the characteristics of the nodes’ high-dynamic and long transmission delay between the satellites and terrestrial station lead to the difficulty in managing the satellite network. So this paper proposes a new dynamic-layered management architecture based on the researches of the traditional policy-based network management architecture. In the new architecture, domain policy decision point(Domain PDP) and local policy decision point(local PDP) are added between policy enforcement point(PEP) and traditional policy decision point(PDP). Domain PDP and local PDP are dynamically deployed in the sub-management stations and the satellite agents with management functions. Simulation results show that the new architecture reduces the amounts of the communication between terrestrial station and satellite agent which makes the network management efficiently.
{"title":"Research on a New Architecture of Satellite Network Management","authors":"Xiaokang Tan, Lidong Fu","doi":"10.1109/ICINIS.2010.136","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.136","url":null,"abstract":"the characteristics of the nodes’ high-dynamic and long transmission delay between the satellites and terrestrial station lead to the difficulty in managing the satellite network. So this paper proposes a new dynamic-layered management architecture based on the researches of the traditional policy-based network management architecture. In the new architecture, domain policy decision point(Domain PDP) and local policy decision point(local PDP) are added between policy enforcement point(PEP) and traditional policy decision point(PDP). Domain PDP and local PDP are dynamically deployed in the sub-management stations and the satellite agents with management functions. Simulation results show that the new architecture reduces the amounts of the communication between terrestrial station and satellite agent which makes the network management efficiently.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Face recognition has been widely researched in the classification issues. This paper proposed a new framework of face recognition based on PCA and SVM. In order to reduce the computation of SVM algorithm in the framework, MEB was introduced into the framework. Experimental results have shown that the proposed algorithm can get better results than basic PCA and PCA-SVM algorith.
{"title":"Face Recognition Based on PCA and SVM Optimized by MEB","authors":"G. Wei, Zhao Hai, Mei Zhan, Lizhong Zhang","doi":"10.1109/ICINIS.2010.40","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.40","url":null,"abstract":"Face recognition has been widely researched in the classification issues. This paper proposed a new framework of face recognition based on PCA and SVM. In order to reduce the computation of SVM algorithm in the framework, MEB was introduced into the framework. Experimental results have shown that the proposed algorithm can get better results than basic PCA and PCA-SVM algorith.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To improve the efficiency of blade repair, a reverse engineering-based geometry reconstruction method is developed for the normal model creation of a broken blade. The key techniques involved are including the digital measurement of broken blade, point cloud pre-processing, three dimensional models and so on. After the point cloud pre-processing, the segmentation extracts the damaged region from point cloud by a 4D Shepard surface based curvature estimation method. Bezier curve is used to construct the extracted boundary points. Bezier surface is reconstructed by the extracted points and is used to broken space subdivision. At last, a geometry model is built for the preparement of the laser forming repair.
{"title":"Reconstruction of Broken Blade Geometry Model Based on Reverse Engineering","authors":"Jinhua Li, Fangping Yao, Yongxian Liu, Yongguo Wu","doi":"10.1109/ICINIS.2010.16","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.16","url":null,"abstract":"To improve the efficiency of blade repair, a reverse engineering-based geometry reconstruction method is developed for the normal model creation of a broken blade. The key techniques involved are including the digital measurement of broken blade, point cloud pre-processing, three dimensional models and so on. After the point cloud pre-processing, the segmentation extracts the damaged region from point cloud by a 4D Shepard surface based curvature estimation method. Bezier curve is used to construct the extracted boundary points. Bezier surface is reconstructed by the extracted points and is used to broken space subdivision. At last, a geometry model is built for the preparement of the laser forming repair.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontology, as a representation of shared conceptualization of specific domain, is a key technology for the Semantic Web. In recent years, many ontologies have been developed and many of these ontologies contain overlapping information. To be able to use multiple ontologies we need a flexible mechanism to integrate ontologies. In this paper we present a framework for ontology integration which combines ontology similarity measures and ontology integration algorithm. After integrating, we perform pruning and checking the consistency of the integrated ontology. Further, we evaluate our approach in terms of ontology quality.
