Resilient function was widely applied in fields like fault-tolerance distributed computing, key distribution in the quantum cryptography and the generation of random sequence in the stream cipher. Resilient function is a static fault-tolerance distributed computing system which has a strong fault-tolerance and intrusion-tolerance ability. A fragmentating algorithm based resilient function was presented in this paper which aims at dealing the fragmentating problem in resilience system. It includes the selection of resilient functions, the description of fragmentating algorithm and the comparison with the Rabin algorithm. This algorithm is convenient and feasible via the analysis of its capability.
{"title":"An Information Fragmentating Algorithm Based Resilient Function in Computing Resiliency","authors":"Sun Jingjing, Wang Xiangpei, Oyang Lujun","doi":"10.1109/ICINIS.2008.175","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.175","url":null,"abstract":"Resilient function was widely applied in fields like fault-tolerance distributed computing, key distribution in the quantum cryptography and the generation of random sequence in the stream cipher. Resilient function is a static fault-tolerance distributed computing system which has a strong fault-tolerance and intrusion-tolerance ability. A fragmentating algorithm based resilient function was presented in this paper which aims at dealing the fragmentating problem in resilience system. It includes the selection of resilient functions, the description of fragmentating algorithm and the comparison with the Rabin algorithm. This algorithm is convenient and feasible via the analysis of its capability.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A flexible inclination measurement system based on wireless sensor network (WSN) is proposed, and the structure of the system, the principle of inclination measurement and the hardware design of the system are described in details. The system that includes accelerometer, MCU, A/D converter and 2.4G wireless transceiver has achieved inclination measurement of high precision in a wide range. Two practical application examples are suggested.
{"title":"A Flexible Inclination Measurement System Based on Wireless Sensor Network","authors":"Kaiming Xi, S. Liang, B. Pang, Qin Zhu","doi":"10.1109/ICINIS.2008.141","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.141","url":null,"abstract":"A flexible inclination measurement system based on wireless sensor network (WSN) is proposed, and the structure of the system, the principle of inclination measurement and the hardware design of the system are described in details. The system that includes accelerometer, MCU, A/D converter and 2.4G wireless transceiver has achieved inclination measurement of high precision in a wide range. Two practical application examples are suggested.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a fast view scheme of mass remote sensing images based on image pyramid is described and implemented. The key techniques in this scheme are tiling, image pyramid, and cache scheduling management. This scheme employs tiling to break the limit of the Windows process memory and improve the I/O speed of hard disk. A wavelet based image pyramid is built for multi-resolution displaying. Cache scheduling management is used for reducing the time latency of image loading. In the case of dragging an image, the viewer uses the existing tile in cache to quickly update the view and replaces the tiles in cache corresponding to the updated view. The experiment results show that this scheme is effective in fast view of mass images.
{"title":"Fast View of Mass Remote Sensing Images Based-on Image Pyramid","authors":"Xiyan Wei, Xin Lu, Hong Sun","doi":"10.1109/ICINIS.2008.75","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.75","url":null,"abstract":"In this paper, a fast view scheme of mass remote sensing images based on image pyramid is described and implemented. The key techniques in this scheme are tiling, image pyramid, and cache scheduling management. This scheme employs tiling to break the limit of the Windows process memory and improve the I/O speed of hard disk. A wavelet based image pyramid is built for multi-resolution displaying. Cache scheduling management is used for reducing the time latency of image loading. In the case of dragging an image, the viewer uses the existing tile in cache to quickly update the view and replaces the tiles in cache corresponding to the updated view. The experiment results show that this scheme is effective in fast view of mass images.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since underwater target echo detection method can not gain characters such as target contour and shape, it is difficult to detect it. Imaging target detection can overcome the difficulty. But imaging is a complex process and the acquired images have complicated background and low signal to noise ratio. Aimed at these, imaging detection experiment is developed and laser images are acquired. Moreover, target detecting methods based on correlation analysis, K-L transform, morphology and fraction are proposed. Experiments proved that these methods could efficaciously detect small weak underwater target in complex background.
