By Topic

2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA)

28-29 Nov. 2009

Go

Filter Results

Displaying Results 1 - 25 of 123
  • [Front and back covers]

    Publication Year: 2009, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1211 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Volume 2 table of contents

    Publication Year: 2009, Page(s):iii - xi
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Message from the PACIIA 2009 conference chairs

    Publication Year: 2009, Page(s):xii - xxii
    Request permission for commercial reuse | PDF file iconPDF (3120 KB)
    Freely Available from IEEE
  • The research of information management system for evaluating admitting new party member in college

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1025 KB) | HTML iconHTML

    In this paper, Delphi Method which takes advantage of experts' wisdom and experience is introduced to standardize and quantify The Party member's criterion in the Constitution of the Communist Party of China. With the real situation in colleges, a new framework about evaluation new students who want to take part in the Party is proposed. Then the information management system for the evaluation is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on intrusion IPv6 detection system on LINUX

    Publication Year: 2009, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1453 KB) | HTML iconHTML

    With the rapid development of information society, intrusion has been increasing gradually, initiating a series of security problems. Traditional firewall only guards against external attacks, and can not prevent internal intrusions. Intrusion detection system can supplement the firewall insufficiency and has become one of the critical techniques in information security assurance. This paper mainl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A result of the wireless communication

    Publication Year: 2009, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (938 KB) | HTML iconHTML

    A stability result of the wireless communication is given by Liapunov's second method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the wireless communication

    Publication Year: 2009, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    A result of global asymptotic stability is given by Liapunov's second method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos of a class of Hopfield neural networks

    Publication Year: 2009, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9277 KB) | HTML iconHTML

    Chaos of a new class of Hopfield neural networks is investigated. Numerical simulations show that the simple Hopfield neural networks can display chaotic attractors and limit cycles for different parameters. By virtue of horseshoes theory in dynamical systems, the rigorous computer-assisted verifications for chaotic behavior of the system for certain parameters is given, and also the quantitative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for DCT coefficients estimation and super resolution of compressed video

    Publication Year: 2009, Page(s):23 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2856 KB) | HTML iconHTML

    Reconstructing high resolution images from compressed low resolution video is a hot issue now. In many real applications, such as surveillance users often only get low quality videos which are hard to identify interested objects, super resolution restoration is a effective tool to enhance the quality of images. Quantization loss is the major cause for losing images details, this paper propose an n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and implementation of part-of-speech tagging based on Hidden Markov Model

    Publication Year: 2009, Page(s):26 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1795 KB) | HTML iconHTML

    As separate problems of English, MA, POS, PDR can be considered independent with each other. In a practical research system, they are dependent, solution of the prior one forms the base for processing the next one. We Consider different features of these problems, after a comprehensive study, a divide-and-conqueror strategy is proposed and resolves them separately. First, a knowledge-based method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An on-site calibration technique for line structured light 3D scanner

    Publication Year: 2009, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1602 KB) | HTML iconHTML

    We analyze the measuring principle and propose a calibration technique based on perpendicular cross-lines for line structured light 3D scanner. By use of straight line features and perpendicular constraints of the cross-lines, the technique doesn't require the world coordinates of those feature points on calibration template. The turntable of the 3D scanner rotates with the calibration template. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent referee system in Robot-Soccer Games based on conditional event algebra

    Publication Year: 2009, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1244 KB) | HTML iconHTML

    In Robot-Soccer games, the intelligent referee system which is used to replace the human referee can perfectly simulate the thinking of human being. This paper presents an intelligent referee system, where we employ the conditional event algebra theory to make intelligent decision. In our system, we first estimate the single purpose of robots and overall purpose by searching the maximal probabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context modeling and reasoning based on certainty factor

    Publication Year: 2009, Page(s):38 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2349 KB) | HTML iconHTML

    Context-aware computing is an emerging computing paradigm that provides intelligent context-aware application. Its core idea is to have computers understand the real world so that human-computer interactions can happen at a much higher abstraction level, hence to make the interactions much more pleasant or transparent to human users. Context-awareness is the key to achieve this goal. It entails a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on vertical velocity profile with extra fine sediment in open channel

    Publication Year: 2009, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2128 KB) | HTML iconHTML

