By Topic

2010 2nd International Workshop on Intelligent Systems and Applications

22-23 May 2010

Filter Results

Displaying Results 1 - 25 of 371
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • General Chair message

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 20
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (287 KB)
    Freely Available from IEEE
  • Attitude Control of a Miniature Helicopter Using Adaptive Backstepping Method

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    This paper presents an adaptive backstepping attitude control method for a miniature helicopter with unknown parameters. The adaptive controller is designed by combining a control law with a parameter estimator, which provides estimates of unknown parameters. The stability of the overall closed-loop system is proven to be asymptotically stable based on the Lyapunov theorem. Computer simulation res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Classification Model Based on Granular Computing

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    In this paper, after a brief overview of the existing methods, we present a new hierarchical classification algorithm based on quotient space theory of the granular computing. This algorithm deals with the samples from coarse to fine both in the training and testing processes. A group of classifiers are firstly trained by the samples generated under different quotient space. Then the trained class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm and Its Blending Application with Neural Network

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In order to overcome the limitation such as premature convergence and low global convergence speed of standard genetic algorithm, an improved genetic algorithm named adaptive genetic algorithm simulating human reproduction mode is proposed. The genetic operators of this algorithm include selection operator, help operator, adaptive crossover operator and adaptive mutation operator. The genetic indi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for QoS-Aware Composite Web Services Selection

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Service Oriented Architecture enable a multitude of service providers to provide loosely, coupled and interoperable services at different Quality of Service (QoS), As more and more Web services become available, QoS is becoming a decisive factor to distinguishing composite Web services. Composite Web service selection with global QoS constraints is clearly a NP-Hard problem, in this paper, a new o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved PSO & Its Application for DOPF in FSWGs Integrated Power System

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Dynamic optimal power flow (DOPF) is a typical complex multi-constrained non-convex non-linear programming problem when considering the valve-point effect of conventional generators. Moreover, it is mixed integer when considering the discreteness of reactive compensation devices for power system with fixed speed wind generators (FSWGs). DOPF model is established in this paper, and then an improved... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Clustering with Differential Evolution Using Cluster Number Oscillation Method

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In this paper, an improved Differential Evolution algorithm (ACDE-O) with cluster number oscillation for automatic crisp clustering has been presented. The proposed algorithm needs no prior knowledge of the number of clusters of the data. Rather, it finds the optimal number of clusters on the processing with stable and fast convergence, cluster number oscillation mechanism will search more possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking Based Security Policy Verification and Validation

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Lots of security mechanisms have been applied in current information systems to assure the confidentiality and integrality for the information processed. These mechanisms are selected in accordance with the certain security policies which should satisfy the system requirements. It is necessary to validate the security whether it really and truly protect the system. In this paper, we first define a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sliding Mode Control of Rotary Drilling System with Stick Slip Oscillation

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    In this paper, a conventional model describing the torsional behaviour of a generic vertical oilwell drillstring has been presented, and a dynamical sliding mode control has been used to eliminate bit sticking phenomena. In the control system, the bit angular velocities are driven to a desired reference value in spite of the presence of a dry friction modelling the bit-rock contact. The key idea o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Possibilistic Clustering Based on Differential Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    A possibilistic clustering algorithm called unsupervised possibilistic clustering (UPC) was proposed in a previous paper. Although UPC is sound, the algorithm has the problem of generating coincident clusters. In this paper, we propose a new clustering model called improved unsupervised possibilistic clustering (IUPC) to overcome this weakness of UPC, and an efficient global optimization technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binocular Vision-SLAM Using Improved SIFT Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    SIFT (Scale Invariant Feature Transform) algorithm is used in mobile robot Simultaneous Localization and Mapping (SLAM) based on visual information. But this algorithm is complicated and computation time is long. Two improvements are introduced to optimize its performance. Firstly, the linear combination of cityblock distance and chessboard distance is comparability measurement; secondly, partial ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Differential Pattern Steering Method of Nonlinear Active Antenna Array

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Phased array used in spacecraft must be lightweight, high efficiency, high integration and low profile, nonlinear active antenna array which have these merits is suitable for the case. This paper studies a two-beam scanning system of nonlinear active array based on injection-locking technique. Firstly, the article reviews the theory of injection-locking technique, then we analyze basic method of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Simulation of Air Flow Properties around a Train Body in Long Tunnel Space

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    A simulation of air flow disturbed around a train body with different angle of train nose in a very long tunnel has been made. Three-dimensional flow theory is capable of modeling the effects of interest in the tunnel environment. The scale of train is 2500mm×320mm×427mm length×width×heigh, and the scale of tunnel is 150m×10.4m×8.2m length×width�... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Signed Directed Graph Based Fault Diagnosis of Atmospheric Distillation Unit

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Significant research has been done in the past 30 years to use signed directed graph (SDG) for process fault diagnosis. However, due to non-unified SDG models for control loops, highly complex and integrated nature of chemical processes, few of SDG based methods has been applied in the real chemical processes. In this paper, SDG based deep knowledge modeling and bidirectional inference algorithms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Knowledge Discovery Method for Chinese Architectural Document

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Aiming at the problem of the traditional feature selection that threshold filtering loses a lot of effective architectural information and to improve the precise of Chinese architectural document classification, a new algorithm based on rough set and C4.5Bagging is proposed for Chinese architectural document categorization. Firstly the cores of attribute are found by discernibility matrix and one ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improvement of Payload-Based Intrusion Detection Using Fuzzy Support Vector Machine

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Intrusion detection plays a very important role in network security system. It is proved to analyze the payload of network protocol and to model a payload-based anomaly detector (PAYL) can successfully detect outliers of network servers. This paper extends these works by applying a new noise-reduced fuzzy support vector machine (fSVM) to improve the detection rate. The new method named PAYL-fSVM e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Linear Variation Inequality by Particle Swarm Optimization

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Solving linear variation inequality by traditional numerical iterative algorithm can not satisfy parallel. In this paper, particle swarm optimization is used to solve linear variation inequality, which sufficiently exerts the advantage of particle swarm optimization such as group search and global convergence and it satisfies the question of parallel solving linear variation inequality in engineer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Improved Neural Network Forecast Basing on Genetic Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The problem of forecast belongs to an input-output nonlinear system in nature. And most of problems which need to be forecasted have a large number of predictors which are relatively correlated. Therefore neural network has unique superiority in dealing with such problems. But when traditional BP (Back-Propagation Network) neural network is used to predict, there are many inadequacies in predictiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.