During the past several years, there has been a significant amount of research conducted simultaneous multiple resources scheduling problem (SMRSP) Intelligence manufacturing based on meta-heuristics, such as genetic algorithms (GAs), simulated annealing (SA) particle swarm optimization(PSO), has become a common tool to find satisfactory solutions within reasonable computational times in real settings. However, there are few researches considering interdependent relation during the decision activities, moreover for complex and large problems, local constraints and objectives from each managerial entity cannot be effectively represented in a single model for complex and large problems. In this paper, we propose a novel cooperative Bayesian optimization algorithm (COBOA) undertaking divide-and-conquer strategy and co-evolutionary framework. Considerable experiments are conducted and the results confirmed that COBOA outperforms recent researches for the scheduling problem in FMS.
{"title":"Cooperative Bayesian Optimization Algorithm: A Novel Approach to Simultaneous Multiple Resources Scheduling Problem","authors":"X. Hao, Xili Chen, H. Lin, T. Murata","doi":"10.1109/IBICA.2011.57","DOIUrl":"https://doi.org/10.1109/IBICA.2011.57","url":null,"abstract":"During the past several years, there has been a significant amount of research conducted simultaneous multiple resources scheduling problem (SMRSP) Intelligence manufacturing based on meta-heuristics, such as genetic algorithms (GAs), simulated annealing (SA) particle swarm optimization(PSO), has become a common tool to find satisfactory solutions within reasonable computational times in real settings. However, there are few researches considering interdependent relation during the decision activities, moreover for complex and large problems, local constraints and objectives from each managerial entity cannot be effectively represented in a single model for complex and large problems. In this paper, we propose a novel cooperative Bayesian optimization algorithm (COBOA) undertaking divide-and-conquer strategy and co-evolutionary framework. Considerable experiments are conducted and the results confirmed that COBOA outperforms recent researches for the scheduling problem in FMS.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most existing subspace analysis methods for image recognition estimate the sample scatter matrices directly based on the training images. However, such methods do not consider the different contributions of different image components to image representation and recognition. Considering that the dominant component will contribute much more than the residual component to image pattern classification, we present a novel discriminate criterion which maximizes the total scatter of dominant components and minimizes simultaneously the total scatter of residual components. This criterion gives rise to a new subspace analysis method, namely the subspace analysis via low rank decomposition (SAL). Further, a supervised version of SAL (SSAL) is presented. The experimental results on benchmark image databases validated that SAL and SSAL outperform those representative subspace analysis methods such as PCA, LDA, LLP and SPP.
{"title":"A Linear Subspace Learning Approach via Low Rank Decomposition","authors":"Fanlong Zhang, Jian Yang","doi":"10.1109/IBICA.2011.25","DOIUrl":"https://doi.org/10.1109/IBICA.2011.25","url":null,"abstract":"Most existing subspace analysis methods for image recognition estimate the sample scatter matrices directly based on the training images. However, such methods do not consider the different contributions of different image components to image representation and recognition. Considering that the dominant component will contribute much more than the residual component to image pattern classification, we present a novel discriminate criterion which maximizes the total scatter of dominant components and minimizes simultaneously the total scatter of residual components. This criterion gives rise to a new subspace analysis method, namely the subspace analysis via low rank decomposition (SAL). Further, a supervised version of SAL (SSAL) is presented. The experimental results on benchmark image databases validated that SAL and SSAL outperform those representative subspace analysis methods such as PCA, LDA, LLP and SPP.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main work of Power Group Enterprises' IT services and operation includes services application, troubleshooting and work order processing. This paper proposes a set of workflows and portal architecture of services application, troubleshooting and fault classification, which has a very large of reference value for the IT services industry.
{"title":"A Portal Architecture Based on IT Services","authors":"Tingting Sun, Futong Huang","doi":"10.1109/IBICA.2011.74","DOIUrl":"https://doi.org/10.1109/IBICA.2011.74","url":null,"abstract":"The main work of Power Group Enterprises' IT services and operation includes services application, troubleshooting and work order processing. This paper proposes a set of workflows and portal architecture of services application, troubleshooting and fault classification, which has a very large of reference value for the IT services industry.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuan-Ching Kuo, M. Sheu, S. Siao, Cheng Huang, Tzu-Hsuing Chen
An efficient design of the reverse converter forthe three-moduli set {2n, 2n+1-1, 2n-1} is presented in thispaper. The reverse converter is structured by an adderbased on New Chinese Remainder Theorem II (NewCRT-II) conversion such that it can improve thehardware cost. The proposed conversion design iscompared with the existing works based on the standardCell TSMC 0.18µm CMOS technology. Under the samedynamic range(DR), the experimental results indicatethat our design has better performance in terms of thearea× delay × power. The proposed converter canachieve about average 46.596 % and 61.890 % reductionfor those design with 4n-bit and 5n-bit dynamic range,respectively.
