By Topic

2011 Third International Conference on Computational Intelligence, Communication Systems and Networks

26-28 July 2011

Filter Results

Displaying Results 1 - 25 of 88
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1064 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Welcome message from the Chairs

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Keynote Speaker 1

    Publication Year: 2011, Page(s):xvii - xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    The following topics are dealt with: hybrid intelligent systems; hybrid soft computing; wireless sensor networks; RFID; protocols; middleware; wireless security; discrete event systems; real time systems; image processing; speech processing; parallel architectures; distributed architectures; Internet modelling; semantic Web; ontologies; vehicular networks; bioinformatics and biomedical simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker 2

    Publication Year: 2011, Page(s):xx - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB) | HTML iconHTML

    Summary form only given. The Telecommunications and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Next Generation of Internet and Te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 1

    Publication Year: 2011, Page(s):xxii - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB)

    Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 2

    Publication Year: 2011, Page(s): xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB)

    Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the Eye-tracking Methods Based on Video

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Driver fatigue is a chief cause of the traffic accidents. The key technologies for detecting driver fatigue are the real-time and effectively detecting and tracking of driver's eyes. This paper studies the eye-tracking methods by the images of the driver's face based on video cameras. Firstly, a Haar cascade classifier for the face is designed on the arithmetic of Viola-Jones and AdaBoost. Then th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Evaluation of Ensemble Methods for Pattern Classification

    Publication Year: 2011, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Ensemble methods are used in many pattern recognition problems to improve the classification accuracy. Thus, in this paper, the key goal is to evaluate the performance of three popular ensemble methods bagging, boosting, and random forest for pattern recognition problems. To evaluate the performance of investigated ensemble methodology, a comparative study is realized by using three datasets taken... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viral Systems Application for Knapsack Problem

    Publication Year: 2011, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Knapsack problem is a problem that arises when determining what items should be included in a storage area, which has a maximum storage capacity. A metaheuristic algorithm, Viral Systems, is applied to overcome the weaknesses of optimization methods. There are 3 hypothetical cases, which the basic difference is the number of items involved. The cases are used for parameter testing. Based on the ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application of Artificial Intelligent Optimization Techniques to Dynamic Unit Commitment for the Western Area of Saudi Arabia

    Publication Year: 2011, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Unit commitment is the main challenging part of this paper. Operation data are collected form the Western Area of Saudi Arabia, however, the data are average. These data are manipulated to non-linear data that fit with unit commitment. Some missing constraints are imposed from standard IEEE data set. There are total one hundred and thirty five (135) units in the system for around 9,000 MW power de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition Method Based on Adaptively Weighted Block-Two Dimensional Principal Component Analysis

    Publication Year: 2011, Page(s):22 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Face recognition is one of the most important part of biometrical recognition. 2-Dimensional Principal Component Analysis (2DPCA) is a classic method in face recognition, which is proposed to reduce the computational cost of the standard Principal Component Analysis (PCA) algorithm, but the performance of 2-Dimensional Principal Component Analysis in reducing computational complexity and recogniti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching Candidate Lyapunov Function with Threshold Accepting Algorithm

    Publication Year: 2011, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Stability of nonlinear systems is a problem of fundamental importance in system engineering. Specifically, the computation of a Lyapunov function which presents one of the tools for study the stability of nonlinear systems. The objective of this work is to study the Lyapunov approaches of polynomial systems. These approaches have been investigated in order to develop numerical algorithms based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Analysis of an Efficient Traffic Network Using Ant Colony Optimization Algorithm

    Publication Year: 2011, Page(s):32 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (626 KB) | HTML iconHTML

    The problem of traffic congestion is a daily occurrence in most major cities and requires an effective solution. New technologies such as the Automotive Navigation System (ANS) in finding the best path for a user helps commuters find their way without getting lost, but it only provides the best path for the user based on the distance factor without considering real traffic situations. The objectiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Online Diabetes Type II Self Management System: Ontology Framework

    Publication Year: 2011, Page(s):37 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Healthcare and biomedical systems usually require a high level of collaboration amongst health and medical entities. Maintaining consistency within this collaborative framework is a hurdle faced by healthcare and biomedical professionals. Diabetes has been a serious health problem in all over the world for many years. There are two main types of diabetes, type I and type II. Type II diabetes is th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Sequence Alignment in Tracking Evolving Clusters of Web-Sessions Data: An Artificial Immune Network Approach

    Publication Year: 2011, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Artificial Immune System (AIS) models have outstanding properties, such as learning, adaptivity and robustness, which make them suitable for learning in dynamic and noisy environments such as the web. In this study, we tend to apply AIS for tracking evolving patterns of web usage data. The definition of the similarity of web sessions has an important impact on the quality of discovered patterns. M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the Effectiveness of Usability Evaluation by Automated Heuristic Evaluation System

    Publication Year: 2011, Page(s):48 - 53
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Usability defects test escapee can have a negative impact on the success of software. It is quite common for projects to have a tight timeline. For these projects, it is crucial to ensure there are effective processes in place. One way to ensure project success is to improve the manual processes of the usability inspection via automation. An automated usability tool will enable the evaluator to re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Vehicles License Plate Tracking and Recognition via Isotropic Dilation

    Publication Year: 2011, Page(s):54 - 59
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    In this paper, a new algorithm for Automatic License Plate Localisation and Recognition (ALPR) is proposed on the basis of isotropic dilation that can be achieved using the binary image Euclidean distance transform. In a blob analysis problem, any two Region of Interest (RoIs) that is discontinuous are typically treated as separate blobs. However, the proposed algorithm combine with Connected Comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.