By Topic

Intelligent Networks and Intelligent Systems (ICINIS), 2011 4th International Conference on

Date 1-3 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 72
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (518 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • A Survey on Query Expansion Based on Local Analysis

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Query expansion has been considered as an effective technique for dealing with the fundamental issue of word mismatch in information retrieval for a long time. So far researchers solve this major problem through a wide variety of query expansion techniques. We primarily discuss the query expansion based on local analysis. It includes local feedback, local context analysis (LCA) and local clusterin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Empirical Study of Input Modalities Sensed from Flipping a Cube

    Publication Year: 2011, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    This study empirically explores the properties of input modalities sensed from flipping a cube-based tool. By tracking the fiducial marker on each side of the cube in real-time, basic operations such as flipping can produce various input modalities. We present the results of an experiment that investigates the use of these input modalities to perform a set of experimental tasks. The task of the ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Formal Semantics with Networks

    Publication Year: 2011, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper introduces 4 kinds of formal semantics which are elicited from prevailing formal languages in web and are different from the traditional formal semantics theories. We provide network computation models for each kind of semantics that are isomorphism to the problems. We believe the networks work in the way close at some human intelligence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clustering Algorithm Based on Square Inaccuracy Density

    Publication Year: 2011, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    This paper proposed a kind of clustering algorithm based on square inaccuracy density. This algorithm adopted Square Inaccuracy density Function to fix on the parameter in clustering algorithm in order to avoid the problem caused by the random and subjective setting of the initial center of mass. In addition, this algorithm also brought in backtrack strategy to avoid the questions caught by the lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Classification Algorithm Based on Certainty Architecture

    Publication Year: 2011, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    This paper proposed a kind of classification algorithm which brought in certainty factors of expert system as certainty theory proof based on certainty and support architecture aimed at the problem that classical association rules algorithm based on confidence and support architecture couldn't generates association rules accurately facing some questions on mathematical statistics. With experiment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Fault Tolerant Model of MANET with Data Recovery

    Publication Year: 2011, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The objective of the work is to propose a Trusted Fault Tolerant (TFT) model incorporating user recovery features in mobile Ad Hoc networking using Location Aided Routing (LAR) protocol. The LAR protocol in mobile Ad Hoc network is challenged by a complicated interaction of contention, congestion and mobility. The fault model addressed here covers the link faults that occur in the packet transmiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis of Ontology Construction Approaches from Relational Databases

    Publication Year: 2011, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Ontology provides shareable and reusable knowledge about a specific domain. Domain specific relational databases are being used for constructing ontologies due to huge amounts of data on the Web. The aim of this paper is to provide an overview along with the pros and cons of ontology construction techniques. The objective of our research is to overcome the shortcomings of existing techniques in ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Control Proposal for Circle Contour Manufacturing in Rotary Coordinate System

    Publication Year: 2011, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Trajectory error always exist in circle contour manufacturing due to the servo system lag of industrial manufacture devices such as x-y ball screw which is used for two-dimensional manufacture, especially in high speed production. Sometimes, high frequency input commands also make the precision of circle contour manufacture even worse because of the weakness of usual controllers that position trai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret Restoration Algorithms for the Image Data

    Publication Year: 2011, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    In this paper, we propose two new algorithms that can be successfully applied to any image data. When a part or all of the image data is lost or seriously damaged, it is possible to restore all of the image data with this algorithm under the cooperation of the members. We have performed a simulation on several standard image data to reconfirm the effectiveness of our proposed algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • License Plate Location by Level Set Transform and Voronoi Diagram

    Publication Year: 2011, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    We propose a novel license plate location method based on level set transform and Voronoi diagram. The algorithm first computes the level sets of the input image. It then retrieves the skeletons of the selected level sets by their Voronoi diagrams. The sub-strokes are identified using the skeletons. Finally the plate location is performed by a multi-resolution window-based analysis. Experiments sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis System About the Distribution of Vocational Schools to Supply the Regional Economic Development

    Publication Year: 2011, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    This paper studied the intelligent analysis system about the distribution of vocational schools to supply the regional economic development. The author took Tianjin as a typical example to discuss the flow indexes of the student resources and gave an optimization model. This work provided a method for optimizing the vocational education resources and may serve for the strategic development of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind Source Separation for Non-stationary Signal Based on Time-Frequency Analysis

    Publication Year: 2011, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    To separate independent sources from the linear mixed observed data, the traditional blind source separation (BSS) is usually neglected the non-stationary of the signals. With the non-stationary of the signals focused on, a new blind source separation algorithm is proposed by combining the characteristic of time-frequency analysis (TFA) and blind source separation (BSS). In the algorithm, the full... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Real Time AR Method for the Surface Vessel Motion Prediction

    Publication Year: 2011, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    It is significant and valuable to improve the time length and accuracy of ships' motion prediction for the efficiency, comfort and security of marine operation. Autoregressive time series analysis method (AR) is the mainstream currently and the effectiveness for the prediction of ships' motion attitudes has been fully validated. However, the algorithm fixes the order only once but forecasts the fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Execute Unit's State Mechanism in Scientific Workflow System

    Publication Year: 2011, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Scientific workflow system (SWFs) is a tool which is used in scientific research. SWFs is a useful tool that brings remote data access and management under distributed infrastructures to the desktop. Because the Scientific workflow is highly data-centric naturally, it makes the scientific data management, analysis, simulation on distributed infrastructures challenging. When scientist use a SWFs to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Application of MRF and Fuzzy Clustering as Well as the D-S Theory to Image Fusion Segmentation of the Human Brain

    Publication Year: 2011, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The features of the spatial information of Markov random field image was used in image segmentation. It can effectively remove the noise, so that more accurate segmentation results can be obtained. And more satisfactory segmentation results can be achieved with the application of Fuzzy Clustering Theory together with Two-Dimensional Histogram image segmentation methods, However, these two ways lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum-Energy Trajectory Planning for an LCD Glass-Handling Robot

    Publication Year: 2011, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The main objective of this paper is to propose a novel minimum-energy trajectory planning for an LCD glass-handing robot, which is driven by a permanent magnet synchronous motor (PMSM). The system is described by a mathematical model of the electromechanical system. To generate the minimum-energy trajectory, we employ a high-degree polynomial with suitable conditions of angular displacement, speed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.