By Topic

Computational Intelligence and Industrial Applications, 2009. PACIIA 2009. Asia-Pacific Conference on

Date 28-29 Nov. 2009

Go

Filter Results

Displaying Results 1 - 25 of 123
  • [Front and back covers]

    Page(s): c1 - c4
    Save to Project icon | Request Permissions | PDF file iconPDF (1211 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (209 KB)  
    Freely Available from IEEE
  • Volume 2 table of contents

    Page(s): iii - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (225 KB)  
    Freely Available from IEEE
  • Message from the PACIIA 2009 conference chairs

    Page(s): xii - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (3120 KB)  
    Freely Available from IEEE
  • The research of information management system for evaluating admitting new party member in college

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1025 KB) |  | HTML iconHTML  

    In this paper, Delphi Method which takes advantage of experts' wisdom and experience is introduced to standardize and quantify The Party member's criterion in the Constitution of the Communist Party of China. With the real situation in colleges, a new framework about evaluation new students who want to take part in the Party is proposed. Then the information management system for the evaluation is designed for the staffers, with this system, it is easy to evaluate the students whether match the condition as a new party member. In practice, this information management seems be helpful for staffs and students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on intrusion IPv6 detection system on LINUX

    Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1453 KB) |  | HTML iconHTML  

    With the rapid development of information society, intrusion has been increasing gradually, initiating a series of security problems. Traditional firewall only guards against external attacks, and can not prevent internal intrusions. Intrusion detection system can supplement the firewall insufficiency and has become one of the critical techniques in information security assurance. This paper mainly researches LINUX-based IPv6 intrusion detection system. Firstly, it introduces the concept, models and classification of intrusion detection system, models; secondly, it discusses new intrusion detection techniques based on IPv6; finally, it researches the methods of using LINUX to detect various kinds of intrusion under coexisting network environments of IPv4 and IPv6. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A result of the wireless communication

    Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (938 KB) |  | HTML iconHTML  

    A stability result of the wireless communication is given by Liapunov's second method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the wireless communication

    Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    A result of global asymptotic stability is given by Liapunov's second method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos of a class of Hopfield neural networks

    Page(s): 17 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (9277 KB) |  | HTML iconHTML  

    Chaos of a new class of Hopfield neural networks is investigated. Numerical simulations show that the simple Hopfield neural networks can display chaotic attractors and limit cycles for different parameters. By virtue of horseshoes theory in dynamical systems, the rigorous computer-assisted verifications for chaotic behavior of the system for certain parameters is given, and also the quantitative descriptions of the complexity of these systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for DCT coefficients estimation and super resolution of compressed video

    Page(s): 23 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2856 KB)  

    Reconstructing high resolution images from compressed low resolution video is a hot issue now. In many real applications, such as surveillance users often only get low quality videos which are hard to identify interested objects, super resolution restoration is a effective tool to enhance the quality of images. Quantization loss is the major cause for losing images details, this paper propose an new method to estimate the quantization noise in frequency domain using Laplace model for DCT coefficients, then the distribution parameter of Laplace is treated as variable simultaneously iterated with the object high resolution images. Experiments indicate that this algorithm in compressed video restoration details due to quantization noise have better performance than others. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and implementation of part-of-speech tagging based on Hidden Markov Model

    Page(s): 26 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1795 KB) |  | HTML iconHTML  

    As separate problems of English, MA, POS, PDR can be considered independent with each other. In a practical research system, they are dependent, solution of the prior one forms the base for processing the next one. We Consider different features of these problems, after a comprehensive study, a divide-and-conqueror strategy is proposed and resolves them separately. First, a knowledge-based method is put forward for the solution of MA. The whole MA processing is completed by many subordinate functions dealing with different particular marks of English words. A strategy of combining the word length with statistic enumeration is developed to distinguish between the periods and abbreviations. Then, an approach combining Rule-based method with Hidden Markov Model (HMM) is put forward for POS tagging. Rule is introduced prior to the HMM approach not only to lower the time cost, but also to resolve the problems that cannot be solved with HMM. Solution to the POS tagging with this approach reports an accuracy of 99.83%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An on-site calibration technique for line structured light 3D scanner

    Page(s): 30 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1602 KB)  

