. The proposed algorithm is based on formation of reference vectors that make a data mining system able to classify user profile patterns into classes of similar profiles, which forms t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Clonal Selection Algorithm for Job Shop Scheduling

    Publication Year: 2009, Page(s):34 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    The job shop scheduling problem (JSSP) is a notoriously difficult problem in combinatorial optimization. Extensive investigation has been devoted to developing efficient algorithms to find optimal or near-optimal solutions. This paper proposes an improved immune clonal selection algorithm, called improved clonal selection algorithm for the JSSP. The new algorithm has the advantage of preventing fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • License Plate Recognition Algorithm Based on Radial Basis Function Neural Networks

    Publication Year: 2009, Page(s):38 - 41
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Automatic license plate recognition is an important form in the automatic target recognition. In recent years, there has a lot of research in license plate recognition, and many license plate recognition algorithms have been proposed and used. In this paper, a new license plate recognition approach is put forward based on the Radial Basis Function Neural Networks (RBFNN). Also discussed are the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Perimeter-Based Noise Filter Algorithm for Vehicle Recognition

    Publication Year: 2009, Page(s):42 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Noise filter is the process of removing noise from a signal. In the area of image processing, the noise filter process is very important for the users. A new noise filter algorithm base on perimeter for vehicle recognition is proposed in this paper. Providing a edge detection methods based on Sobel operator, discussing the problem of noise in the boundary detected above, analysis the principle of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Approach of Real-time Monitoring Based on Background Subtraction

    Publication Year: 2009, Page(s):46 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Real-time monitoring is the important research content of safety domain and real-time control, and the study on its related key technology has great significance. In this paper, an algorithm of real-time monitoring is proposed, which is based on background subtraction. By using the frame image obtained from real-time monitor or video, the images are divided into moving object area and still area, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research and Implementation of the Full Text Endorsement and Traces Reservation Technology on B/S Mode

    Publication Year: 2009, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1271 KB) | HTML iconHTML

    The realization of full text endorsement and traces reservation function of the body of documents are essential component of many Web-based OA application systems. This paper presents a new kind method of realizing the full text endorsement and traces reservation function in the integrated use of ASP.NET, ActiveX and WebDAV technologies. Users can directly annotate or audit the documents in IE bro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Realization of a Centralized Document Management Model Based on ASP.NET

    Publication Year: 2009, Page(s):54 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1266 KB) | HTML iconHTML

    Centralized document management is a prevalent model used by electronic document processing system on B/S mode. The paper firstly analyzes disadvantages of general centralized document management systems, then brings forward a new centralized document management model by combing the advantage of relational database system and file system. The model adopts different storage modes according to the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Support Vector Machine to Capital Flow Risks Prediction

    Publication Year: 2009, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    Under the opening economic circumstances, forecasting the risks of capital flow has special significance. For effectively early warning the risks associated with capital flow, this study applies support vector machine (SVM) to the domain of capital flow in an attempt to suggest a new model with better explanatory power and stability. To serve this purpose, a grid-search technique using 5-fold cros... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of Motor Imagery EEG Signals Based on Energy Entropy

    Publication Year: 2009, Page(s):61 - 64
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Feature extraction and classification of EEG signals is core issues on EEG-based brain computer interface (BCI). Typically, such classification has been performed using signals from a set of selected EEG sensors. Because EEG sensor signals are mixtures of effective signals and noise, which has low signal-to-noise ratio, motor imagery EEG signals can be difficult to classification. Energy entropy w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Application of Interval Number Multiple Attribute Decision Making

    Publication Year: 2009, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    With the development of uncertain theory, fuzzy multi attribute decision making has been applied in more and more areas. Sometimes, attribute value and attribute weight are given in the form of fuzzy numbers. This paper researches the fuzzy multi attribute decision making in which the fuzzy numbers are given in the form of interval numbers, first, the concept of interval numbers are given, then po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering and Thought Originality

    Publication Year: 2009, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    During the process of appearance and development of software engineering, the thought originality plays a very important role. The paper analyzes several examples of the thought originality promoting development of software engineering, such as, understanding software and software development, the form of structuring software development method, the form of object-oriented software development met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EPMA Image Fusion Scheme Based on Contourlet Transform

    Publication Year: 2009, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Based on the analysis of the characteristics of electron probe image, This paper proposes a novel EPMA image fusion scheme based on contourlet transform. As a novel multiscale geometric analysis tool. Contourlet has shown many advantages over the conventional image representation methods. It provides flexible number of directions and captures the intrinsic geometrical structure of images. The effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid Discriminating Algorithm of Fabric Flaw Based on Texture Rule

    Publication Year: 2009, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    Aiming at the problem that current studies about computer recognition of fabric defects need immense calculating time and complex procedure and canpsilat recognize correctly. In this paper, by imitating human vision system, a new computer algorithm based on texture rule for rapidly and correctly detection of fabric flaws is offered. Using this method, computer system may detect fabric flaws withou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm Research for the Noise of Information Extraction Based Vision and DOM Tree

    Publication Year: 2009, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Information extraction from Web sites is nowadays a relevant problem, usually performed by software modules called wrappers. Introduced the relevant information extraction technology. A combination of HTML pages to extract information of the theme and extract the contents. First of all, to remove noise combination of visual block, the vision-based DOM tree denoising methods to improve the efficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.