Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Network Computing and Information Security (NCIS), 2011 International Conference on

Date 14-15 May 2011

Go

Filter Results

Displaying Results 1 - 25 of 105
  • [Front cover - Vol 2]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (2148 KB)  
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (19 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2011 , Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (175 KB)  
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2011 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2011 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • Program Committee - Volume 2

    Publication Year: 2011 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • Reviewers - Volume 2

    Publication Year: 2011 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • Research of the Automatic Shrinking-Film Labeling Machine Based on the Data Bus

    Publication Year: 2011 , Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (536 KB) |  | HTML iconHTML  

    This paper introduces a specific object-oriented, automatic shrinking-film labeling machine control system based on the data bus. It analyzes the structure, control requirements and motion regulation of the shrinking-film labeling machine. It builds the mathematical model of the servo motor and the system, builds the experimental platform. Multiple sets of experimental datas and curves are obtained after several experiments. The control system is reliability, and can greatly improve production efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Light Saber" - A Wireless Interactive System Based on Infrared Motion Capture

    Publication Year: 2011 , Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    With the rapid development of digital home and interactive games, the traditional remote controller with simple key-press functions can not meet the increasing requirement of various applications. We proposed a mouse-type handwritten input and strong interactive functions to replace the traditional button-based input and control mode provided by current simple remote controller. In this paper, an infrared motion capture based wireless sensor interactive system is proposed. At first, an infrared camera is used to capture the motion and position of infrared points. Then, we map the point in 3 dimensional spaces to the point in screen to control the menu. This system extends the traditional remote control functions, and it can be used to control the menus on TV and home devices in 3-D ways. Besides, the applications based on this system, such as Media Walls, Interactive Games, Electronic white board and so on, can bring a brand new control experience to user. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Divide-and-Conquer System Based Neural Networks for Forecasting Time Series

    Publication Year: 2011 , Page(s): 12 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (348 KB) |  | HTML iconHTML  

    This paper presents a Divide-and-Conquer System based Neural Networks (DCSNN) for forecasting time series. This DCSNN is composed of several sub-RBF networks which takes each low-dimensional sub-input as its input. The output of DCSNN is the sum of each sub-RBF networks' output. The algorithm of DCRBF is given and its forecasting ability also is discussed in this paper. The experimental results have shown that the DCSNN is outperforms the conventional RBF for forecasting time series. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach to Estimate RED Parameters Using Global Congestion Notification

    Publication Year: 2011 , Page(s): 15 - 19
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1503 KB) |  | HTML iconHTML  

    In communication networks, congestion avoidance in routers is one of the hottest topics. In this work, a new queue management approach is proposed on the RED (Random Early Detection) algorithm by monitoring the global congestion situation of an autonomous system. In order to observe the congestion situation of the system, a traffic is generated between routers and a centralized unit. IP routers are arranged in order to send information packets regarding current output queue levels to the centralized unit which helps to produce a global picture of congestion. The autonomous routers update their RED parameters according to the congestion notification of the control unit. In this work the benchmarks of the proposed algorithm have been investigated in an OPNET model and improvements on recent queue management technologies which are Drop Tail and RED have been introduced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Hybrid Method Based on Genetic Algorithms and Neural Networks

    Publication Year: 2011 , Page(s): 20 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (958 KB) |  | HTML iconHTML  

    In this paper, according to the characters of neural networks and genetic algorithms, we present a new hybrid intelligence optimization algorithm. The idea of genetic algorithms is embedded on the weight adjustment of neural networks. The numerical results show that the method is efficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Agent Based Automated Negotiation

    Publication Year: 2011 , Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    Agent based automated negotiation can gives a flexible instead of a fixed price in e-commerce, and can maximize the payoffs of bath buyer and seller. It can be seen as an ideal and efficient mechanism for business. After discuss the negotiation in e-commerce and intelligent agent technology, state of the art overviews are given of agent based automated negotiation, specifically three main approaches for automated negotiation: the decision theory, the game theory and the negotiation analysis. And then, give a view of some famous models. Finally, we point out that the automated negotiation is still in its infant stage, because there are still some difficulties in this field. The first is the ontology issue, the second is agents' strategies and third is Communication protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in Research of Fuzzy C-Means Clustering Algorithm

    Publication Year: 2011 , Page(s): 28 - 31
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    Fuzzy Clustering Analysis is one of the most popular research currently. It attracts people's attention for it's validity in resolving fuzzy problem. With the development of computer science, Fuzzy Clustering Analysis based on objective function became hot topics and Fuzzy C-means Clustering Algorithm is one of the most perfect and most widely used theories although there are some drawbacks for the classical algorithm itself. This paper summarizes the progress of FCM algorithm, and some algorithm improvements were analyzed and compared. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Multicast Mechanism in On-chip Networks

    Publication Year: 2011 , Page(s): 32 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (574 KB) |  | HTML iconHTML  

    With the evolution of applications, the on-chip networks need to support one-to-many (multicast) communication efficiently. In this paper, we propose a new multicast mechanism, called multi-cycle (MC), for on-chip networks. MC mechanism takes reliable communication into explicit consideration. More precisely, in MC, in order to avoid the sending of |k| separate acknowledgement packets, the node which is the last destination of the multicast packet sends back the multicast packet to the source node on receipt of the packet. In addition, a recovery approach, instead of avoidance, is developed to deal with the deadlock issue caused by the simultaneous transmission of multicast packets. Simulation results illustrate the effectiveness of the proposed MC mechanism compared to both the tree-based and path-based multicast methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron Model

