[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1681505guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ISCID '09: Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design - Volume 01
2009 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
December 12 - 14, 2009
ISBN:
978-0-7695-3865-5
Published:
12 December 2009

Reflects downloads up to 24 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Article
Article
Formal Derivation of the Maximal Contiguous Subsequence Sum Problem with PAR Method
Pages 3–5

Partition-and-Recur PAR method is a simple and useful formal method used to design and prove algorithmic programs. In this paper, we address that PAR method is really an effective formal method on solving Combinatorics problems. We formally derive ...

Article
Relative Transformation with CamNN Applied to Isometric Embedding

Neighborhood selection is one of the most important link in low-dimensional representations of high-dimensional data sets. Also, a good distance measure among the data points is where the shoe pinches. In this paper, we use the cam weighted distance to ...

Article
Fault Diagnosis of Analogue Circuits Using Hyper-sphere SVM and AdaBoost
Pages 11–14

In order to solve the problems of correctly identifying fault classes in fault diagnosis of analogue circuit and improve classification ability, a fault diagnosis method for analog circuits based on AdaBoost algorithm and Hyper-Sphere Support Vector ...

Article
Reverse Bandwagon Profile Inject Attack against Recommender Systems

Collaborative filtering algorithms are successfully used in personalized recommender systems for their simplicity and high recommending quality. However, significant vulnerabilities have recently been identified in collaborative filtering recommender ...

Article
Application of Simulated Annealing Algorithm in Pest Image Segmentation

Traditional pest detection methods can’t provide the grain pests’ categories, densities and other parameters. In addition, with the increase of the stored-grain pests’ drug fastness, their categories and densities are increasing in recent years, With ...

Article
Mining Association Rules in Relation of Quantitative Attribute by Coordinating Data

This paper can be divided two parts, the first one researches the characteristic of mining association rules in quantitative attributes relations, and presents a method by coordinating data to transform quantitative attributes data to Boolean attribute ...

Article
A Research on Showing Ways of Virtual Garments Profile
Pages 28–31

In this paper, 36 coats, which had different ease and made from different fabrics, were made and their profile appearance were evaluated by seven experts. These coats were scanned by using [TC]2 three dimensional body scanner and their three dimensional ...

Article
Research and Implementation of Evolution Cipher Chip

Automatic design of cipher algorithm is an ideal destination of cryptographists, but how to guarantee automatic cipher safe enough to be used in real application and designing time less enough to fit practical requirement are key problems. We first ...

Article
Intelligent Simulation Technique for Interactive Control Plant Shapes

By integrating the recursive and iterative thoughts commonly used in modeling fractals, an intelligent plant simulation technique is presented in the paper. With the technique, not only can the overall shapes and details of plants be controlled ...

Article
Target Tracking Based on a New Adaptive Genetic Algorithm

he importance of image tracking system to TV guidance missile and the modes of target tracking were introduced firstly. Aiming at disadvantage of primal algorithm of template matching, genetic algorithm (GA) is applied to template matching. The GA ...

Article
A New Method for Sequential Fault Diagnosis Based on Ant Algorithm
Pages 44–48

Test sequencing is a binary identification problem wherein one needs to develop a minimal expected cost testing procedure to determine which one of a finite number of possible failure sources, if any, is present. directed towards the test sequencing ...

Article
Solving Large-Scale TSP Using Adaptive Clustering Method

TSP is a well-known NP-hard problem. Although many algorithms for solving TSP, such as linear programming, dynamic programming, genetic algorithm, anneal algorithm, and ACO algorithm have been proven to be effective, they are not so suitable for the ...

Article
The Research for Knowledge Management System Oriented Aircraft Engine Tools Design

Tools are very important for aircraft engine design and making, the trend is implementing knowledge management. On the basis of the analyzing tools design in nowadays, aimed at problems in them, present a model of design knowledge based on the ontology, ...

Article
Adaptive Defogging of a Single Image

Based on the physical model of fogged images, a new method is proposed to enhance the visibility of a single image adaptively. In order to restrain the edge halation produced by virtual air light defogging method, the concept of neighboring pixel’s ...

Article
An Image Enhancement Method Based on Gamma Correction
Pages 60–63

The research of the wheel alignment system based on computer vision is a popular field for automobile safety. For realizing the effective and accurate feature recognition for the chessboard calibration target of the system, the enhancement algorithms ...

Article
A Novel Corner Point Detector for Calibration Target Images Based on Grayscale Symmetry

The research of feature corner recognition for the calibration target is a crucial area for a vision-based measurement system. For the disability of detecting the corner’s location in a vehicle test system accurately, the theoretical errors based on ...

Article
Finer Granularity Clustering for Opinion Mining

The boom of opinion-rich resources such as online review websites, discussion groups, personal blogs and forums on the web has attracted many research efforts on opinion mining. Positive and negative opinions represented in review documents are helpful ...

Article
A Fuzzy Immune PID Controller for Electronic Throttle

Due to the influence of nonlinear dynamic characteristic of electronic throttle, time delay, external disturbance and parameter variation, the opening of electronic throttle is hard to control precisely. A fuzzy immune adaptive PID control is presented ...

Article
Sparse Representation Classification for Image Text Detection
Pages 76–79

Text detection in images is important for the retrieval of text information from digital graph, video databases and web sites. In this paper, a text detection method based on sparse representation classification with discrimination dictionaries is ...

Article
Monitoring Research of Mine IFH Based on IVR
Pages 80–82

By analyzing Coal Mine Safety Supervision of information and process, this article put forward the problem of poor circulation of IFH. In order to adapt to the needs of coal mining enterprises, under the basic premise of the establishment of coal mine ...

Article
An RFID Reader Coordination Model for Data Process
Pages 83–86

Considering the multi-reader deployment in large scale RFID implementation, readers are not working independently but cooperate with each other in a certain context, thus they form a reader network. Lots of researches have been done about the reader ...

Article
An Adaptive Hybrid Particle Swarm Optimization
Pages 87–90

The particle swarm optimization (PSO) algorithm is vulnerable to reach local optimal value. So, this paper presents an adaptive hybrid particles swarm optimization. During the solving process, both crossover operator in genetic algorithm and hyper-...

Article
The Satisfaction Degree Control Mining Method Applied in the Airport Emergency Rescue Scale Decision-Making

According to the absence of rational rule direction in the present scale decision-making of airport emergency rescue, this article puts forward a data mining method based on the satisfaction degree control theory. This method plants the satisfaction ...

Article
AMS: A New MAC Protocol for Underwater Acoustic Networks

The propagation delay is one of important characteristics of underwater acoustic networks. The article analyzes two instances offered by applying MACAW protocol and ALOHA protocol to the underwater acoustic network separately, and then tables a proposal ...

Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations