By Topic

2012 4th IEEE International Symposium on Logistics and Industrial Informatics

Date 5-7 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 54
  • Authors' index

    Publication Year: 2012, Page(s): 265
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (435 KB)
    Freely Available from IEEE
  • General information

    Publication Year: 2012, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):3 - 6
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Preparing initial population of genetic algorithm for region growing parameter optimization

    Publication Year: 2012, Page(s):47 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1074 KB) | HTML iconHTML

    The processing of microscopic tissue images is nowadays done more and more using special immunodiagnostic-evaluation software products. Often to evaluate the samples, the first step is determining the number and location of cell nuclei. To do this, one of the most promising methods is the region growing, but this algorithm is very sensitive to the appropriate setting of different parameters. Due t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Useful and effective feature descriptors in content-based image retrieval of thermal images

    Publication Year: 2012, Page(s):55 - 58
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Using content based image retrieval systems the images are compared on the grounds of the stored information of images. As simple descriptors the intensity (or color), the texture and the shape is widely used. Special property of thermal images - similarly to gray-scale images - the have only one intensity channel. But then these intensities change on an other way than in gray-scale images. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimension reduction in text document retrieval by Hebbian neural network and nonlinear activation functions

    Publication Year: 2012, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    The paper deals with utilization of neural networks for information retrieval. It is focused on reduction of text document space by Hebbian neural networks. The Hebbian neural network with Oja learning rule with linear activation function reduces term space into much lower dimension and gives good results for text document dimension reduction and retrieval. The aim of this paper is to try to incre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Importance of education in information technology governance

    Publication Year: 2012, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Education is one of the most important and challenging issues for implementing and improving information technology (IT) governance. In this study, the role of the education in IT governance is emphasized and discussed with examples from standards and best practices such as IT Infrastructure Library (ITIL), Control Objectives for Information and Related Technology (COBIT), ISO/IEC 27001, BSI/BS 25... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A self-configurable real-time video surveillance system with distributed IP-cameras

    Publication Year: 2012, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Everyday events demonstrate (if there is still a need for demo) the need for security. One cause is the occurrence of antisocial events which seem to be once again on the rise. Another cause (increasingly important) is represented by terrorist threats. As events in New York, London and Madrid have demonstrated, this threat is very much alive. Video surveillance is an alternative attempting to prev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of construction and analysis of turbine blades

    Publication Year: 2012, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (806 KB) | HTML iconHTML

    Amount of the energy contained in the Earth's water cycle is huge, but its use is difficult. The most common method is the production of hydroelectric power stations. In today's society, small hydro power plants present the most efficient, ecological and economic way of generation of the electricity. These plants create a part of acquirement of electric current from the renewable resources. This c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of logistics companies using data envelopment analysis

    Publication Year: 2012, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The main purpose of this paper is to develop appropriate construct to benchmark performances of logistics companies so that deficiencies can be highlighted and possible strategies can be evolved to improve the performances of the industry. The study applies data envelopment analysis (DEA) and Malmquist productivity index (MPI) to explore the operation performances of 55 Thai logistics companies fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Four indexes transportation problem with interval cost parameter for goods allocation planning

    Publication Year: 2012, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Building on a case study that we generalize, we use a model of interval four indexes transportation problem (4ITP: origin, destination, goods types, vehicle types) and find a solution on the minimum transportation cost for the distribution planning between manufacturers and customers. The 4ITP with real variables and deterministic parameters was solved for all cases where the problem is degenerate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT requirements of seaport-hinterland transport for an increased container handling

    Publication Year: 2012, Page(s):93 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    The container transport in the hinterland of seaport container terminals has to become more efficient. A better physical infrastructure is only one step to reach this goal. Another indispensible step is the expansion of Information and Communication Technology (ICT). After the introduction in the first chapter the actual situation of research and development in container terminal management and IC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and optimizing storage assignment in a steel slab yard