    Publication Year: 2011 , Page(s): 36 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    In contrast to the previous researches on coherence resonance (CR), which have dealt with CR of periodic spiking neuron model, in this paper the characteristic of CR of chaotic neuron model, is researched. Whether CR of chaotic excitable neuron model can occur typically is of particular importance in neurophysiology, where CR is positive effect on transmission of neural information because noise can make the unordered chaotic spiking series of neurons more ordered. Here we show, based on a physical analysis and numerical evidence, that CR in the chaotic region of system bifurcation parameter can occur in the Hind marsh-Rose (HR) neuron model. Different from the previous results about CR that the occurrence and characterisitc of CR are dependent on the distance between the bifurcation point and bifurcation parameter, the occurrence and characterisitc of CR in this case are independent on the value of bifurcation parameter. CR in this case, which is relevant to an experimental phenomenon observed in neural electro physiology experiment, can be expected to occur commonly in other chaotic spiking neuron model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration Design and Sizing Optimization of a Winged Airship

    Publication Year: 2011 , Page(s): 41 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (535 KB) |  | HTML iconHTML  

    This paper aims to develop a near space aerial vehicle, which combines aerodynamic lift and buoyancy with buoyancy force and operates at day and night energy saving mode. The configuration is designed and optimized by a Non-dominated Sorted Genetic Algorithm (NSGAII). The design project for winged airship in the kink of non dominated solution set is selected as a best one. The sizing of the optimized airship is closed to that of the high altitude airship published by Lockheed Martins Inc, which shows that the optimization model for the winged airship is accurate, and is of reference value for the configuration design in low speed near space aerial vehicle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consider Risk' Assignment of Collaborative Logistics' Interest Based on Shapely Value

    Publication Year: 2011 , Page(s): 46 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    Rational the assignments of the interest are the base of collaborative logistics. While most studying does take the contributions into consider, without the risk of the enterprise take. This paper based on the assignment of shapely value, while consider the risk of the enterprise take, offer of new method of assignment, this method can achieve the "risk high, benefit high". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control of Spiral Waves and Spatiotemporal Chaos by Stochastic and Asymmetrical Mutual Coupling

    Publication Year: 2011 , Page(s): 49 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (750 KB) |  | HTML iconHTML  

    In this paper, the stochastic and asymmetrical coupling method to effectively suppress spiral waves and spatiotemporal chaos is proposed. Numerical simulation indicates that the control effect was affectted by the paramters coupling strengh and stochastic coupling ratio. It is confirmed that two systems can achieve complete synchronization via the computation of the Pearson's coefficient. The two different systems can achieve phase synchronization in a certain coupling strength and random coupling probability, which is validated by mean instantaneous phase difference. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining in Library Reader Management

    Publication Year: 2011 , Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (268 KB) |  | HTML iconHTML  

    Data mining technology has been applied to library management. In this paper, based on the data resource come from Boustead College Library Information Management System include record of book lending history, readers information and library holdings, using Microsoft SQL Server 2005 as a data mining tool and use the data mining techniques to identify characteristics of the readers' book borrowing, in order to achieve individual service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization of Music Recognition Based on Speech Recognition

    Publication Year: 2011 , Page(s): 58 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    This paper propounds a new music recognition method which is based on singing splitting, MFCC characteristic parameter and BP Neural Network, and the origin of this idea comes from speech recognition. Firstly, fundamentals and key techniques of speech recognition are presented. In what flows is a brief introduction to a music recognition system that is designed and implemented by comparing speech recognition and music recognition. Then, we illustrate applications of BP neural network in music recognition. Finally, 10 English songs are chosen as experiment subjects and are inputted into the music recognition system. The experiment results show that this music recognition method which combines speech recognition can effectively recognize music signals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of Encoder Eccentricity on Speed Measurement and Elimination Approach

    Publication Year: 2011 , Page(s): 63 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (218 KB) |  | HTML iconHTML  

    Regarding the common problem of eccentricity in the installation process of an incremental photoelectric encoder, a computing model of actual speed is derived and a calculating method of high-precision speed measurement is presented in the paper. Simulation results verify the effectiveness of the simplified model. In addition, the paper elaborates how to online identify eccentricity and the initial angle. And on the basis of the continuous model, a discrete model, based on the traditional speed detection structure of a digital control system, is further derived. The model is simple and practical, with a high application value. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovation Pattern Evaluation of Equipment Manufacturing Industry Based on Each Type Advantage Parameters

    Publication Year: 2011 , Page(s): 67 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    Seven types of equipment manufacturing industry innovation development pattern are evaluated. Firstly, it evaluates each type of equipment manufacturing industry innovation development pattern with the weight vector highlighting the relative advantage characteristic from individual viewpoint, second, it evaluates each object according to each types of equipment manufacturing industry innovation's advantage value parameters, evenness method is adopted to increase accuracy of the comprehensive evaluation. Lastly, The calculation example proves that the analysis is useful for decision making. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.