By Topic

Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on

Date 21-22 Nov. 2009

Go

Filter Results

Displaying Results 1 - 25 of 192
  • [Front cover - Vol 3]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1208 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2009, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Message from the IITA 2009 Chairs - Volume 3

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • IITA 2009 Organizing Committee - Volume 3

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • IITA 2009 Reviewers - Volume 3

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • OSGi-jBPM-Based Component Development of Third-party Logistics RFID Application

    Publication Year: 2009, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    With the rapid development of RFID technology in logistics industry, the integration of RFID and business process becomes an important factor for RFID projects. In this paper, we study the issues of RFID application in third-party logistics and propose a component-based solution by integrating OSGi (Open Service Gateway initiatives) and jBPM (Java Business Process Management) technology. The paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Xen-Based Data Sharing & Access Controlling Method

    Publication Year: 2009, Page(s):7 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mecha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Application of Key Infrastructure Algorithm about Smart IC Card System

    Publication Year: 2009, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    A new method of optimized path planning about smart card based on Dijkstra algorithm is proposed in this paper, for the path planning problem of China road charges. The IC Card Key Infrastructure and CRC check code technology of city uni-card system are combined in the algorithm, and the division with the shortest path using the minimum rate of fees is formed based on the recursive optimized and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Robust Video Transmission Scheme for Error Resilient Transcoding

    Publication Year: 2009, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    For video transmission over wireless or highly congested networks, video transcoding is typically used to reduce the rate and change the format of the originally encoded video source to match network conditions and terminal capabilities. Error resilient video transcoding can insert error resilient tools in the compressed video to enhance error resilience of the video over wireless channels by incr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Aiming at the problem of higher false positive and missing report rate in network intrusion detection, an intrusion detection method based on clustering algorithm is proposed in this paper. This method applies Fuzzy C-means clustering Algorithm to the detection of network intrusion. Through the building of intrusion detection model, carries out fuzzy partition and the clustering of data, and this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Attribute Reduce with SAT Algorithm

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Rough set theory has been successfully applied to many areas including machine learning pattern recognition decision analysis process control, knowledge discovery from databases. An algorithm in finding minimal reduction based on prepositional satisfiability (abbreviated as SAT) algorithm is proposed. A branch and bound algorithm is presented to solve the proposed SAT problem. The experimental res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Translational Meshing Motor Control Based on Adaptive Neuro-Fuzzy Inference System

    Publication Year: 2009, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    The novel translational meshing motor (TMM) has inherent torque ripple because TMM torque is highly nonlinear relationship between rotor position and phase current. The torque ripple of TMM drive system can cause undesirable acoustic noise and vibration. In this paper, a novel controller scheme for TMM is presented. The controller is based on an adaptive neuro-fuzzy inference system (ANFIS) and co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supervised Locally Linear Embedding in Tensor Space

    Publication Year: 2009, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The paper propose a new non-linear dimensionality reduction algorithm based on locally linear embedding called supervised locally linear embedding in tensor space (SLLE/T), in which the local manifold structure within same class are preserved and the separability between different classes is enforced by maximizing distance of each point with its neighbors. To keep structure of data, we introduce t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Non-spherical and Multi-density Clustering

    Publication Year: 2009, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Cluster analysis based on Delaunay diagrams has been widely researched in all kinds of fields. In this article, a new method is proposed to treat with datasets of non-spherical and multi-density clustering. As well as, the problem of noise data is solved by defining the conceptions of In_Points and Out_Points in this method. The above points was illustrated by two simulation experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation Research of the QoS Multicast Routing in WSN Based on QPSO Algorithm

    Publication Year: 2009, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    The energy constraint bottleneck in the wireless sensor networks (WSN) exist objectively. To reduce energy consumption and ensure the Quality of Service (QoS) in data transmission, a method of solving the QoS multicast routing in WSN by quantum particle swarm optimization algorithm (QPSO). The algorithm is based on PSO, quantum-bit, principle of superposition and quantum gates. By the premise of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standard System Framework of RFID Application in Logistics

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    This paper aims to develop a standard system framework for RFID application in logistics according to the existing application context within the industry. Following the mainstream standard development procedure, it begins with analysis of current RFID standard system for both home and abroad. After integrating it with RFID technology and existing domestic application status, it puts forward a sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of TD-SCDMA in Monitoring Systems in Coal Mine

    Publication Year: 2009, Page(s):48 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    In order to monitor the production condition exactly and real-timely in underground and surface of coal mine, a new mobile application solutions scheme based on TD-SCDMA in coal mine is proposed. According to the high speed data service of third generation mobile communication systems, the wireless network of surface scheme was designed by the C/S structure, which can provide mobile communication ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Harmonic Currents Detecting Algorithm Based on Adaptive Neural Network

    Publication Year: 2009, Page(s):51 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    In order to decrease the harmonics and improve the power factors in power system, a detecting algorithm of harmonics and reactive currents based on neural networks and adaptive noise canceling technology is proposed. The structure of neural network and the adaptive weights adjusting algorithm are presented. The contradiction of the detecting speed and the precision has been settled preferably. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Information Systems Model Based on Data Management

    Publication Year: 2009, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Visual information system contains a large number of non-alphanumeric information, which is radical departure from the largely text-based example of conventional information systems. For the effective work of information systems, data retrieval and management mechanisms play a key role, as well as a key requirement, such a system is able to search and find information on the efficiency of the appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eye Location Based on Gray Projection

    Publication Year: 2009, Page(s):58 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (841 KB) | HTML iconHTML

    A Method, to locate eye in image by using gray projection, is presented. We utilize the gray differential projection cure of the facial image to locate eye vertically position and utilize the gray integral projection cure to locate eye horizontal position. The method can apply to not only the upright front side face, but also the upright side face, lift up face and low face. When the face in image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Clustering Algorithm Based on PSO with the Jumping Mechanism of SA

    Publication Year: 2009, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    A new clustering algorithm is proposed based on particle swarm optimization (PSO). The main idea of the new algorithm is to solve clustering problem using the fast search ability of the particle swarm optimization, each particle is composed of a cluster center vector, and represents a possible solution of the clustering problem. To escape from local optimum, a new idea is proposed, that is the nei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Unsupervised Feature Selection Algorithm: Laplacian Score Combined with Distance-Based Entropy Measure

    Publication Year: 2009, Page(s):65 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    In unsupervised learning paradigm, we are not given class labels, which features should we keep? Unsupervised feature selection method well solves this problem and has got a good effect in features selection with unlabeled data. Laplacian Score (LS) is a newly proposed unsupervised feature selection algorithm. However it uses k-means clustering method to select the top k features, therefore, the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.