    We analyze the measuring principle and propose a calibration technique based on perpendicular cross-lines for line structured light 3D scanner. By use of straight line features and perpendicular constraints of the cross-lines, the technique doesn't require the world coordinates of those feature points on calibration template. The turntable of the 3D scanner rotates with the calibration template. We can takes a number of images of the calibration template from different arbitrary angles. And the intrinsic parameters of the camera can be obtained and further the projection plane parameters can be obtained. Experiments show that the technique has higher accuracy and better robustness. The technique is easy, quick, suited for on-site calibration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent referee system in Robot-Soccer Games based on conditional event algebra

    Page(s): 34 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1244 KB) |  | HTML iconHTML  

    In Robot-Soccer games, the intelligent referee system which is used to replace the human referee can perfectly simulate the thinking of human being. This paper presents an intelligent referee system, where we employ the conditional event algebra theory to make intelligent decision. In our system, we first estimate the single purpose of robots and overall purpose by searching the maximal probability of scheduled rules. Then we estimate the overall situation by calculating the favorable value according to the position and direction of ball, the home robots and the opponent robots. Combining the single and overall purpose with the field situation, we give the final results. In the experiments, the intelligent referee system based on conditional event algebra outputs satisfactory results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context modeling and reasoning based on certainty factor

    Page(s): 38 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2349 KB) |  | HTML iconHTML  

    Context-aware computing is an emerging computing paradigm that provides intelligent context-aware application. Its core idea is to have computers understand the real world so that human-computer interactions can happen at a much higher abstraction level, hence to make the interactions much more pleasant or transparent to human users. Context-awareness is the key to achieve this goal. It entails a complex process that involves a diversity of development aspects, such as acquisition, reasoning, representation and utilization of context information. In this paper we tackle context-awareness in the context modeling and reasoning aspects. We analyze the hierarchical structure of context information, propose a hierarchy context reasoning model accordingly and describe the procedure and principles of model construction in detail. Then a reasoning rule based on certainty factor is presented and at last a case is put forward to show the whole process of context modeling and reasoning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on vertical velocity profile with extra fine sediment in open channel

    Page(s): 42 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2128 KB) |  | HTML iconHTML  

    In order to further study the vertical velocity profile with suspended sediment in an open channel, a series of experiments were conducted in a flume. The time average velocity data were calculated by the measured time average velocity data, and compared with the results obtained from a dip modified log law for the vertical profile of the open channel flow. The results indicate that the time-averaged velocity profile is in accord with the dip modified log law. However, under different conditions of flow and sediments and boundary, the related parameters in the dip modified formula are different. The study of this paper can deepen the recognition of vertical distribution in open channel flow. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Groundwater quality forecast using ARMA and GM model

    Page(s): 46 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1740 KB) |  | HTML iconHTML  

    In view of the defect that the grey method can only predict the tendency approximately and artificial neural network can not predict the future tendency really, a new combined grey neural network model was proposed. This paper mainly analyses the groundwater quality and establishes their mathematical model based on the groundwater monitoring data of one area by combined grey neural network method. It predicts various tendency of groundwater quality in this area in the future. Case study indicates that precision of the model is rather high and its popularization significance is better than the other models, and has some practical value when being used in the prediction of groundwater quality analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application research of drama in college English education of China

    Page(s): 50 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (967 KB) |  | HTML iconHTML  

    The art of drama plays an important role in college English education of China. It can stimulate students' interest of learning English, promote their reading of the original and foster students' co-awareness. Making the most of drama performance in teaching process will work wonders: It can not only make students interested in English class and take part in the teaching and learning actively, help to improve their four basic English skills of listening, speaking, reading and writing, but also can provide students an opportunity to communicate with each other and to learn cooperation in work and study, which is quite important in learning a language. It is an effective means of quality education, the application of drama performance in college English education, especially in public college English teaching and learning, is a new way and will open a new world to both teachers and students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheme design of technology improvement for Coal Mine main fan

    Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4281 KB) |  | HTML iconHTML  

    Coal mine main fan is one of the largest-power-consuming facilities among various electrical and mechanical equipments, its power consumption usually accounts for 20% ~ 30% of the total. If a few percentage points can be lowered in its energy consumption, energy efficiency will be very substantial. One main reason for the main fan's high power consumption is its overall low efficiency. After a long time operation, most of the coal mine fans' impeller, intake air box, air inlet and chassis have a serious corrosion, which is a main threat to the safe operation of fans, and also increases the running resistance, less efficiency, thus can not meet the actual on-site demand. Therefore, performance optimization of the fan to reduce power consumption is imperative. A set of technical improvement program that focuses on saving energy and increasing efficiency is designed on the basis of surface anti-corrosion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of coal mine main fan performance optimization