{"title":"Underwater Laser Imaging Target Detection Technology","authors":"Shu-bin Yang","doi":"10.1109/ICINIS.2008.15","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.15","url":null,"abstract":"Since underwater target echo detection method can not gain characters such as target contour and shape, it is difficult to detect it. Imaging target detection can overcome the difficulty. But imaging is a complex process and the acquired images have complicated background and low signal to noise ratio. Aimed at these, imaging detection experiment is developed and laser images are acquired. Moreover, target detecting methods based on correlation analysis, K-L transform, morphology and fraction are proposed. Experiments proved that these methods could efficaciously detect small weak underwater target in complex background.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127677993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image registration has been widely used in many works of image processing. But it is difficult to find the accuracy information such as translation, rotation, and scaling between images. This paper proposes an algorithm that Fourier based image registration using the pyramid edge detection and line fitting. It is possible to find the registration information of sub-pixel. So, we can find more accurate registration information. The proposed algorithm can be used for image registrations which high efficiency is required such as GIS, or MRI, CT, image mosaicing, weather forecasting, etc.
{"title":"Fourier Based Image Registration for Sub-Pixel Using Pyramid Edge Detection and Line Fitting","authors":"Kee-Baek Kim, Jong Soo Kim, Jongsoo Choi","doi":"10.1109/ICINIS.2008.178","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.178","url":null,"abstract":"Image registration has been widely used in many works of image processing. But it is difficult to find the accuracy information such as translation, rotation, and scaling between images. This paper proposes an algorithm that Fourier based image registration using the pyramid edge detection and line fitting. It is possible to find the registration information of sub-pixel. So, we can find more accurate registration information. The proposed algorithm can be used for image registrations which high efficiency is required such as GIS, or MRI, CT, image mosaicing, weather forecasting, etc.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heaving motion is an indispensably function for underwater robots. A bionic bladder system which can realize both heaving and pitching control was designed inspired by biologic fishpsilas bladder. It was mainly composed of a cylinder and a piston. The dynamic models of the bionic bladder system for heaving and pitching motion were established and based on which a dual-velocity control system was designed. The two control channels became decoupling by setting different control cycles. Simulations with the real design parameters were performed. Results indicated that a good control performance can be achieved by the bionic bladder system with proper control parameters.
{"title":"Modeling and Analysis of a Bionic Bladder System Designed for Minitype Underwater Robots","authors":"Longxin Lin, Haijun Xu, Haibin Xie, Lincheng Shen","doi":"10.1109/ICINIS.2008.45","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.45","url":null,"abstract":"Heaving motion is an indispensably function for underwater robots. A bionic bladder system which can realize both heaving and pitching control was designed inspired by biologic fishpsilas bladder. It was mainly composed of a cylinder and a piston. The dynamic models of the bionic bladder system for heaving and pitching motion were established and based on which a dual-velocity control system was designed. The two control channels became decoupling by setting different control cycles. Simulations with the real design parameters were performed. Results indicated that a good control performance can be achieved by the bionic bladder system with proper control parameters.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses the relationship between Danger Theory and image object detection, and interprets the produce of the image object detection using Danger Theory. In the paper, the image object detection is mimiced as the produce that biology immune system detects danger antigens, where the interested object are regarded as ldquodanger antigensrdquo and object detectors are regarded as antigen present cells. The architecture of Danger Perception Network (DPNET) and learning algorithms are described in the paper, and the approach of applying Danger Theory in image target detection is also presented. Experiments of vehicle and airplane detection in high resolution satellite images are given to illustrate the feasibility and effectively of proposed method.
