To realize the adaptive control in the heat tunnel system of fire detector, an adaptive PID control algorithm based on BP network and immune genetic algorithm (IGA) is presented. Firstly, the immune genetic algorithm is used to optimize the weights of BP network, which reduces the influence of control effect due to initial network weights; secondly, the PID parameters are adjusted on line based on the BP network during the control of heat tunnel. Experiment results show that this control algorithm is effective. Compared to other algorithms, the proposed algorithm owns high control precision, suppression capacity to noise and disturbance, and strong robustness.
{"title":"Neural Network Control Based on Optimization of Immune Genetic Algorithm for Heat Tunnel of Fire Detector","authors":"Yunfeng Bu, Yi Shen","doi":"10.1109/ICINIS.2008.50","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.50","url":null,"abstract":"To realize the adaptive control in the heat tunnel system of fire detector, an adaptive PID control algorithm based on BP network and immune genetic algorithm (IGA) is presented. Firstly, the immune genetic algorithm is used to optimize the weights of BP network, which reduces the influence of control effect due to initial network weights; secondly, the PID parameters are adjusted on line based on the BP network during the control of heat tunnel. Experiment results show that this control algorithm is effective. Compared to other algorithms, the proposed algorithm owns high control precision, suppression capacity to noise and disturbance, and strong robustness.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130366976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of ignoring the semantic information inside the keywords, the traditional searching engine based on the key words has low recall and precision. Aiming at this, some semantic retrieval system design ideas and the retrieval process are proposed in this paper.The key technologies-related in semantic retrieval model are analyzed and studied. By using field ontology, semantic research procedure for different types of enterprise data is proposed and implemented. Different types of enterprise data for the semantic reunification process can be presented and achieved in the system based on field ontology. It is believed that the problems about enterprise knowledge integration and retrieval could be solved in some manner according to the experimental results.
{"title":"The Research on Ontology-Driven Semantic Retrieval of Enterprise Data","authors":"Yuanzheng Shao, Lelin Li, Zhenhong Du, Qiang Qi","doi":"10.1109/ICINIS.2008.134","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.134","url":null,"abstract":"Because of ignoring the semantic information inside the keywords, the traditional searching engine based on the key words has low recall and precision. Aiming at this, some semantic retrieval system design ideas and the retrieval process are proposed in this paper.The key technologies-related in semantic retrieval model are analyzed and studied. By using field ontology, semantic research procedure for different types of enterprise data is proposed and implemented. Different types of enterprise data for the semantic reunification process can be presented and achieved in the system based on field ontology. It is believed that the problems about enterprise knowledge integration and retrieval could be solved in some manner according to the experimental results.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During special events in urban transport network, traffic flow supported by route network is obviously different to that in normal circumstance. In the process of special events evacuation, itpsilas not only hoped a mass flow can be evacuated to some shelters, but also wished the evacuation time minimum. Therefore it is a problem to find a MinCost-MaxFlow in transport network. In this paper, the traditional MCMF was modified to describe network traffic assignment problems. Further more, a static traffic assignment based on pipelining was proposed to solve the evacuation flow problem. The numerical experiment on hypothetic network indicated the proposed MCMF algorithm can deal with evacuation traffic assignment problem reasonably.
{"title":"Evacuation Flow Assignment based on Improved MCMF Algorithm","authors":"Yang Fan, Y. Xinping, X. Kun","doi":"10.1109/ICINIS.2008.70","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.70","url":null,"abstract":"During special events in urban transport network, traffic flow supported by route network is obviously different to that in normal circumstance. In the process of special events evacuation, itpsilas not only hoped a mass flow can be evacuated to some shelters, but also wished the evacuation time minimum. Therefore it is a problem to find a MinCost-MaxFlow in transport network. In this paper, the traditional MCMF was modified to describe network traffic assignment problems. Further more, a static traffic assignment based on pipelining was proposed to solve the evacuation flow problem. The numerical experiment on hypothetic network indicated the proposed MCMF algorithm can deal with evacuation traffic assignment problem reasonably.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel parallel data transfer mechanism to improve the performance of data transfer in grid environment. It utilizes the servers distributed in grid system and selects some of them as the proxy servers. It introduces the method of how to select the proxy server. Then data are divided into several parts and sent through the selected proxy servers with different physical links. By that, it can effectively improve the performance of data transfer.
