27-29 Nov. 2007
Filter Results
-
-
You are welcome
Publication Year: 2007, Page(s): iii -
-
ICCES’07 Committees
Publication Year: 2007, Page(s):viii - ix|
PDF (463 KB)
-
Table of contents
Publication Year: 2007, Page(s):xi - xvi|
PDF (622 KB)
-
System level design methodologies in the multi-processor SoC era
Publication Year: 2007, Page(s):xix - xx|
PDF (596 KB)
-
Ibn al-Haytham and the origins of computerized image analysis
Publication Year: 2007, Page(s):xx - xxiii -
Message security in mobile ad-hoc networks: Using trust-based multi-path routing approach
Publication Year: 2007, Page(s):xxiv - xxix -
Robotic arm control design using piecewise Lyapunov function: An LMI approach
Publication Year: 2007, Page(s):3 - 8
Cited by: Papers (2)In this paper we present a fuzzy output feedback controller. We start by constructing piecewise-quadratic Lyapunov functions for stability achievement and designing of state feedback controllers for continuous time fuzzy systems. It is shown that achieving stability and performance, or designing state feedback controllers, can be cast as convex optimization problems involving linear matrix inequal... View full abstract»
-
Adaptive fuzzy logic controller of visual servoing robot system by membership optimization using genetic algorithms
Publication Year: 2007, Page(s):15 - 20
Cited by: Papers (3)In this paper, fuzzy logic control systems (FLC) and genetic algorithm (GA) are integrated for adaptive fuzzy logic controller to control visual servoing robot. Genetic algorithms are employed as an adaptive method for optimizing the internal parameters of fuzzy membership functions. The overall optimization of membership functions is done by selection of randomly generated parameters. Fitness fun... View full abstract»
-
Controlling a robot arm using exoskeleton for land-mines disposal
Publication Year: 2007, Page(s):21 - 24Robotics, Virtual Reality, Exoskeleton and Human Machine Interface are fields of growing interest and applications every day. Robotic systems have enormous potential to reduce human exposure to dangerous situations and/or increase human presence in remote locations. Most of industrial robots are usually controlled by a computer or micro controllers to perform systematic sequence of actions stored ... View full abstract»
-
Adaptive fuzzy semi-decentralized control for a class of large-scale nonlinear systems based on input-output linearization concept
Publication Year: 2007, Page(s):27 - 32Stable direct and indirect adaptive fuzzy controllers are presented for a class of interconnected nonlinear systems with unknown nonlinear subsystems and unknown nonlinear interconnections, which are represented not only in the canonical forms [1] but also in the general forms. Hybrid adaptive robust tracking control schemes which are based upon a combination of the Hinfin tracking theory, and fuz... View full abstract»
-
Automatic documents classification
Publication Year: 2007, Page(s):33 - 37
Cited by: Papers (2)Automatic document classification is of paramount importance to knowledge management in the information age. Document classification poses many challenges for learning systems since the feature vector used to represent a document must capture some of the complex semantics of natural language. In this paper, we design an automatic document classification system. We investigate the different paramet... View full abstract»
-
A variational technique for 3D reconstruction from multiple views
Publication Year: 2007, Page(s):38 - 43
Cited by: Papers (1)The possibility of being able to acquire 3D information from 2D images has been attracting more and more interest in recent years. Many researchers have therefore been trying to develop robust as well as efficient methods to reconstruct 3D models from images. In this paper we develop and implement a variational approach for surface reconstruction starting from multiple 2D images taken by a calibra... View full abstract»
-
Output feedback fuzzy control design of nonlinear MIMO system: An LMI approach
Publication Year: 2007, Page(s):44 - 49This paper presents an output feedback controller design method for continuous time Takagi-Sugeno (T-S) fuzzy systems, using a fuzzy Lyapunov function. The proposed output feedback fuzzy controller is made up of a fuzzy state feedback controller based on a fuzzy Lyapunov functions and fuzzy observer based on a common quadratic Lyapunov function. Each of the observer and controller is designed sepa... View full abstract»
-
A simulation study of a neural network based approach for the identification of hybrid systems
Publication Year: 2007, Page(s):50 - 55In a previous paper we proposed a Neural Network (NN) identification approach for a class of Hybrid Dynamic System. However, although the obtained NNs represent average models that can fairly approximate a given HDS, the formulation of mathematical demonstration and/or conditions, which guarantee that the obtained NNs predect the outputs with a similar precision in all the modes still a very hard ... View full abstract»
