An approximate solution of dark soliton on a parabolic background has been given. The parabolic beam can self-similarly evolve through the nonlinear barrier. The fundamental dark soliton strips can propagate stably, but the 2-order dark soliton strips divide into a pair of gray solitons along the propagate distance. In addition, the interaction of two parallel and cross dark soliton are considered.
{"title":"Propagate Properties of (2+1)-D Spatial Dark-soliton Strips on a Parabolic Background","authors":"Liao Shuqing","doi":"10.1109/GCIS.2012.29","DOIUrl":"https://doi.org/10.1109/GCIS.2012.29","url":null,"abstract":"An approximate solution of dark soliton on a parabolic background has been given. The parabolic beam can self-similarly evolve through the nonlinear barrier. The fundamental dark soliton strips can propagate stably, but the 2-order dark soliton strips divide into a pair of gray solitons along the propagate distance. In addition, the interaction of two parallel and cross dark soliton are considered.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software faults are the underlying and important roots which result in the mistake, failure and even breakdown of system. So software Fault Diagnosis and the Spectrum-based Fault Localization (SFL) is very significant to software quality assurance. The current fault diagnosis technique based on the artificial intelligence and Multi-Agent attracts more and more attention. Multi-Agent System (MAS) have autonomy, intelligence and social ability, which is well-suited for Fault Diagnosis, and which can easily be used in software testing schemes of software intensive equipment. This paper gives a Fault Diagnosis system based on MAS and the proposed system is applied to real software Fault Diagnosis to validate its effectiveness.
{"title":"Software Fault Diagnosing System Based on Multi-agent","authors":"Guoshun Chen, Gefang Wang","doi":"10.1109/GCIS.2012.41","DOIUrl":"https://doi.org/10.1109/GCIS.2012.41","url":null,"abstract":"Software faults are the underlying and important roots which result in the mistake, failure and even breakdown of system. So software Fault Diagnosis and the Spectrum-based Fault Localization (SFL) is very significant to software quality assurance. The current fault diagnosis technique based on the artificial intelligence and Multi-Agent attracts more and more attention. Multi-Agent System (MAS) have autonomy, intelligence and social ability, which is well-suited for Fault Diagnosis, and which can easily be used in software testing schemes of software intensive equipment. This paper gives a Fault Diagnosis system based on MAS and the proposed system is applied to real software Fault Diagnosis to validate its effectiveness.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A network specific information search system based on mobile agent and optimal search theory is presented. The mobility of agents is exploited to solve the multi-site search problem, and an optimal allocation schema of search resources is designed to improve the system's performance. The simulation results show that the new system can improve the probability of finding the specific information and reduce the search time than the average strategy. The computer simulation verifies the validity of the proposed algorithm.
{"title":"A Network Specific Information Search System Based on Mobile Agent","authors":"Chu Yan-jie, Wei Qiang","doi":"10.1109/GCIS.2012.15","DOIUrl":"https://doi.org/10.1109/GCIS.2012.15","url":null,"abstract":"A network specific information search system based on mobile agent and optimal search theory is presented. The mobility of agents is exploited to solve the multi-site search problem, and an optimal allocation schema of search resources is designed to improve the system's performance. The simulation results show that the new system can improve the probability of finding the specific information and reduce the search time than the average strategy. The computer simulation verifies the validity of the proposed algorithm.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132240933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a study aiming to achieve both speed and accuracy of feature based multi-spectral image registration process was carried out. Then a new homogenized feature based image registration method was proposed. The method first use DOH operator to detect features, then a circular filter window is used to adaptively select features based on the spatial distribution and intensity while keeping the features' rotation invariance. The selected features are further described and matched. Experiments show that the selected features are more robust and more uniformly distributed and the method has great advantages in both speed and accuracy.
{"title":"A New Homogenized Feature Based Multi-spectral Image Registration Method","authors":"Chenyang Wu, H. Niu, W. Liang","doi":"10.1109/GCIS.2012.76","DOIUrl":"https://doi.org/10.1109/GCIS.2012.76","url":null,"abstract":"In this paper, a study aiming to achieve both speed and accuracy of feature based multi-spectral image registration process was carried out. Then a new homogenized feature based image registration method was proposed. The method first use DOH operator to detect features, then a circular filter window is used to adaptively select features based on the spatial distribution and intensity while keeping the features' rotation invariance. The selected features are further described and matched. Experiments show that the selected features are more robust and more uniformly distributed and the method has great advantages in both speed and accuracy.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134133268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Tian, Qinghong Zhang, Guojian Cheng, Xuanchao Liu
The parameter calculation relating to petroleum reservoir characterization and lithologic identification based on RBF neural networks is studied in this paper. Two models for reservoir permeability prediction and litho logic identification have been constructed and are applied to predict the unknown samples. The prediction result of reservoir permeability has a higher consistency with the practical cases. The parameter prediction and litho logic identification precision have been greatly improved compared to the traditional BP neural networks. The results show that the RBF neural network is very promising for the application of petroleum reservoir characterization.