{"title":"A Framework for Ontology Integration and Evaluation","authors":"Yanhui Lv, Chong Xie","doi":"10.1109/ICINIS.2010.153","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.153","url":null,"abstract":"Ontology, as a representation of shared conceptualization of specific domain, is a key technology for the Semantic Web. In recent years, many ontologies have been developed and many of these ontologies contain overlapping information. To be able to use multiple ontologies we need a flexible mechanism to integrate ontologies. In this paper we present a framework for ontology integration which combines ontology similarity measures and ontology integration algorithm. After integrating, we perform pruning and checking the consistency of the integrated ontology. Further, we evaluate our approach in terms of ontology quality.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, unmanned substation is a new trend for electrical power system with the fast development of new science and technology. Fire detection technology is the major part of unmanned substation. How to judge the fire flame is the key of image-type fire detecting technology. In this paper, a unmanned substation in the environment of the specific process of fire detection and testing process for each step in more detail, through the differential to determine, image extraction, flame recognition three steps on the flame testing done considering. The method can greatly improve veracity of fire prediction, comparing with the traditional detection method.
{"title":"Research on the Technology of Fire Detection Based on Image Processing in Unmanned Substation","authors":"Jun-zhe Zhou, G. Song","doi":"10.1109/ICINIS.2010.131","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.131","url":null,"abstract":"Nowadays, unmanned substation is a new trend for electrical power system with the fast development of new science and technology. Fire detection technology is the major part of unmanned substation. How to judge the fire flame is the key of image-type fire detecting technology. In this paper, a unmanned substation in the environment of the specific process of fire detection and testing process for each step in more detail, through the differential to determine, image extraction, flame recognition three steps on the flame testing done considering. The method can greatly improve veracity of fire prediction, comparing with the traditional detection method.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of moving targets tracking is to determine the trajectories of moving targets, the key of which is to establish the corresponding relationships between the detected prospect targets and the tracked moving targets. The established corresponding relations are equivalent to the matching problem of target features in consecutive image frames. In the paper, Kalman filter is used as the motion model of the targets. The recursive filtering method is adopted to calculate and predict the location of moving targets. Through the experiment, the results show that the algorithm not only track well the moving targets, but also can effectively overcome the obstacles in the process of tracking and so on.
{"title":"Research of Moving Targets Tracking Algorithm Based on Kalman Filtering","authors":"H. Dong, Shengfu Chen, Jiayu Zhu","doi":"10.1109/ICINIS.2010.104","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.104","url":null,"abstract":"The purpose of moving targets tracking is to determine the trajectories of moving targets, the key of which is to establish the corresponding relationships between the detected prospect targets and the tracked moving targets. The established corresponding relations are equivalent to the matching problem of target features in consecutive image frames. In the paper, Kalman filter is used as the motion model of the targets. The recursive filtering method is adopted to calculate and predict the location of moving targets. Through the experiment, the results show that the algorithm not only track well the moving targets, but also can effectively overcome the obstacles in the process of tracking and so on.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Medical Image Retrieval and Classification is very important in Computer-Aided Diagnosis. Feature extraction is one of the most important techniques in content based image retrieval and classification. How to extract low-level features which reflect high-level semantics of an image is crucial for medical image retrieval and classification. In allusion to this issue, there proposed a method using edge density histogram to extract shape feature of medical images in this paper. Then Euclidean distance and Support Vector Machine (SVM) are used for medical image retrieval and classification. Results of experimentation showed that the proposed algorithm has been applied to medical image retrieval with promising effect.
{"title":"Medical Image Retrieval and Classification Based on Morphological Shape Feature","authors":"Liuliu Fu, Yi-fei Zhang","doi":"10.1109/ICINIS.2010.86","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.86","url":null,"abstract":"Medical Image Retrieval and Classification is very important in Computer-Aided Diagnosis. Feature extraction is one of the most important techniques in content based image retrieval and classification. How to extract low-level features which reflect high-level semantics of an image is crucial for medical image retrieval and classification. In allusion to this issue, there proposed a method using edge density histogram to extract shape feature of medical images in this paper. Then Euclidean distance and Support Vector Machine (SVM) are used for medical image retrieval and classification. Results of experimentation showed that the proposed algorithm has been applied to medical image retrieval with promising effect.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is evident that the 3G(3rd-generation) and B3G(Beyond Third Generation in mobile communication system) communication systems need higher wireless capacity. Multi-user detection(MUD) technique is one of the key techniques in Code Division Multiple-Access(CDMA) system. This technique can reduce the multiple access interference (MAI) and inter symbol interference (ISI) by using the structured information at the receiving end in the CDMA system, and it can also realize the information demodulation while there exist multi-user signals. This paper presents a new Multi-user detection technique, that is simulated annealing-genetic algorithm. This proposed algorithm applies simulated annealing (SA) to genetic algorithm (GA). First, the initial group is given, then the genetic algorithm is used to make the search gradually convergent to the feasible globally optimal solution or sub-optimal solution, then the simulated annealing is used to do the local optimization. Simulations show that the proposed multi-user detector is close to the optimal one and better than the conventional one in the performance of anti-MAI and anti-ISI.
