Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473623
Shuchao Tian, Xiaoping Wu, Hong-Xia Wang
Aiming at the attribute reduction problems of the information system, a new algorithm based on DNA-sticker model is proposed in this paper. Firstly, the dependency matrix of the information system is established, which could convert the problem of attribute reduction to set cover problem. Then, the all true solution can be achieved by using DNA-sticker model. Finally, through the example the conclusion is drawn that this method is feasible, simple, and effective.
{"title":"An Attribute Reduction Algorithm of the Information System Based on DNA-Sticker Model","authors":"Shuchao Tian, Xiaoping Wu, Hong-Xia Wang","doi":"10.1109/IWISA.2010.5473623","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473623","url":null,"abstract":"Aiming at the attribute reduction problems of the information system, a new algorithm based on DNA-sticker model is proposed in this paper. Firstly, the dependency matrix of the information system is established, which could convert the problem of attribute reduction to set cover problem. Then, the all true solution can be achieved by using DNA-sticker model. Finally, through the example the conclusion is drawn that this method is feasible, simple, and effective.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115386724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473433
Z. Cheng, D. Shi
According to a nonlinear chaos financial system, one fractional-order nonlinear financial system is proposed. The features of all equilibrium points for the fractional-order nonlinear financial system are yield. According to the features of all equilibrium points, the necessary condition for the existence of chaotic attractors in this fractional-order nonlinear financial system is obtained via the stability theory of fractional-order systems. The Lyapunov exponents spectrum of this fractional-order nonlinear financial system is obtained. The chaos attractors for this fractional-order nonlinear financial system are obtained by computer simulation. The simulation results of chaos attractors indicate that the necessary condition for the existence of chaotic attractors in fractional-order nonlinear financial system is correctly.
{"title":"Chaos in a Fractional-Order Nonlinear Financial System","authors":"Z. Cheng, D. Shi","doi":"10.1109/IWISA.2010.5473433","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473433","url":null,"abstract":"According to a nonlinear chaos financial system, one fractional-order nonlinear financial system is proposed. The features of all equilibrium points for the fractional-order nonlinear financial system are yield. According to the features of all equilibrium points, the necessary condition for the existence of chaotic attractors in this fractional-order nonlinear financial system is obtained via the stability theory of fractional-order systems. The Lyapunov exponents spectrum of this fractional-order nonlinear financial system is obtained. The chaos attractors for this fractional-order nonlinear financial system are obtained by computer simulation. The simulation results of chaos attractors indicate that the necessary condition for the existence of chaotic attractors in fractional-order nonlinear financial system is correctly.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473527
B. Niu, Yan Fan, Pei Zhao, Bing Xue, Li Li, Yujuan Chai
Bacterial foraging optimization (BFO) is a relatively new bio-heuristic algorithm which is based on a metaphor of social interaction of E. coli bacteria. Although the algorithm has successfully been applied to many kinds of real word optimization problems, experimentation with complex problems reports that the basic BFO algorithm possesses a poor performance. Thus a novel bacterial foraging optimizer with linear decreasing chemotaxis step (BFO-LDC) algorithm is proposed in the present paper. The performance of the proposed BFO-LDC is amply demonstrated by applying it for four classical test functions and comparing it with basic BFO. And the results obtained show this proposed algorithm greatly improves the efficiency of basic BFO algorithm.
{"title":"A Novel Bacterial Foraging Optimizer with Linear Decreasing Chemotaxis Step","authors":"B. Niu, Yan Fan, Pei Zhao, Bing Xue, Li Li, Yujuan Chai","doi":"10.1109/IWISA.2010.5473527","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473527","url":null,"abstract":"Bacterial foraging optimization (BFO) is a relatively new bio-heuristic algorithm which is based on a metaphor of social interaction of E. coli bacteria. Although the algorithm has successfully been applied to many kinds of real word optimization problems, experimentation with complex problems reports that the basic BFO algorithm possesses a poor performance. Thus a novel bacterial foraging optimizer with linear decreasing chemotaxis step (BFO-LDC) algorithm is proposed in the present paper. The performance of the proposed BFO-LDC is amply demonstrated by applying it for four classical test functions and comparing it with basic BFO. And the results obtained show this proposed algorithm greatly improves the efficiency of basic BFO algorithm.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473312
Weixing Wang, Juan Wan, Zhao Yang
This paper proposes a rock fracture image segmentation algorithm based on fractional differential theory. By iteratively convoluted with the new covering templates, the high frequency signals on a rock fracture image can be more effectively extracted than the Tiansi module which has been applied in image processing applications. This study is very meaningful for expanding the application areas of fractional differential and carrying out a significant exploration.
