Notice
There is currently an issue with the citation download feature. Learn more

2012 Third International Conference on Intelligent Systems Modelling and Simulation

8-10 Feb. 2012

Filter Results

Displaying Results 1 - 25 of 151
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (912 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • Welcome message from the Chairs

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2012, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2012, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Keynote Speaker-1: Management of a Photovoltaic and Media Facade - Green IT and Visualization of Large Volumes of Data

    Publication Year: 2012, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The development of computer, information and communication technology has continually affected the creation of new applications based on emergent technologies. Many newly developed devices with different technical specifications have surrounded us in our everyday life and private environment. However, these devices consume a large amount of energy. By combining the advantages of established inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker-2: Emotion, Future Smart Technology, and Convergence

    Publication Year: 2012, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    This paper proposes the importance of emotion technology for future technology. Emotion technology is absolutely necessary for real human being in future technology such as robot, culture, and design etc. However, it is very difficult to approach and expression effectively emotion function in engineering. Visual system (static and moving status), sound system, and tactile sense can express by phys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker-3: Intelligent Pattern Recognition and Applications - An Interactive E-learning System, Modelling and Simulation

    Publication Year: 2012, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack,, What are Biometric Technologies? Biometrics: Analysis vs Synthesis, Analysis: Interactive Pattern Recognition Concept, Importance of Measurement, How i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: Privacy Preservation in MANET: Issues and Challenges

    Publication Year: 2012, Page(s): 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Summary form only given. Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls under the category of Secure Multiparty Computation (SMC). The solution to SMC problems in Mobile Ad hoc Networks (MANET) can be found with the modification of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exhibition speaker: Driver-oriented intelligent human-vehicle interaction system

    Publication Year: 2012, Page(s):14 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    In this paper, we introduce driver-oriented intelligent HVI(Human-Vehicle Interaction) system, which is designed to integrate the interfaces in the vehicle. The proposed HVI system monitors the vehicle, the cell phone, the car navigation system to recognize the driver's primary tasks and secondary tasks. It is estimated the driving workload from the status information, the output information is co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Tuning Fuzzy PID Controller Design for Aircraft Pitch Control

    Publication Year: 2012, Page(s):19 - 24
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    In this paper self-tuning fuzzy PID controller is developed to improved the performance for a pitch control of aircraft system. The controller is designed based on the dynamic modeling of system begins with a derivation of suitable mathematical model to describe the longitudinal motion of an aircraft. Fuzzy logic is used to tune each parameter of Proportional-integral-derivative (PID) controller b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement on Agglomerative Hierarchical Clustering Algorithm Based on Tree Data Structure with Bidirectional Approach

    Publication Year: 2012, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Hierarchical clustering algorithms take an input of pair wise data-item similarities and output a hierarchy of the data-items. This paper presents bi-directional agglomerative hierarchical clustering algorithm to create a bottom-up hierarchy, by iteratively merging the closest pair of data-items into one cluster. The result is a rooted AVL tree. The n leafs correspond to input data-items that need... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modern Control System Mapping on Networks-on-Chip

    Publication Year: 2012, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    The Control system algorithms implementation in Networks-on-Chip (NoC) is the best way to address the various issues like power consumption, congestion control, and data packet loss. In this paper, we present the modern control system mapped on NoC. The concept of on chip implementation of Networked Control Systems (NCS) started to grow because of its potential in various applications, it also pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wheelchair Motion Control Guide Using Eye Gaze and Blinks Based on PointBug Algorithm

    Publication Year: 2012, Page(s):37 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    In this paper, we propose new method beside the classic method, to control the motorized wheelchair using EOG signals. The new method allows the user to look around freely while the wheelchair navigates automatically to the desired goal point. Only EOG signals are used to control the wheelchair; eye gazing and blinking. The user can still choose to control the wheelchair using the classic manual m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI Based Robust Router Architecture

    Publication Year: 2012, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    In his paper we attempt to give a networking solution by applying VLSI architecture techniques to router design for networking systems to provide intelligent control over the network. Networking routers today have limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the latency and security concerns. Other techniques we explore include the use of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search Bot: Search Intention Based Filtering Using Decision Tree Based Technique

    Publication Year: 2012, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Most web search engines use only the search keywords for searching. Due to the ambiguity of semantics and usages of the search keywords, the results are noisy and many of them do not match the user's search goals. This paper presents the design of an intelligent Search Bot, which operates as an agent for a user by simulating the user activity of filtering only the relevant search results. It learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KDRuleEx: A Novel Approach for Enhancing User Comprehensibility Using Rule Extraction

    Publication Year: 2012, Page(s):55 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Knowledge representation opaque model like ANN has advantage of accuracy and limitation of interpretability. Transparent models like decision tree, decision table and rules represent knowledge in more understandable form and can easily be integrated with other learning system. Converting an opaque model like ANN to transparent model is called rule extraction. Lot of work has been done in the field... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robot Path Planning via EGSOR Iterative Method Using Nine-Point Laplacian

    Publication Year: 2012, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Path planning is an important issue as it allows a robot to get from start point to goal point. In this study, we attempts to solve path planning problem for mobile robot based on potential field method that relies on the use of Laplace's Equation to constrain the generation of a potential function over regions of the configuration space of a mobile robot. An experiment based on finite-difference ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hardware Architecture for Training of Artificial Neural Networks Using Particle Swarm Optimization

    Publication Year: 2012, Page(s):67 - 70
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Artificial Neural Networks (ANN) find applications in various fields of science and engineering. The training of ANN is an iterative process which consumes huge amount of time when executed on conventional microprocessors. It can be accelerated by adopting parallel computation techniques. This paper presents a Verilog HDL based parallel Hardware Architecture for ANN training using Particle Swarm O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Fuzzy Logic Control System for Controlling Homogeneity of Light Intensity from Light Emitting Diode

    Publication Year: 2012, Page(s):71 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    The use of Light Emitting Diode (LED) as the lighting device becomes popular due to its energy-efficient characteristic. However, LED has radiation angle that is relatively smaller than other types of lighting device. This results in heterogeneity of light intensity that received by particular point near the LED. To obtain homogeneity of light intensity, this paper proposes a model of fuzzy logic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.