{"title":"Simulated Annealing-Genetic Algorithm and Its Application in CDMA Multi-user Detection","authors":"Yue Zhou, Hong Wang, Yingzi Wei, Jing Wang","doi":"10.1109/ICINIS.2010.160","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.160","url":null,"abstract":"It is evident that the 3G(3rd-generation) and B3G(Beyond Third Generation in mobile communication system) communication systems need higher wireless capacity. Multi-user detection(MUD) technique is one of the key techniques in Code Division Multiple-Access(CDMA) system. This technique can reduce the multiple access interference (MAI) and inter symbol interference (ISI) by using the structured information at the receiving end in the CDMA system, and it can also realize the information demodulation while there exist multi-user signals. This paper presents a new Multi-user detection technique, that is simulated annealing-genetic algorithm. This proposed algorithm applies simulated annealing (SA) to genetic algorithm (GA). First, the initial group is given, then the genetic algorithm is used to make the search gradually convergent to the feasible globally optimal solution or sub-optimal solution, then the simulated annealing is used to do the local optimization. Simulations show that the proposed multi-user detector is close to the optimal one and better than the conventional one in the performance of anti-MAI and anti-ISI.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In product configuration of mass customization, sometimes it’s necessary to modify some dimensions of product modules, how to ravel the affection relation of modules’ dimension is the key of precision and efficiency of product configuration. In order to research parameter transfer path and build the parameter transfer method, variant parameters is classified and parameter association relations between parts are analyzed based on assembly connection in product. Parameter constraint relations also presented for variant design. Finally, parameter transfer model is put forward.
{"title":"Research on Dimension Parameter and Constraint Relations of Variant Product Based on Assembly Connection","authors":"Weiping Shao, Y. Hao, Pengfei Zeng, Chunyan Wang","doi":"10.1109/ICINIS.2010.34","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.34","url":null,"abstract":"In product configuration of mass customization, sometimes it’s necessary to modify some dimensions of product modules, how to ravel the affection relation of modules’ dimension is the key of precision and efficiency of product configuration. In order to research parameter transfer path and build the parameter transfer method, variant parameters is classified and parameter association relations between parts are analyzed based on assembly connection in product. Parameter constraint relations also presented for variant design. Finally, parameter transfer model is put forward.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127524308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the analytical structure of a typical fuzzy controller with sum-product operators, gravity of center defuzzifier and single point output, the default of trapezoid membership function is analyzed in detail, and then a new kind of membership function called general linear membership function (abbr. GLMF) is designed in the paper. GLMF includes characters of triangle and trapezoid shaped membership function which are widely used in practical application. With the derivation of analytical structure of fuzzy controller with GLMF, It is proved that the fuzzy controller is the sum of a global two-dimensional multilevel relay and a local nonlinear PI or PD controller with nonlinear gain. Finally, a typical single inverted pendulum system is used in simulation to manifest the effectiveness of the design.
{"title":"Design and Analysis of a Typical Fuzzy Controller with General Linear Membership Function","authors":"Weihua Huang, Kang-ling Fang, Zheng Zhang","doi":"10.1109/ICINIS.2010.121","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.121","url":null,"abstract":"Based on the analytical structure of a typical fuzzy controller with sum-product operators, gravity of center defuzzifier and single point output, the default of trapezoid membership function is analyzed in detail, and then a new kind of membership function called general linear membership function (abbr. GLMF) is designed in the paper. GLMF includes characters of triangle and trapezoid shaped membership function which are widely used in practical application. With the derivation of analytical structure of fuzzy controller with GLMF, It is proved that the fuzzy controller is the sum of a global two-dimensional multilevel relay and a local nonlinear PI or PD controller with nonlinear gain. Finally, a typical single inverted pendulum system is used in simulation to manifest the effectiveness of the design.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}