By Topic

2009 Ninth International Conference on Hybrid Intelligent Systems

12-14 Aug. 2009

Go

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover - Vol 3]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1734 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2009, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Preface - Volume 3

    Publication Year: 2009, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization Committee - Volume 3

    Publication Year: 2009, Page(s):xvi - xx
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Design and Implementation of Interface Interactivity Based on Virtools and Serial Communication

    Publication Year: 2009, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    This article introduces one design method of man-machine interaction system based on Virtools and serial communication. The sub device sends sampling data to the upper device through serial communication. The upper device processes these data and responses according to the results through Building Blocks of Virtools In order to realize the interactivity of man-machine interface. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Noise Removal on Rebound Signal of Linear Frequency

    Publication Year: 2009, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Linear frequency signal has been used in many domain, especially used in detecting of rebound wave. The thesis uses not only phasic matching theory but also matching filter in order to dispose of noise. Using the new synthesis idea on phasic matching and matched filer, we can get purity signal. Through emulator ,we can get the best effection of needing signal and at the same time remove coherent a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Network Topology Auto-layout Solution Based on Force-Directed Placement

    Publication Year: 2009, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    To acquire the network topology which is complex, unknown and continually changed, automatic discovery and automatic layout can be the best reliable and effective ways. Because of the huge number of nodes, connections, and circles in backbone network, the Force-directed placement model which is form the physical system is brought in to optimize visualization. In this model, network topology is aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Methodology of a Fault Aware Controller Using an Incipient Fault Diagonizer

    Publication Year: 2009, Page(s):15 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    The problem of failure diagnosis has received a considerable attention in the domain of reliability engineering, process control and computer science. The increasing stringent requirement of quality of a product needs considerable attention in the performance and reliability of the manufacturing system. In general, the feedback control algorithm for a process designed to handle small perturbation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P-Grid Model for Traversing NAT in SIP Communication

    Publication Year: 2009, Page(s):20 - 23
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Session Initiation Protocol (SIP) standardized by IETF provides a way to establish the sessions between Internet telephony devices, but this protocol canpsilat work with Network Address Translator (NAT). Therefore how to make SIP NAT friendly becomes a worthy topic. This paper proposes an efficient approach P2P-Grid architecture model based ICE which uses Simple Traversal of User Datagram Protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P-SIP Architecture for Real Time Stream Media Communication

    Publication Year: 2009, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2806 KB) | HTML iconHTML

    P2P and SIP have its own advantages in media session establishment and transmission. A P2P-SIP based hierarchical architecture for real time stream media communication has been designed in this paper. In the hierarchical architecture, SIP is used to establish the media session, and P2P is adopted to maintain the overlay network architecture and transmit the stream media file. Because of the differ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology Driven Semantic Search over Structure P2P Network

    Publication Year: 2009, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Nowadays searching over structure P2P network mainly use literal matching words occurrence in documents with those present in user queries. But this process of searching can not deal with the semantics and semantic relationships of words. In this paper, we address these problems by proposing semantic search over structure P2P network based on ontology. We do not assume a global ontology but hetero... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding

    Publication Year: 2009, Page(s):35 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    The JPEG compression method is one of the most popular compression schemes. There are many hardware and software systems based on the JPEG compression standard.This is an indication that the format is still very important before these systems become outdate. This paper presents an adaptive regression method applied to the standard JPEG compression for archiving higher compression ratios. Besides,a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Mutual Authentication Protocol for RFID Systems

    Publication Year: 2009, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB) | HTML iconHTML

    After the worldpsilas largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Technology for Mobile Agent System Improved by Trusted Computing Platform

    Publication Year: 2009, Page(s):46 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    As a promising distributed computing technology, mobile agent (MA) can be used in many fields. But the security problem of MA is a barrier for application of MA technology. In this paper, we analyzed the security problems of mobile agent system exposed in opening environment and proposed a model system for mobile agent is proposed. In this system, the mobile agent security is enhanced by the trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust and Simple Multi-server Authentication Protocol without Verification Table

    Publication Year: 2009, Page(s):51 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Recently, Tsai et al. have proposed a multi-server authentication protocol. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Tsaipsilas protocol does not provide perfect forward secrecy and is susceptible to a Denning-Sacco attack and server spoofing. We then present an en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Mamdani Inference System Skin Detection

    Publication Year: 2009, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Skin detection is well known to detect the appearance of human and human parts within an image. However, there are several limitations exist in skin detection when using skin colour as cue to detect skin appearance. These limitations include problems such as illumination, skin-like pixels and camera characteristic. In this paper, a set of modified fuzzy rules has been introduced to deal with the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Memetic Algorithm for the Generalized Minimum Vertex-Biconnected Network Problem

    Publication Year: 2009, Page(s):63 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The generalized minimum vertex-biconnected network problem plays an important role in the design of survivable backbone networks that should be fault tolerant to single component outage. When given a graph where the nodes are partitioned into clusters, the goal is to find a subgraph of minimum costs that connects exactly one node from each cluster in a vertex-biconnected way.We present a memetic a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method

    Publication Year: 2009, Page(s):69 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    Data hiding is one of the most important strategies on the field of data security; the main purpose of data hiding is to disguise the secret information and put them behind a cover image to make them unnoticeable and to assure the secrecy as a stego-image. Besides safety, the quantity of data that can be hidden in a single cover image is also very important to the data encryption. In this paper, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering

    Publication Year: 2009, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    In this paper, we propose a vector quantization (VQ) -based information hiding scheme that cluster the VQ codewords according the codewordspsila relation on Voronoi Diagram (VD). The clustering method is fast and easy to implement when projecting the codewords into VD space. The hiding capacities can be adaptive adjusted just modifying the threshold value which didnpsilat need reorganizing the cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hyperbolic Tangent HNN Multiuser Detection in DS-UWB Systems

    Publication Year: 2009, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    This paper proposes that the Hopfield neural network (HNN) with hyperbolic tangent activation is introduced and applied to multiuser detection in direct sequence-ultra-wideband (DS-UWB) systems. It can approximate to maximum likelihood (ML) detector by mathematical analysis. The HNN with hyperbolic tangent activation (tanhHNN) can enhance the performance of HNN detector. According to the HNN techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSTS: A Prototype Tool for Testing COM Component Security

    Publication Year: 2009, Page(s):83 - 88
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    The automatic testing tools of component security bring great effect on component-based software engineering, and they can effectively ensure the security of component-based software. A prototype tool named CSTS (component security testing system) is designed and implemented to test the security of the widely-used COTS (Commercial-off-the-Shelf) Microsoft COM (component object model) component. CS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.