{"title":"New Reverse Converter Design of Moduli Set {2n, 2n+1-1, 2n-1}","authors":"Yuan-Ching Kuo, M. Sheu, S. Siao, Cheng Huang, Tzu-Hsuing Chen","doi":"10.1109/IBICA.2011.66","DOIUrl":"https://doi.org/10.1109/IBICA.2011.66","url":null,"abstract":"An efficient design of the reverse converter forthe three-moduli set {2n, 2n+1-1, 2n-1} is presented in thispaper. The reverse converter is structured by an adderbased on New Chinese Remainder Theorem II (NewCRT-II) conversion such that it can improve thehardware cost. The proposed conversion design iscompared with the existing works based on the standardCell TSMC 0.18µm CMOS technology. Under the samedynamic range(DR), the experimental results indicatethat our design has better performance in terms of thearea× delay × power. The proposed converter canachieve about average 46.596 % and 61.890 % reductionfor those design with 4n-bit and 5n-bit dynamic range,respectively.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to extensive research of non-linear science theory (the chaos) in the image encryption, we find especially that the properties of chaos make itself particularly suitable for image encryption. On the basis of many excellent features of chaotic sequence, combining application of chaotic theory in cryptography, the paper puts forward image encryption based on chaotic binary sequence. On Logistic digital chaotic system platform, the paper gives the realization mechanism of image encryption based on digital chaotic binary Logistic sequence. Meanwhile, the paper also conducts histogram analysis, key sensitivity analysis and damage resistance analysis for the encrypted image. Simulation results show that this method can better resist damage and is very sensitive for secret key.
{"title":"Realization of Image Encryption Scheme Based on Chaotic Binary Sequence","authors":"Xiaoli Geng, Quan Ding","doi":"10.1109/IBICA.2011.45","DOIUrl":"https://doi.org/10.1109/IBICA.2011.45","url":null,"abstract":"Due to extensive research of non-linear science theory (the chaos) in the image encryption, we find especially that the properties of chaos make itself particularly suitable for image encryption. On the basis of many excellent features of chaotic sequence, combining application of chaotic theory in cryptography, the paper puts forward image encryption based on chaotic binary sequence. On Logistic digital chaotic system platform, the paper gives the realization mechanism of image encryption based on digital chaotic binary Logistic sequence. Meanwhile, the paper also conducts histogram analysis, key sensitivity analysis and damage resistance analysis for the encrypted image. Simulation results show that this method can better resist damage and is very sensitive for secret key.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Improving visibility on medical images is crucially important for facilitating diagnostic accuracy. We propose a method which aims at improving visibility on medical images by means of detail enhancement. The core techniques we employ to achieve detail enhancement are coefficient estimation and coefficient refinement, and all are manipulated in wavelet domain. Our method enables visually hidden information to be revealed and blurred texture to be restored without significantly altering averaged optical density and dynamic range of medical images. Moreover, the proposed method enables the level for detail enhancement to be scalably selectable, through which an optimally enhanced image can be obtained for viewer¡¦s reference.
{"title":"Visibility Improvement by Detail Eenhancement on Medical Images","authors":"Wen-Li Lee, Mei-Juan Chen","doi":"10.1109/IBICA.2011.10","DOIUrl":"https://doi.org/10.1109/IBICA.2011.10","url":null,"abstract":"Improving visibility on medical images is crucially important for facilitating diagnostic accuracy. We propose a method which aims at improving visibility on medical images by means of detail enhancement. The core techniques we employ to achieve detail enhancement are coefficient estimation and coefficient refinement, and all are manipulated in wavelet domain. Our method enables visually hidden information to be revealed and blurred texture to be restored without significantly altering averaged optical density and dynamic range of medical images. Moreover, the proposed method enables the level for detail enhancement to be scalably selectable, through which an optimally enhanced image can be obtained for viewer¡¦s reference.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper first makes an analysis about the current status of the computing platforms of nuclear fuel and their defects, then we propose to introduce XML database in current platforms in order to overcome those problems in indexing of file system data, cross-platform data communication, and hazard in data saving. Finally, we design a novel database architecture based on existing relational database using XML technology.