{"title":"Proxy Based Parallel Data Transfer Mechanism in Grid Environment","authors":"Muzhou Xiong, Hai Jin, Song Wu","doi":"10.1109/ICINIS.2008.71","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.71","url":null,"abstract":"This paper proposes a novel parallel data transfer mechanism to improve the performance of data transfer in grid environment. It utilizes the servers distributed in grid system and selects some of them as the proxy servers. It introduces the method of how to select the proxy server. Then data are divided into several parts and sent through the selected proxy servers with different physical links. By that, it can effectively improve the performance of data transfer.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130053620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new fuzzy tuned parameter particle swarm optimization (FPPSO) which remarkably outperforms the standard PSO as well as the previous fuzzy based approaches. Two benchmark functions with asymmetric initial range settings are used to validate the proposed algorithm and compare its performance with that of the other algorithms known as fuzzy based PSO. Numerical results indicate that FPPSO is considerably competitive due to its ability to find the functions' global optimum as well as its better convergence performance..
{"title":"Fuzzy Parameter Particle Swarm Optimization","authors":"P. Yadmellat, S. Salehizadeh, M. Menhaj","doi":"10.1109/ICINIS.2008.111","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.111","url":null,"abstract":"This paper proposes a new fuzzy tuned parameter particle swarm optimization (FPPSO) which remarkably outperforms the standard PSO as well as the previous fuzzy based approaches. Two benchmark functions with asymmetric initial range settings are used to validate the proposed algorithm and compare its performance with that of the other algorithms known as fuzzy based PSO. Numerical results indicate that FPPSO is considerably competitive due to its ability to find the functions' global optimum as well as its better convergence performance..","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel approach to detect traffic congestion on roads in a natural open world scene observed from TV cameras placed on poles or buildings. In this system, a time-spatial imagery based algorithm is proposed to estimate the road status from the video. The experimental results on real road traffic congestion estimation show that the time-spatial method is robust in complex lighting and traffic environment. The detailed algorithm and the comparison results are given in the paper.
{"title":"A Traffic Congestion Estimation Approach from Video Using Time-Spatial Imagery","authors":"Li Li, Long Chen, Xiaofei Huang, Jian Huang","doi":"10.1109/ICINIS.2008.182","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.182","url":null,"abstract":"This paper presents a novel approach to detect traffic congestion on roads in a natural open world scene observed from TV cameras placed on poles or buildings. In this system, a time-spatial imagery based algorithm is proposed to estimate the road status from the video. The experimental results on real road traffic congestion estimation show that the time-spatial method is robust in complex lighting and traffic environment. The detailed algorithm and the comparison results are given in the paper.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114249800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of computer, communication and web technology, especially the widely application of embedded computer and sensor technology, wireless sensor networks (WSN) composed of several hundreds to thousands of nodes which are capable of sensing, actuation, and the ability to communicate, have been paid attention in this field allover the world. In this paper, the author first discusses the advantages of wireless sensor networks (WSN) and analyses the application of WSN in petrochemical industry field. In addition, compares ZigBee technology with the present wireless communication technology. Furthermore, introduce ZigBee protocol and features. Then, with the Freescale Semiconductorpsilas product C13192-SARD DSK board, devise a WSN project based on ZigBee technology to be used in petrol-chemical industry. Finally, verify the correctness and feasibility of the plan.