    In order to further study the vertical velocity profile with suspended sediment in an open channel, a series of experiments were conducted in a flume. The time average velocity data were calculated by the measured time average velocity data, and compared with the results obtained from a dip modified log law for the vertical profile of the open channel flow. The results indicate that the time-avera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Groundwater quality forecast using ARMA and GM model

    Publication Year: 2009, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1740 KB) | HTML iconHTML

    In view of the defect that the grey method can only predict the tendency approximately and artificial neural network can not predict the future tendency really, a new combined grey neural network model was proposed. This paper mainly analyses the groundwater quality and establishes their mathematical model based on the groundwater monitoring data of one area by combined grey neural network method.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application research of drama in college English education of China

    Publication Year: 2009, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (967 KB) | HTML iconHTML

    The art of drama plays an important role in college English education of China. It can stimulate students' interest of learning English, promote their reading of the original and foster students' co-awareness. Making the most of drama performance in teaching process will work wonders: It can not only make students interested in English class and take part in the teaching and learning actively, hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheme design of technology improvement for Coal Mine main fan

    Publication Year: 2009, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4281 KB) | HTML iconHTML

    Coal mine main fan is one of the largest-power-consuming facilities among various electrical and mechanical equipments, its power consumption usually accounts for 20% ~ 30% of the total. If a few percentage points can be lowered in its energy consumption, energy efficiency will be very substantial. One main reason for the main fan's high power consumption is its overall low efficiency. After a lon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of coal mine main fan performance optimization

    Publication Year: 2009, Page(s):58 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    After running for a long time, fan impeller, inlet box, air inlet, and fan casing of mine ventilation main fan are corroded seriously. Thus is a threat to safe operation of main fans, which increases running resistance and reduces efficiency. Therefore, main fan corroded can't meet actual needs of field-work. China's scientific research institutes and related businesses have carried out a lot of r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Water content influence on the slip zone strength meso-structure research

    Publication Year: 2009, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4443 KB) | HTML iconHTML

    Using large-scale multi-function testing machine, research different water content slip zone, analysis the meso-structure from qualitative and quantify when water content changed. With the increase in water content, slip zone intensity ahead of time, particle rolling, rotating, directional characteristics obviously; porosity as a slide presentation with the strength of the quantitative indicators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of look strategies of DHT in NATed environment

    Publication Year: 2009, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2509 KB) | HTML iconHTML

    Network address translation (NAT) causes well-known difficulties for distributed hash table (DHT) application, which needs end-to-end communication. This paper focuses on the impact of NAT on the lookup performance of DHT. The evaluation models considering the impact of NATs are presented for the performances of three representative lookup strategies (symmetric recursive routing, semi-recursive ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key technique research of image retrieval based on combination feature

    Publication Year: 2009, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1430 KB) | HTML iconHTML

    In this paper, we introduce the generalization of feature-based image retrieval, the technology of semantic query and how to use CBIR on web. It research the different methods retrieval the image, including color-shape feature (CS) and color-texture-shape (CTS) feature. Through contrasting CS, CST we found CS and CST enhanced effectively and decreased the storage space and calculation. On the base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Water and steam control system of petroleum refinery

    Publication Year: 2009, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2820 KB) | HTML iconHTML

    Water and steam play very important roles to utilize for heating, cooling, and mass exchange and reaction in refinery production. So application of an appropriate water and steam control system to save water and steam can tremendously reduce production cost. A water and steam control system based on a novel method and architecture is presented in this paper. Its application and capability is valid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of the electronic commerce security system based on internet

    Publication Year: 2009, Page(s):77 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    In order to adapt the development of the Internet, the electronic commerce based on Internet emerges as the times require and it has been rapidly developed in recent years. It has attracted more and more attentions as a new commerce mode. The electronic commercial business used as a new model of enterprise management and administration, which is suitable for network virtual market economy, will br... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ant colony algorithm Hybridized with Iterated Local Search for the QAP

    Publication Year: 2009, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    The quadratic assignment problem (QAP) is considered one of the hardest combinatorial optimization problems. Ant colony algorithm (ACA), inspired by the food-searching behavior of ants, is an evolutionary algorithm and performs well in discrete optimization. In this paper, through an analysis of the constructive procedure of the solution in the ACA, a hybrid ant colony system (ACAILS) with iterate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.