{"title":"A Novel Object Detection Approach for Satellite Imagery Based on Danger Theory","authors":"Hong Zheng, Xuemin Hu, Xiaoshu Si, Wenbiao Yang","doi":"10.1109/ICINIS.2008.26","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.26","url":null,"abstract":"This paper discusses the relationship between Danger Theory and image object detection, and interprets the produce of the image object detection using Danger Theory. In the paper, the image object detection is mimiced as the produce that biology immune system detects danger antigens, where the interested object are regarded as ldquodanger antigensrdquo and object detectors are regarded as antigen present cells. The architecture of Danger Perception Network (DPNET) and learning algorithms are described in the paper, and the approach of applying Danger Theory in image target detection is also presented. Experiments of vehicle and airplane detection in high resolution satellite images are given to illustrate the feasibility and effectively of proposed method.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"49 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116319787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Printed document examination plays an important role in public security. A printer identification system is presented for the purpose of identifying the printer which created a suspect printed document. It is composed of image acquisition, image preprocessing and character matching. An optical instrument is developed for document image observation and acquisition under high resolution. Normalized printed characters are obtained and recognized in preprocessing. Distance transform algorithm is applied to character image matching and distance between printed documents is calculated. Finally the minimum distance classifier is applied to printer identification. Experiments are carried out in a database including 45 laser printers and very promising results are achieved.
{"title":"Printer Identification Based on Distance Transform","authors":"Wei Deng, Qinghu Chen, Feng Yuan, Yuchen Yan","doi":"10.1109/ICINIS.2008.158","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.158","url":null,"abstract":"Printed document examination plays an important role in public security. A printer identification system is presented for the purpose of identifying the printer which created a suspect printed document. It is composed of image acquisition, image preprocessing and character matching. An optical instrument is developed for document image observation and acquisition under high resolution. Normalized printed characters are obtained and recognized in preprocessing. Distance transform algorithm is applied to character image matching and distance between printed documents is calculated. Finally the minimum distance classifier is applied to printer identification. Experiments are carried out in a database including 45 laser printers and very promising results are achieved.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, on the basis of management information systems (MIS) evaluation index system, a integrated evaluation model is established by using support vector machine. The method has advantages of accuracy, convenience, reliability and rapidity. It can simulate evaluation made by experts and avoid subjective mistakes. The comparison between simulation and empirical analysis proves this method is effective.
{"title":"The Application of SVM in Integrated Evaluation for MIS","authors":"Yang Qisheng, Zhang Yanfei, Tong Huaishui","doi":"10.1109/ICINIS.2008.88","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.88","url":null,"abstract":"In this paper, on the basis of management information systems (MIS) evaluation index system, a integrated evaluation model is established by using support vector machine. The method has advantages of accuracy, convenience, reliability and rapidity. It can simulate evaluation made by experts and avoid subjective mistakes. The comparison between simulation and empirical analysis proves this method is effective.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposed a topology clustering scheme based on genetic algorithm (GACluster) to improve the topology clustering performance in the course of constructing the hierarchical overlay multicast. The scheme firstly constructed the clustering feature space by normalizing the two routing metrics (overlay path delay and overlay node access bandwidth), and then implemented genetic algorithm for the topology clustering operation. The experiments illustrated, compared with the common clustering method HCM, that the proposed scheme performs better in both the clustering performance and the topology optimization.
{"title":"A GA-Based Clustering Scheme for Overlay Multicast Topology Optimization","authors":"Jun Lu, Bing Qi","doi":"10.1109/ICINIS.2008.112","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.112","url":null,"abstract":"This paper proposed a topology clustering scheme based on genetic algorithm (GACluster) to improve the topology clustering performance in the course of constructing the hierarchical overlay multicast. The scheme firstly constructed the clustering feature space by normalizing the two routing metrics (overlay path delay and overlay node access bandwidth), and then implemented genetic algorithm for the topology clustering operation. The experiments illustrated, compared with the common clustering method HCM, that the proposed scheme performs better in both the clustering performance and the topology optimization.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}