-
Measurement based design and observability algorithm for distributed multi-utility power system operation
Publication Year: 2007, Page(s):58 - 63
Cited by: Papers (1)With power market deregulation, companies cooperate to share one whole grid system but achieve their own economic goals. This paper focuses on how to improve the state estimation result of one company by exchanging raw or estimated data with other companies or ISO. First fundamentals to evaluate a measurement system are developed based on the concept of system redundancy index, leverage point and ... View full abstract»
-
Bilateral agent negotiation for E-Commerce based on fuzzy logic
Publication Year: 2007, Page(s):64 - 69
Cited by: Papers (4)With the rising of interest in intelligent agents, automated negotiation is becoming more important for improvement E-Commerce systems. Negotiation processes that take place in transactions are complex processes, time consuming and costly for participants in order to reach an agreement. Methods such as game theory, which makes a number of assumptions including knowledge of circumstances, are not a... View full abstract»
-
Extraction of protein interaction information from unstructured text using a link grammar parser
Publication Year: 2007, Page(s):70 - 75
Cited by: Papers (3)As research continues to generate vast amounts of data, pertaining to protein interactions, there is a critical need to capture these results in structured formats permitting for computational analysis. Automated the extraction of interactions from unstructured text, would improve the content of databases that store this information and set a method for managing the continued growth of new literat... View full abstract»
-
Job shop scheduling problems with Genetic Algorithms
Publication Year: 2007, Page(s):76 - 80
Cited by: Patents (2)The Job-Shop Scheduling Problem (JSSP) is an extremely difficult problem because it requires very large combinational search space and the precedence constraint between machines. A software tool called Hybrid and Flexible Genetic Algorithm (HybFlexGA) was developed for solving the JSSP. Computational results demonstrate that the proposed HybFlexGA is very efficient and potentially useful in solvin... View full abstract»
-
HPAM 舑 a deadlock-free multicast algorithm for irregular topologies
Publication Year: 2007, Page(s):83 - 88Recently, networks of workstations (NOWs) with underling switch-based networks have been considered as a cost-effective alternative to massively parallel processors. This paper presents a new deadlock-free tree-based multicast algorithm, HPAM, for irregular networks. The HPAM algorithm selects a node represents the horizontal path ancestor (hpa) of all destinations in the multicast. The ... View full abstract»
-
A new efficient public key multi-message multi-recipient signcryption (PK-MM-MRS) scheme for provable secure communications
Publication Year: 2007, Page(s):89 - 94
Cited by: Papers (2)In this paper, a new efficient public key multi-messages multi-recipients signcryption (PK-MM-MRS) scheme for provable secure communications has been proposed. The proposed scheme signcrypted multiple messages for each recipient using a multi-key generator. The multi-key generator played an important role for the communication overhead and computational cost saving in the proposed PK-MM-MRS scheme... View full abstract»
-
Analytical study to detect threshold number of efficient routes in multipath AODV extensions
Publication Year: 2007, Page(s):95 - 100
Cited by: Papers (6)AODV is one of the most common reactive routing protocols used in Mobile Ad hoc Networks (MANETs). It has many advantages over proactive protocols and its drawbacks could be overcome by applying some modifications on the protocol mechanism. One drawback of AODV is the single route abstraction which requires a source node to establish a new route discovery process when a link failure is encountered... View full abstract»
-
A cellular automata random number generator for cryptographic applications
Publication Year: 2007, Page(s):101 - 105In this paper, we describe a single key stream cipher system based on one dimensional cellular automata random number generator with evolution. The robustness of the scheme against cryptanalytic attacks is discussed and it is shown that cryptanalysis requires an exponentially growing amount of computational resources. Also a simple avalanche effect analysis is given to assess the cryptographic str... View full abstract»
-
Access network selection using combined fuzzy control and MCDM in heterogeneous networks
Publication Year: 2007, Page(s):108 - 113
Cited by: Papers (5) | Patents (2)In the next generation of heterogeneous wireless networks, selecting the most optimal and promising access network is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS) provisioning. This paper proposes a new and generic algorithm for access network selection in the heterogeneous wireless environments. The proposed algor... View full abstract»