By Topic

2011 Second International Conference on Intelligent Systems, Modelling and Simulation

Date 25-27 Jan. 2011

Filter Results

Displaying Results 1 - 25 of 90
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (896 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (213 KB)
    Freely Available from IEEE
  • Welcome message from the Chairs

    Publication Year: 2011, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • International/Technical Program Committee

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2011, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2011, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2011, Page(s):xx - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial

    Publication Year: 2011, Page(s):xxv - xxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB)

    Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution to the Tic-Tac-Toe Problem Using Hamming Distance Approach in a Neural Network

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Paper focuses on developing an algorithm using a Hamming Distance Classifier in Neural Networks to find the most optimal move to be made in the Tic-Tac-Toe problem such that the game always ends in a win or a draw. The basic step involves an eight-class Hamming network which has nine inputs corresponding to each cell of the grid and eight outputs respectively. The algorithm computes the Hamming Di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Study of Mutation Operators on the Behavior of Genetic Algorithms Applied to Non-deterministic Polynomial (NP) Problems

    Publication Year: 2011, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Genetic Algorithms (GAs) are powerful general-purpose optimization search algorithms based upon the principles of evolution observed in nature. Mutation operator is one of the GA operators that used to produce new chromosomes or modify some features of it depending on some small probability value. The objective of this operator is to prevent falling of all solutions in population into a local opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of Cognitive Level for Alzheimer's Using Neural Networks

    Publication Year: 2011, Page(s):13 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    The paper introduces two neural network techniques to compare and analyze the detection level of Alzheimer's disease in a patient. The proposed module uses a Neurological Memory test named Mini Mental Status Examination (MMSE). It is authorized to be used only by neurologist, neuropsychologist and psychiatrist for determining the cognitive level. Doctors use the score of MMSE to evaluate the cogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of In-vehicle Multi-sensor Information Fusion Gateway for Cooperative Driving

    Publication Year: 2011, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several in-vehicle sensors on ECUs or surrounding vehicles, and integrated in vehicle gateway through in-vehicle or vehicle-to-vehicle communications. The information exchanged among the hos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereo Vision Based Pedestrians Detection and Distance Measurement for Automotive Application

    Publication Year: 2011, Page(s):25 - 29
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (829 KB) | HTML iconHTML

    This paper presents a compact and robust solution to use stereo vision to detect pedestrians as well as measure their instantaneous distances from the vehicle. This simplifies sensor requirements as the same video information (captured from two cameras) is used for detection of pedestrians as well as measurement of their corresponding distances. To apply stereo vision technique a novel approach ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Decision Support with Simulation-Based System BPsim.DSS: Advanced Simulation Techniques

    Publication Year: 2011, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    Effective decision support assist greatly in many control and management processes. Many business processes may be easily formalized and simulated, allowing automated assistance in decision making. The paper describes research on current decision support systems with the self-developed system BPsim.DSS, based on multi-agent simulation of resource conversion processes, extended with additional func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Averaged Segmental Partial Hausdorff Distance for Robust Face Recognition

    Publication Year: 2011, Page(s):35 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    Face recognition is a non-contact biometric identification that tries to verify individuals automatically based on their images. Computational time and accuracy rate are important aspects to be considered for Face Recognition systems. Huasdorff distance is a dissimilarity measurement between two point sets which has been increasingly used for face recognition. In this paper, we have proposed a mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing MAC Security Model with Meta-policy Approach Using an Intelligent Anomaly Based HIDS

    Publication Year: 2011, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    This paper exhibits a new structure based on a meta-policy approach using an intelligent anomaly based host based intrusion detection system, These access control decisions are decided in agreement with a meta-policy. The combination of policy and host based intrusion detection system approach depends on operating systems integrating with mandatory access control. The proposed structure controls a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Simulated Annealing Using Momentum Terms

    Publication Year: 2011, Page(s):44 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    Simulated Annealing is one of the important evolutionary algorithms which can be used in many applications especially in optimization problems. Simulated Annealing has two main phases, the first one is annealing schedule and the second is acceptance probability function. I proposed three annealing schedule methods and one acceptance probability function. The idea of adding momentum terms was used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GA-Neural Approach for Latent Finger Print Matching

    Publication Year: 2011, Page(s):49 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Latent finger print matching is one of the freshest areas in science. The current methods of latent finger print matching are manual and reliable on human experience. Unfortunately, a system, which can perform the latent fingerprint matching automatically, does not exist. The eye tracking technology is able to record the eye movement and could provide useful information about the user search strat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-level Fuzzy Association Rules Mining via Determining Minimum Supports and Membership Functions

    Publication Year: 2011, Page(s):55 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB) | HTML iconHTML

    Association rule mining is sought for items through a fairly large data set relation are certainly consequential. The traditional association mining based on a uniform minimum support, either missed interesting patterns of low support or suffered from the bottleneck of item set generation. An alternative solution relies on exploiting support constraints which specifies the required minimum support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method for Verification of a Multi Agents System

    Publication Year: 2011, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    In this paper, we present a new formal Method for the Verification of a Multi agents Systems (MAS). We explain and applied a new method based on agents called Agents Petri Nets (APN). Our model describes each entity to model the system and verify the state of the agent and its behavior. This method use, mainly, the property of Petri Nets as deadline, state home, conflict, etc.. Therefore we use a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Potter Model - A Change Compliant Software Development Lifecycle Model

    Publication Year: 2011, Page(s):66 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    A software development life cycle model based on predicting and deciding maximum possible changes which can come in the time line of project completion has been proposed. The model makes it easy for developers to manage the constantly changing requirements and specifications. This model instead of focusing on people and resources focuses on architecture. It is not a replacement for Agile and other... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.