    Page(s): 58 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (920 KB) |  | HTML iconHTML  

    After running for a long time, fan impeller, inlet box, air inlet, and fan casing of mine ventilation main fan are corroded seriously. Thus is a threat to safe operation of main fans, which increases running resistance and reduces efficiency. Therefore, main fan corroded can't meet actual needs of field-work. China's scientific research institutes and related businesses have carried out a lot of research and development on energy-saving and benefit-increasing of mine ventilation main fan since 1990's. Successful experience and method has been widely used in many mines. The design focuses on technical scheme of energy efficiency by means of surface anti-corrosion treatment. Such as choosing rationally and installing main fan in accordance with relevant national norms, analyzing its corrosive environment and carrying out anti-corrosion design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Water content influence on the slip zone strength meso-structure research

    Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4443 KB) |  | HTML iconHTML  

    Using large-scale multi-function testing machine, research different water content slip zone, analysis the meso-structure from qualitative and quantify when water content changed. With the increase in water content, slip zone intensity ahead of time, particle rolling, rotating, directional characteristics obviously; porosity as a slide presentation with the strength of the quantitative indicators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of look strategies of DHT in NATed environment

    Page(s): 65 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2509 KB) |  | HTML iconHTML  

    Network address translation (NAT) causes well-known difficulties for distributed hash table (DHT) application, which needs end-to-end communication. This paper focuses on the impact of NAT on the lookup performance of DHT. The evaluation models considering the impact of NATs are presented for the performances of three representative lookup strategies (symmetric recursive routing, semi-recursive routing and iterative routing). Based on the evaluation models, the performances of these lookup strategies are compared under different conditions. Analysis results show that symmetric recursive routing can outperform the other two lookup strategies in NATed environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key technique research of image retrieval based on combination feature

    Page(s): 69 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1430 KB) |  | HTML iconHTML  

    In this paper, we introduce the generalization of feature-based image retrieval, the technology of semantic query and how to use CBIR on web. It research the different methods retrieval the image, including color-shape feature (CS) and color-texture-shape (CTS) feature. Through contrasting CS, CST we found CS and CST enhanced effectively and decreased the storage space and calculation. On the base of the color, texture and shape features, the technology of semantic query is proposed in this paper. The query not only reflect the low-layer physical property of image, but also joined with the high-layer semantic property of image. The retrieval performance is improved efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Water and steam control system of petroleum refinery

    Page(s): 73 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2820 KB) |  | HTML iconHTML  

    Water and steam play very important roles to utilize for heating, cooling, and mass exchange and reaction in refinery production. So application of an appropriate water and steam control system to save water and steam can tremendously reduce production cost. A water and steam control system based on a novel method and architecture is presented in this paper. Its application and capability is validated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of the electronic commerce security system based on internet

    Page(s): 77 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (550 KB) |  | HTML iconHTML  

    In order to adapt the development of the Internet, the electronic commerce based on Internet emerges as the times require and it has been rapidly developed in recent years. It has attracted more and more attentions as a new commerce mode. The electronic commercial business used as a new model of enterprise management and administration, which is suitable for network virtual market economy, will break the traditional commercial business model, change traditional competition rule. Although the advantage of pattern of e-commerce over the pattern of traditional business pattern, but the inherent deficiency of e-commerce, which constrains its effective development. But at the same time, the security problem of electronic commerce is becoming more and more obvious, so how to build a secure and convenient application environment of electronic commerce is worth researching. The safety problem has become the focus of the application domain about e-commerce. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ant colony algorithm Hybridized with Iterated Local Search for the QAP

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (868 KB) |  | HTML iconHTML  

    The quadratic assignment problem (QAP) is considered one of the hardest combinatorial optimization problems. Ant colony algorithm (ACA), inspired by the food-searching behavior of ants, is an evolutionary algorithm and performs well in discrete optimization. In this paper, through an analysis of the constructive procedure of the solution in the ACA, a hybrid ant colony system (ACAILS) with iterated local search (ILS), is proposed. In ACAILS, only partial facilities are randomly chosen to compute the designed probability. Experimental results demonstrate that the proposed approach can obtain the better quality of the solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.