{"title":"An Application of the Database Technology Based on XML Used for Nuclear Fuel Calculation Platform","authors":"Ying Peng, Guodong Jiao","doi":"10.1109/IBICA.2011.76","DOIUrl":"https://doi.org/10.1109/IBICA.2011.76","url":null,"abstract":"This paper first makes an analysis about the current status of the computing platforms of nuclear fuel and their defects, then we propose to introduce XML database in current platforms in order to overcome those problems in indexing of file system data, cross-platform data communication, and hazard in data saving. Finally, we design a novel database architecture based on existing relational database using XML technology.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a color-based recognition approach is proposed to recognize and track the trajectory of moving object and use this approach for the examining of sports fitness to construct an automatic examining system. The quantity for the specific movements will be measured and counted by this system to substitute for traditional method to eliminate the error due to subjective evaluation. This automatic examining system can reduce the error rates as well as decrease the use of manpower, and to reduce the overall examining time effectively. So, doing the examination of sports fitness by this system in the campus is so easy, convenient, and practical, and it is not rigidly suffer from the manpower issue, the venue and the inconsistent action. It seems from the experimental results, this proposed method can indeed achieve the goal of automatic examining and will be focused on the promotion of the design and application of the overall system
{"title":"Using the Image Recognition Techniques to Implement an Automatic Examining Mechanism for the Sports Fitness","authors":"C. Tzeng, T. Wey","doi":"10.1109/IBICA.2011.24","DOIUrl":"https://doi.org/10.1109/IBICA.2011.24","url":null,"abstract":"In this paper, a color-based recognition approach is proposed to recognize and track the trajectory of moving object and use this approach for the examining of sports fitness to construct an automatic examining system. The quantity for the specific movements will be measured and counted by this system to substitute for traditional method to eliminate the error due to subjective evaluation. This automatic examining system can reduce the error rates as well as decrease the use of manpower, and to reduce the overall examining time effectively. So, doing the examination of sports fitness by this system in the campus is so easy, convenient, and practical, and it is not rigidly suffer from the manpower issue, the venue and the inconsistent action. It seems from the experimental results, this proposed method can indeed achieve the goal of automatic examining and will be focused on the promotion of the design and application of the overall system","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a real time personal identification based on Fourier transform for palm-print recognition. An auto hand gesture segmentation method is proposed in the paper and after the segmentation, a modified Fourier transform are used for the image processing. Machine leaning based trainings are used to get the palm print trait database. At last, performances are shown for theidentification.
{"title":"A Real Time Personal Identification Based on Fourier Transform of Palmprint Recognition","authors":"Shunyu Yang","doi":"10.1109/IBICA.2011.89","DOIUrl":"https://doi.org/10.1109/IBICA.2011.89","url":null,"abstract":"In this paper, we propose a real time personal identification based on Fourier transform for palm-print recognition. An auto hand gesture segmentation method is proposed in the paper and after the segmentation, a modified Fourier transform are used for the image processing. Machine leaning based trainings are used to get the palm print trait database. At last, performances are shown for theidentification.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Positron emission tomography(PET)images are often used to detect physiology function.However,PET images have more blurs than anatomic images,such as magnetic resonance imaging(MRI)and computed tomography(CT).With the graylevel of PET images,Doctors need to manually obtain the region of interest(ROI).THis paper presents a PET image segmentation technology based on the wavelet theory.Through sampling,recombination,and fetching the thresholds of images,theimage segmentation with 1960 dynamic PET images of abdominal organs were conducted. Compared with a sigle PET image, the image segmentation technology proposed can accurately and rapidly identify the boundaries of organs,such as the small intestines,the liver,and the kidney,as well as efficiently provide the ROI information for doctors.
{"title":"Image Segmentation Method with Positron Emission Tomography Time Sequence Images","authors":"Chih-Yu Hsu, Y. Lai, Chih-Cheng Chen, Yu-Tzu Lee","doi":"10.1109/IBICA.2011.96","DOIUrl":"https://doi.org/10.1109/IBICA.2011.96","url":null,"abstract":"Positron emission tomography(PET)images are often used to detect physiology function.However,PET images have more blurs than anatomic images,such as magnetic resonance imaging(MRI)and computed tomography(CT).With the graylevel of PET images,Doctors need to manually obtain the region of interest(ROI).THis paper presents a PET image segmentation technology based on the wavelet theory.Through sampling,recombination,and fetching the thresholds of images,theimage segmentation with 1960 dynamic PET images of abdominal organs were conducted. Compared with a sigle PET image, the image segmentation technology proposed can accurately and rapidly identify the boundaries of organs,such as the small intestines,the liver,and the kidney,as well as efficiently provide the ROI information for doctors.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}