{"title":"Rock Fracture Extracting on Fractional Differential","authors":"Weixing Wang, Juan Wan, Zhao Yang","doi":"10.1109/IWISA.2010.5473312","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473312","url":null,"abstract":"This paper proposes a rock fracture image segmentation algorithm based on fractional differential theory. By iteratively convoluted with the new covering templates, the high frequency signals on a rock fracture image can be more effectively extracted than the Tiansi module which has been applied in image processing applications. This study is very meaningful for expanding the application areas of fractional differential and carrying out a significant exploration.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473522
Wenru Zang, X. Fu
Fruit is one of the necessities of daily life and the supply chain for fruit is one of the most important. China ranks the number one in the world fruit productions. This article explores the structure of fruit supply chains in China through studying cases in Sichuan Province. It concludes that the present pattern of fruit supply in China is a complicated situation of multiple chains and nets, wholesale markets, core production enterprises, supermarkets, and distribution centers. Each has its particular characteristics, limitations and adaptabilities. Wholesale market chains are the most prevalent pattern at present. Supermarket chains and distribution centers have great potential in large cities. The development of core production enterprises is related to the ability of the core company.
{"title":"The Development of Fruit Supply Patterns in China: Sichuan as a Case","authors":"Wenru Zang, X. Fu","doi":"10.1109/IWISA.2010.5473522","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473522","url":null,"abstract":"Fruit is one of the necessities of daily life and the supply chain for fruit is one of the most important. China ranks the number one in the world fruit productions. This article explores the structure of fruit supply chains in China through studying cases in Sichuan Province. It concludes that the present pattern of fruit supply in China is a complicated situation of multiple chains and nets, wholesale markets, core production enterprises, supermarkets, and distribution centers. Each has its particular characteristics, limitations and adaptabilities. Wholesale market chains are the most prevalent pattern at present. Supermarket chains and distribution centers have great potential in large cities. The development of core production enterprises is related to the ability of the core company.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473520
Tao Xu, Chunxiao Yi
With the development and application of Web service technology, the security of Web service is becoming more and more important. The security of SOAP message is an important factor which decides Web service security. In order to realize the security of SOAP message, an approach to partly sign and encrypt on SOAP message based on Rampart is proposed in this paper. The experimental results demonstrate that the approach can enhance the security of Web service, as well as improve the flexibility for Web service message transmission and operation.
{"title":"Signature and Encryption on Parts of SOAP Message Based on Rampart","authors":"Tao Xu, Chunxiao Yi","doi":"10.1109/IWISA.2010.5473520","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473520","url":null,"abstract":"With the development and application of Web service technology, the security of Web service is becoming more and more important. The security of SOAP message is an important factor which decides Web service security. In order to realize the security of SOAP message, an approach to partly sign and encrypt on SOAP message based on Rampart is proposed in this paper. The experimental results demonstrate that the approach can enhance the security of Web service, as well as improve the flexibility for Web service message transmission and operation.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125924101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473236
Hai-tao Shi, Yunhua Yu, Qian-qian Kong
Various fault types and difficult diagnosis restricted the improvement of economic benefit and system efficiency of electrical submersible progressing cavity pump (ESPCP) production system. A novel method for status recognition of electrical parameters in fault diagnosis of ESPCP based on biomimetic pattern recognition (BPR) is presented. Application results show the proposed BPR classifier produces significant accuracy for classification of ESPCP electrical parameters. Compared with the results based on support vector machine (SVM), the proposed method is more efficiency.
{"title":"Status Recognition for Electrical Parameters of ESPCP Based on Biomimetic Pattern Recognition","authors":"Hai-tao Shi, Yunhua Yu, Qian-qian Kong","doi":"10.1109/IWISA.2010.5473236","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473236","url":null,"abstract":"Various fault types and difficult diagnosis restricted the improvement of economic benefit and system efficiency of electrical submersible progressing cavity pump (ESPCP) production system. A novel method for status recognition of electrical parameters in fault diagnosis of ESPCP based on biomimetic pattern recognition (BPR) is presented. Application results show the proposed BPR classifier produces significant accuracy for classification of ESPCP electrical parameters. Compared with the results based on support vector machine (SVM), the proposed method is more efficiency.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473403
Xiaotao Xu, L. Yao, Yan Wan
Fiber classification, especially shaped fiber classifi-cation, is always an important area in textile analysis. Traditional manual or semi-manual ways to classify different type of fibers will take a lot of time. Support Vector Machine (SVM) is an efficient and robust classifier that will fulfill the requirement on fiber classification. In this paper, a shaped fiber classification method based on Support Vector Machine (SVM) and Kernel Principal Component Analysis (KPCA) is proposed. The shaped fiber's features extracted by KPCA are used to train and test SVM for obtain suitable parameters of SVM. The experimental results show that our presented algorithm is efficient and robust on classifying shaped fibers.
