By Topic

Computational Intelligence and Design (ISCID), 2010 International Symposium on

Date 29-31 Oct. 2010

Go

Filter Results

Displaying Results 1 - 25 of 70
  • [Front cover - Vol 2]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2783 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (232 KB)
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Research on Component Behavior Relativity Analysis

    Publication Year: 2010, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    In the Component-Based Software Development process, component is the basic unit of software reuse, the component evolution is to be composed of a series of complicated change activity. In this paper, we give a fine-grained component from the angle of interface, and give out a series of formal description. Further more, the detailed discussion and analysis of component behavior relativity are pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product Design for Low-Income Group Base on User-Centered Design

    Publication Year: 2010, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1234 KB) | HTML iconHTML

    There're plenty of people belong to Low-income group all over the world. But only a few of designers concern about their demand. This paper is aimed at using the method and idea of “user-centered design (UCD)” to study on low-income group. The key of UCD is design for users' demand and benefit, according to this, this paper analyzed 5 helpful design characteristics of target user. Ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Diversified Designing Methods and User Evaluation of Smartphone Interface

    Publication Year: 2010, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1017 KB) | HTML iconHTML

    The smartphone featured with surpassing the traditional-functioned featurephones turns out to be the future trend. This paper discusses the differences between smartphones and featurephones, new features of the software interface of smartphones, such as functions, size of its screen, multi-touch and intelligent sensing technology, and some peculiarities of software interface of smartphone, such as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Research on the Remote Control Interface Cognition Oriented to Universal Design

    Publication Year: 2010, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    The universal design evaluation of projector remote control interface has important meaning to the businesses and users, which is a multi-user-oriented hand-held device. The article first discussed the concepts and principles of universal design, as well as the research methods of PPP, USS, etc. On this basis, it selected EPSON, SONY, and SANYO projector remote controls, successively had tests on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Path Planning of Tourist Scenic Area Based on BVC Ant Colony Algorithm

    Publication Year: 2010, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Due to the complexity of the path planning for tourist scenic area, we divide the path of Tourist Scenic Area into panoramic scenic graph and sub-scenic graph, and regard these graphs as the same problem to solve. The paper puts forward the improved ant colony algorithm, and designs breeding ants, visual ants and common ants, which travel by their own rules. When the ants travel all the scenic spo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Method of Mobile Content Recommendation Based on Situations

    Publication Year: 2010, Page(s):23 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    In existing mobile content service systems, the study is quite rare on automatic situation-service rule construction. Hence, a method is proposed that the semantic association rules between situations and preferences are built by quantitative frequent marked lattice. Different recommendation rules can be extracted along multi-dimensional context routes from this lattice structure. It is propitious... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced a New Vector Data Query Optimization Method Based on Cost Function

    Publication Year: 2010, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    With the development of information technology, the bandwidth network resources begin not only more and more poor, but also restrict the vector data query speed. In order to improve the query speed, this paper proposed a novel vector data inquiry method which is optimized and can transplant to the client based on analyzing the method of massive data inquiry, combing with the query optimized method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Fault-Tolerant Scheme Based on the RSA System

    Publication Year: 2010, Page(s):31 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Fault tolerance and encryption are two key themes in modern communication systems. The author proposes an improved approach to integrate fault tolerance, encryption and digital signature. A pseudorandom permutation matrix is adopted to randomize the cipher matrix, forcing attackers to solve the homogeneous problem. The novel scheme is more secure against adaptive chosen ciphertext attacks than tho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the Election Campaign Optimization Algorithm to Engineering Optimum Design Problems

    Publication Year: 2010, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    This paper investigates the application of Election Campaign Algorithm (ECA) in the optimum design of engineering problems. With ECA'S characteristic of running side by side, the overall optimization and feasible operation, the optimum matching of the design variables is obtained based on the optimum design model of engineering problems. Simulation results based on well-known constrained engineeri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agent Based Heuristic Algorithm for Uniform Parallel Machine Scheduling Problem with Tails

    Publication Year: 2010, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    This study considers the uniform parallel machine scheduling problem with tails to minimize the maximal completion time. In this scheduling problem, all the machines are intelligent industrial robots and hence agent technology is introduced to realize the intelligence of the robots. The scheduling problem is described and analyzed and then an agent-based heuristic algorithm ABHA is presented, in w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable Neighborhood Search for Uniform Parallel Machine Makespan Scheduling Problem with Release Dates

    Publication Year: 2010, Page(s):43 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In this study, the uniform parallel machine makespan problem with release dates is considered. The problem consists of a set of independent jobs with distinct processing times and release dates to be scheduled on a set of uniform parallel machines to minimize the makespan. This problem is proved to be an NP-hard problem, rendering it a challenging area for meta-heuristic approaches. Four methods a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Adaptive Control of Free-Floating Space Robot Based on Dead-Zone Compensator

    Publication Year: 2010, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    This paper proposes a fuzzy adaptive controller based on dead-zone compensator for a free-floating space robot (FFSR) in the presence of the unmodeled nonlinear dynamics and additional disturbances. In the micro-gravity space environment, the FFSR lacks a fixed base. As a result, there is high dynamic coupling between the manipulators and the free-floating base, which leads to two inherent difficu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Heterogeneous Authentication Information Synchronization Based on LDAP and Web Service

    Publication Year: 2010, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Nowadays LDAP is more and more widely applied to uniform identity authentication system because of its cross-platform characteristic and high availability. However, identity authentication information usually comes from specific application systems and is maintained by these application systems. What's more, databases of these application systems are heterogeneous with LDAP. In order to solve the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research for Experiment and Elman Neural Network Model of High Manganese Steel Drilling Power

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB) | HTML iconHTML

    As a difficult processing material, the drilling of the high manganese steel has been a difficulty among the mechanical processing industry, because its plastic deformation is great and produces the serious hardening phenomenon in the course of processing. During the process of drilling the high manganese steel, great cutting force will be produced, so the great power of the lathe can be consumed.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Improvement of Virtual Work Criteria for Structure Optimization

    Publication Year: 2010, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    An improvement of virtual work criteria for structure optimization is presented to overcome the shortcomings caused by the neglect of dead weight and inertial load of structure in solution of criteria equations. Deduction of criteria equations is analyzed to prove that the shortcomings lead to the error of structure optimization. Therefore, new criteria equations are formulated using the displacem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Mixed Index Method for XML Documents Updating

    Publication Year: 2010, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    Traditional mixed index method combines the inverted file with a structure index and implements the retrieval of both context and structure. However, it is neither efficient nor supports for xml documents updating. This study presents a novel mixed index method to overcome these disadvantages. It can be used to optimize the query of path expression, decrease the number of update operations, accele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Database Encryption Technique Based on Hybrid Cryptography

    Publication Year: 2010, Page(s):68 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    To overcome the technique problem of key management and database encryption in the implementation process of database encryption system, some difficult technology of encrypt/decrypt engine in the implementation process are discussed, the hybrid cryptography encryption program is presented based on IDEA combined with RSA, and the encryption system is designed and realized. Satisfied effect is obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.