No abstract available.
Formal Derivation of the Maximal Contiguous Subsequence Sum Problem with PAR Method
Partition-and-Recur PAR method is a simple and useful formal method used to design and prove algorithmic programs. In this paper, we address that PAR method is really an effective formal method on solving Combinatorics problems. We formally derive ...
Relative Transformation with CamNN Applied to Isometric Embedding
Neighborhood selection is one of the most important link in low-dimensional representations of high-dimensional data sets. Also, a good distance measure among the data points is where the shoe pinches. In this paper, we use the cam weighted distance to ...
Fault Diagnosis of Analogue Circuits Using Hyper-sphere SVM and AdaBoost
In order to solve the problems of correctly identifying fault classes in fault diagnosis of analogue circuit and improve classification ability, a fault diagnosis method for analog circuits based on AdaBoost algorithm and Hyper-Sphere Support Vector ...
Reverse Bandwagon Profile Inject Attack against Recommender Systems
Collaborative filtering algorithms are successfully used in personalized recommender systems for their simplicity and high recommending quality. However, significant vulnerabilities have recently been identified in collaborative filtering recommender ...
Application of Simulated Annealing Algorithm in Pest Image Segmentation
Traditional pest detection methods can’t provide the grain pests’ categories, densities and other parameters. In addition, with the increase of the stored-grain pests’ drug fastness, their categories and densities are increasing in recent years, With ...
Mining Association Rules in Relation of Quantitative Attribute by Coordinating Data
This paper can be divided two parts, the first one researches the characteristic of mining association rules in quantitative attributes relations, and presents a method by coordinating data to transform quantitative attributes data to Boolean attribute ...
A Research on Showing Ways of Virtual Garments Profile
In this paper, 36 coats, which had different ease and made from different fabrics, were made and their profile appearance were evaluated by seven experts. These coats were scanned by using [TC]2 three dimensional body scanner and their three dimensional ...
Research and Implementation of Evolution Cipher Chip
Automatic design of cipher algorithm is an ideal destination of cryptographists, but how to guarantee automatic cipher safe enough to be used in real application and designing time less enough to fit practical requirement are key problems. We first ...
Intelligent Simulation Technique for Interactive Control Plant Shapes
By integrating the recursive and iterative thoughts commonly used in modeling fractals, an intelligent plant simulation technique is presented in the paper. With the technique, not only can the overall shapes and details of plants be controlled ...
Target Tracking Based on a New Adaptive Genetic Algorithm
he importance of image tracking system to TV guidance missile and the modes of target tracking were introduced firstly. Aiming at disadvantage of primal algorithm of template matching, genetic algorithm (GA) is applied to template matching. The GA ...
A New Method for Sequential Fault Diagnosis Based on Ant Algorithm
Test sequencing is a binary identification problem wherein one needs to develop a minimal expected cost testing procedure to determine which one of a finite number of possible failure sources, if any, is present. directed towards the test sequencing ...
Solving Large-Scale TSP Using Adaptive Clustering Method
TSP is a well-known NP-hard problem. Although many algorithms for solving TSP, such as linear programming, dynamic programming, genetic algorithm, anneal algorithm, and ACO algorithm have been proven to be effective, they are not so suitable for the ...
The Research for Knowledge Management System Oriented Aircraft Engine Tools Design
Tools are very important for aircraft engine design and making, the trend is implementing knowledge management. On the basis of the analyzing tools design in nowadays, aimed at problems in them, present a model of design knowledge based on the ontology, ...
Adaptive Defogging of a Single Image
Based on the physical model of fogged images, a new method is proposed to enhance the visibility of a single image adaptively. In order to restrain the edge halation produced by virtual air light defogging method, the concept of neighboring pixel’s ...
An Image Enhancement Method Based on Gamma Correction
The research of the wheel alignment system based on computer vision is a popular field for automobile safety. For realizing the effective and accurate feature recognition for the chessboard calibration target of the system, the enhancement algorithms ...
A Novel Corner Point Detector for Calibration Target Images Based on Grayscale Symmetry
The research of feature corner recognition for the calibration target is a crucial area for a vision-based measurement system. For the disability of detecting the corner’s location in a vehicle test system accurately, the theoretical errors based on ...
Finer Granularity Clustering for Opinion Mining
The boom of opinion-rich resources such as online review websites, discussion groups, personal blogs and forums on the web has attracted many research efforts on opinion mining. Positive and negative opinions represented in review documents are helpful ...
A Fuzzy Immune PID Controller for Electronic Throttle
Due to the influence of nonlinear dynamic characteristic of electronic throttle, time delay, external disturbance and parameter variation, the opening of electronic throttle is hard to control precisely. A fuzzy immune adaptive PID control is presented ...
Sparse Representation Classification for Image Text Detection
Text detection in images is important for the retrieval of text information from digital graph, video databases and web sites. In this paper, a text detection method based on sparse representation classification with discrimination dictionaries is ...
Monitoring Research of Mine IFH Based on IVR
By analyzing Coal Mine Safety Supervision of information and process, this article put forward the problem of poor circulation of IFH. In order to adapt to the needs of coal mining enterprises, under the basic premise of the establishment of coal mine ...
An RFID Reader Coordination Model for Data Process
Considering the multi-reader deployment in large scale RFID implementation, readers are not working independently but cooperate with each other in a certain context, thus they form a reader network. Lots of researches have been done about the reader ...
An Adaptive Hybrid Particle Swarm Optimization
The particle swarm optimization (PSO) algorithm is vulnerable to reach local optimal value. So, this paper presents an adaptive hybrid particles swarm optimization. During the solving process, both crossover operator in genetic algorithm and hyper-...
The Satisfaction Degree Control Mining Method Applied in the Airport Emergency Rescue Scale Decision-Making
According to the absence of rational rule direction in the present scale decision-making of airport emergency rescue, this article puts forward a data mining method based on the satisfaction degree control theory. This method plants the satisfaction ...
AMS: A New MAC Protocol for Underwater Acoustic Networks
The propagation delay is one of important characteristics of underwater acoustic networks. The article analyzes two instances offered by applying MACAW protocol and ALOHA protocol to the underwater acoustic network separately, and then tables a proposal ...
Index Terms
- Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design - Volume 01