{"title":"A New Shaped Fiber Classification Algorithm Based on SVM","authors":"Xiaotao Xu, L. Yao, Yan Wan","doi":"10.1109/IWISA.2010.5473403","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473403","url":null,"abstract":"Fiber classification, especially shaped fiber classifi-cation, is always an important area in textile analysis. Traditional manual or semi-manual ways to classify different type of fibers will take a lot of time. Support Vector Machine (SVM) is an efficient and robust classifier that will fulfill the requirement on fiber classification. In this paper, a shaped fiber classification method based on Support Vector Machine (SVM) and Kernel Principal Component Analysis (KPCA) is proposed. The shaped fiber's features extracted by KPCA are used to train and test SVM for obtain suitable parameters of SVM. The experimental results show that our presented algorithm is efficient and robust on classifying shaped fibers.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we present a 3D face recognition method which utilizes 3D facial geometric features. Compared with some other relative methods our method does not need to accurately locate facial points, only nose tip should be detected. Geometric distance among the points around nose tip is calculated to represent the facial geometry. Our recognition process takes two steps. In the first step, a number of candidates are selected from the gallery according to the geometric features we extracted. In the second step, ICP algorithm is performed to match the probe with the candidates to make the final decision. We use CASIA 3D face database to evaluate our system. Experiment results demonstrate that our method is competitive with other 3D face recognition methods.
{"title":"An Efficient 3D Face Recognition Method Using Geometric Features","authors":"Yong-An Li, Yong-jun Shen, Gui-Dong Zhang, Taohong Yuan, Xiu-Ji Xiao, Hua-Long Xu","doi":"10.1109/IWISA.2010.5473292","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473292","url":null,"abstract":"In this work, we present a 3D face recognition method which utilizes 3D facial geometric features. Compared with some other relative methods our method does not need to accurately locate facial points, only nose tip should be detected. Geometric distance among the points around nose tip is calculated to represent the facial geometry. Our recognition process takes two steps. In the first step, a number of candidates are selected from the gallery according to the geometric features we extracted. In the second step, ICP algorithm is performed to match the probe with the candidates to make the final decision. We use CASIA 3D face database to evaluate our system. Experiment results demonstrate that our method is competitive with other 3D face recognition methods.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123414447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1109/IWISA.2010.5473360
Jianpo Li, Xu-ning Zhu, X. Li, Zhi-ming Zhang, Ji-sheng Sui
Aiming at the disadvantages of traditional wire attendance system, a design method of wireless fingerprint attendance system based on ZigBee technology is proposed. The system includes terminal fingerprint acquisition module and attendance management module in computer. It can realize automatically such functions as information acquisition of fingerprint, processing, wireless transmission, fingerprint matching, and attendance management. Considering the fact and topology of ZigBee network, the system designs wireless local area network which is cluster tree network. To resolve the problem of time delay when the image is transmitted by ZigBee technology, the traditional transmission mode is improved. The experiment results show the transmission time is saved over one third and transmission efficiency is improved greatly. It realized low-cost and high-performance wireless fingerprint attendance function, which provided a new wireless fingerprint attendance system for enterprises and institutions.
{"title":"Wireless Fingerprint Attendance System Based on ZigBee Technology","authors":"Jianpo Li, Xu-ning Zhu, X. Li, Zhi-ming Zhang, Ji-sheng Sui","doi":"10.1109/IWISA.2010.5473360","DOIUrl":"https://doi.org/10.1109/IWISA.2010.5473360","url":null,"abstract":"Aiming at the disadvantages of traditional wire attendance system, a design method of wireless fingerprint attendance system based on ZigBee technology is proposed. The system includes terminal fingerprint acquisition module and attendance management module in computer. It can realize automatically such functions as information acquisition of fingerprint, processing, wireless transmission, fingerprint matching, and attendance management. Considering the fact and topology of ZigBee network, the system designs wireless local area network which is cluster tree network. To resolve the problem of time delay when the image is transmitted by ZigBee technology, the traditional transmission mode is improved. The experiment results show the transmission time is saved over one third and transmission efficiency is improved greatly. It realized low-cost and high-performance wireless fingerprint attendance function, which provided a new wireless fingerprint attendance system for enterprises and institutions.","PeriodicalId":298764,"journal":{"name":"2010 2nd International Workshop on Intelligent Systems and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}