{"title":"The Application of a Wireless Sensor Network Design Based on ZigBee in Petrochemical Industry Field","authors":"Zhang Ke, Li Yang, Xliao Wang-hui, Suh Heejong","doi":"10.1109/ICINIS.2008.184","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.184","url":null,"abstract":"With the rapid development of computer, communication and web technology, especially the widely application of embedded computer and sensor technology, wireless sensor networks (WSN) composed of several hundreds to thousands of nodes which are capable of sensing, actuation, and the ability to communicate, have been paid attention in this field allover the world. In this paper, the author first discusses the advantages of wireless sensor networks (WSN) and analyses the application of WSN in petrochemical industry field. In addition, compares ZigBee technology with the present wireless communication technology. Furthermore, introduce ZigBee protocol and features. Then, with the Freescale Semiconductorpsilas product C13192-SARD DSK board, devise a WSN project based on ZigBee technology to be used in petrol-chemical industry. Finally, verify the correctness and feasibility of the plan.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the temperature control precision and the big lag of the continuously sintering furnace, the temperature control system is developed. By the thermal analysis function in finite element, the temperature field is analyzed at the coupling circumstance and the temperature distributing is achieved. By the Microsoft Access 2000, the database and the regular base are conceived. At the VC circumstance, the reasoning progress and the configuration monitoring system is designed. The result proved that this system can realized the temperature control of the continuously multi-segments sintering furnace and improve the control precision, which satisfied the temperature control request of the complex multitudinous sintering parts.
{"title":"The Temperature Control System of Continuously Multi-Segments Sintering Furnace","authors":"Shukun Cao, Jing Xu, Lei Shi","doi":"10.1109/ICINIS.2008.181","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.181","url":null,"abstract":"In order to improve the temperature control precision and the big lag of the continuously sintering furnace, the temperature control system is developed. By the thermal analysis function in finite element, the temperature field is analyzed at the coupling circumstance and the temperature distributing is achieved. By the Microsoft Access 2000, the database and the regular base are conceived. At the VC circumstance, the reasoning progress and the configuration monitoring system is designed. The result proved that this system can realized the temperature control of the continuously multi-segments sintering furnace and improve the control precision, which satisfied the temperature control request of the complex multitudinous sintering parts.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133429515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the authors exposes the problems in LEACH when the network is in a large scope, a new routing protocol named LEACH-L is designed. The results of experiments show that LEACH-L can balance the energy dispatch of the sensors in different areas and make a longer lifetime of WSNs when the scope of WSNs goes into larger.
{"title":"An Energy Efficient Multiple-Hop Routing Protocol for Wireless Sensor Networks","authors":"Yang Lei, Fengjun Shang, Zhaohua Long, Yunsen Ren","doi":"10.1109/ICINIS.2008.69","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.69","url":null,"abstract":"In this paper, the authors exposes the problems in LEACH when the network is in a large scope, a new routing protocol named LEACH-L is designed. The results of experiments show that LEACH-L can balance the energy dispatch of the sensors in different areas and make a longer lifetime of WSNs when the scope of WSNs goes into larger.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When textural features are applied to handwriting identification, the accuracy is not high due to the fact that the textural features fluctuate randomly because of the different contents and positions of the characters. In this paper an approach for the construction of texture images is presented. The features of the texture images are calculated and the mathematical expectations of them are estimated. Then the weighted Euclidean distance (WED) classifier is adopted to identify the writer. This approach is proved to be a very promising method for text-independent handwriting identification both theoretically and practically.
{"title":"Handwriting Identification Based on Constructing Texture","authors":"Qinghu Chen, Yuchen Yan, Wei Deng, Feng Yuan","doi":"10.1109/ICINIS.2008.159","DOIUrl":"https://doi.org/10.1109/ICINIS.2008.159","url":null,"abstract":"When textural features are applied to handwriting identification, the accuracy is not high due to the fact that the textural features fluctuate randomly because of the different contents and positions of the characters. In this paper an approach for the construction of texture images is presented. The features of the texture images are calculated and the mathematical expectations of them are estimated. Then the weighted Euclidean distance (WED) classifier is adopted to identify the writer. This approach is proved to be a very promising method for text-independent handwriting identification both theoretically and practically.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125727850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}