    Publication Year: 2012, Page(s):101 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Steel slabs are intermediates in the production of sheets, plates or coils in the steel industry. In this paper we consider cold charge slabs which are stored in stacks on a slab yard for a couple of hours, days or weeks until they are assigned to a rolling schedule and retrieved. When a slab is not positioned on top of a stack, retrieval requires the movement, also called shuffling, of all slabs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustainable energy systems: Cyber-physical based intelligent mangement of micro-grids

    Publication Year: 2012, Page(s):11 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Summary form only given. Sustainable energy has slowly but surely becoming relevant source of energy in many parts of the world. From US to Europe to Asia and South Pacific and on to Middle East, photovoltaic and wind energies are the desired sources. Such new and expanded sources of energy is fast creating numerous sources of distributed generations and creating a great number of micro-grids of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A combination of heuristic and non-heuristic approaches for modified Vehicle Routing Problem

    Publication Year: 2012, Page(s):107 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1454 KB) | HTML iconHTML

    The article addresses a specific Vehicle Routing Problem (VHP) as a part of an optimal cash deployment strategy for a network of Automated Teller Machines (ATMs). A combination of two different approaches (exact and heuristic one) is presented here. The combination of the All Nearest Neighbors (ANN) method with Near Neighbor Search (NNS) supported by the Brute-force method or the Cross Removal Met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concept of situational control in road tunnels

    Publication Year: 2012, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    The paper presents the problem field of situational control in case of road tunnels. An analysis and description of traffic situations and regimes in road tunnels is presented. We also present the road tunnel decomposition from system point of view. Control regimes have been created and selected according to critical traffic situations. To support the theoretical and analytical part of the paper w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic algorithms for the weight constrained 3-dimensional bin packing model

    Publication Year: 2012, Page(s):121 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In this paper we consider a modified three dimensional bin packing problem which appears in loading vehicles during planning transportation. This model is a common generalization of two multidimensional bin packing models (box packing and vector packing). We analyse two simple heuristic algorithms for the solution of the problem and their extension with the interval preparation method. We test the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New approach for control manufacturing systems by means of rescheduling in order to handle changes and disturbances

    Publication Year: 2012, Page(s):125 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    This paper focuses on handling disturbances and uncertainty management in Manufacturing Execution Systems (MES). The conception of behaviour-based shop-floor control is discussed. An attempt will be made to demonstrate the usability of behaviour-based control (BBC) in the field of MES. The general state of the manufacturing process is categorized into four classes. According to the classification ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP and UDP deployment in environment with high delay and high bit error rate

    Publication Year: 2012, Page(s):131 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Nowadays implementation of TCP and UDP protocols offer high speed and reliability on data links. Especially TCP implementations offer high speed rates, employing sliding window and data acknowledgement in TCP protocol. On the contrary, UDP offers different options and has other advantages and disadvantages. But in certain environment, especially with high delay and high bit error rate, these proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy based obstacle avoidance for mobil robots with Kinect sensor

    Publication Year: 2012, Page(s):135 - 144
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    This article describes an improved version of a fuzzy-based navigational system and compares the developed system with the Caversan [11] navigational method that was used as a basis of our approach. Our system (which uses a Mamdani-type fuzzy controller that has sixteen rules, three inputs and one output) has better algorithms for both the path planning and for the avoiding of obstacles. This is b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy multi-attribute decision making algorithm for vehicle navigation in sensor network environments

    Publication Year: 2012, Page(s):145 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Summary form only given. In a large-scale wireless sensor traffic network, collecting and processing of the global real-time traffic information are often unreliable. Making real-time navigation decision becomes an arduous task. The vehicle navigation here is considered as a multi-attribute decision making (MADM) problem. To address this issue, an efficient Wireless-Sensor-Network-based real-time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unraveling complexity in assembly supply chain networks

    Publication Year: 2012, Page(s):151 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    In this paper, we present a methodological framework for conceptual modeling of assembly supply chain networks. Models of such networks are divided into classes on the basis of the numbers of initial suppliers. Subsequently, we propose to apply three parameterized measures of topological complexity of such networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.