{"title":"An Application of RBF Neural Networks for Petroleum Reservoir Characterization","authors":"Y. Tian, Qinghong Zhang, Guojian Cheng, Xuanchao Liu","doi":"10.1109/GCIS.2012.75","DOIUrl":"https://doi.org/10.1109/GCIS.2012.75","url":null,"abstract":"The parameter calculation relating to petroleum reservoir characterization and lithologic identification based on RBF neural networks is studied in this paper. Two models for reservoir permeability prediction and litho logic identification have been constructed and are applied to predict the unknown samples. The prediction result of reservoir permeability has a higher consistency with the practical cases. The parameter prediction and litho logic identification precision have been greatly improved compared to the traditional BP neural networks. The results show that the RBF neural network is very promising for the application of petroleum reservoir characterization.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Huisong, L. Zhiying, Jiang Shuming, Zhang Yuanyuan
Rough Set Theory was used for data mining based on the characteristic database and can form a knowledge database for hailstone recognition to establish a single model for hailstone forecast. Thus the comprehensive hailstone forecasting model was formed. Firstly the rules discovered from Apriori algorithm were used to eliminate the interference, Secondly the integrated knowledge database was formed by the combination of the rules obtained from the Rough Set Theory and the FP-tree algorithm for the comprehensive forecast. Certainty factor model was adopted to solve the rule conflict which occurred as the number of the rule increased. The experimental results show that the comprehensive forecast model improved the accuracy of hailstone recognition and good results were achieved in practical operation.
{"title":"Research of the Comprehensive Forecast of Hailstone","authors":"Wang Huisong, L. Zhiying, Jiang Shuming, Zhang Yuanyuan","doi":"10.1109/GCIS.2012.67","DOIUrl":"https://doi.org/10.1109/GCIS.2012.67","url":null,"abstract":"Rough Set Theory was used for data mining based on the characteristic database and can form a knowledge database for hailstone recognition to establish a single model for hailstone forecast. Thus the comprehensive hailstone forecasting model was formed. Firstly the rules discovered from Apriori algorithm were used to eliminate the interference, Secondly the integrated knowledge database was formed by the combination of the rules obtained from the Rough Set Theory and the FP-tree algorithm for the comprehensive forecast. Certainty factor model was adopted to solve the rule conflict which occurred as the number of the rule increased. The experimental results show that the comprehensive forecast model improved the accuracy of hailstone recognition and good results were achieved in practical operation.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116691570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With analysis and research for of the serial formation of swarms robots movement, the strategy of keeping swarms robots formation in the process of schlepping and turning was proposed based on the discussion of the robot kinematic model. In the condition of the wireless communication the master-slave robots can control their speed based on environmental information in order to keep the spacing between robots as well as the configuration of the serial formation in the process of turning. Finally, the simulation of Matlab for the serial formation verifies that the formation configuration keep unchanged, which also verifies the validity of the method.
{"title":"Research on Formation Handling of Serial Swarm Robots","authors":"Jianhua Wu, M. Qi","doi":"10.1109/GCIS.2012.37","DOIUrl":"https://doi.org/10.1109/GCIS.2012.37","url":null,"abstract":"With analysis and research for of the serial formation of swarms robots movement, the strategy of keeping swarms robots formation in the process of schlepping and turning was proposed based on the discussion of the robot kinematic model. In the condition of the wireless communication the master-slave robots can control their speed based on environmental information in order to keep the spacing between robots as well as the configuration of the serial formation in the process of turning. Finally, the simulation of Matlab for the serial formation verifies that the formation configuration keep unchanged, which also verifies the validity of the method.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The pattern of blood veins is unique, even in identical twins. The human palms have a broad and complicated vascular pattern and thus contain many kinds of features. The Vein Based Biometric (VBB) depends on measurement of the vascular pattern made by the blood vessels on the back of the hand. The VBB technology is the world's leading and most promising biometric technology and can bring security and convenience to people in many areas. This paper firstly reviews the concepts and types of biometrics, then discusses VBB and vein image processing. According to the study of existing algorithms and techniques, a hand vein image segmentation and refinement algorithm is introduced in this section, a normalized image of the hand veins is processed by the Gaussian filtering and median filtering, in order to remove certain amount of speckle noise. By using local dynamic threshold segmentation NiBlack algorithm, a coarse vein image is produced. An image of veins lines with smaller distortion is obtained by refinement algorithm. It is also show some experimental results of VBB. The last section of this paper is about some new developments of biometrics.
{"title":"A Vein Based Biometric Experiment and Some New Developments","authors":"Wenhai Wu, Feiyuan Lu, Guojian Cheng, C. shi","doi":"10.1109/GCIS.2012.74","DOIUrl":"https://doi.org/10.1109/GCIS.2012.74","url":null,"abstract":"The pattern of blood veins is unique, even in identical twins. The human palms have a broad and complicated vascular pattern and thus contain many kinds of features. The Vein Based Biometric (VBB) depends on measurement of the vascular pattern made by the blood vessels on the back of the hand. The VBB technology is the world's leading and most promising biometric technology and can bring security and convenience to people in many areas. This paper firstly reviews the concepts and types of biometrics, then discusses VBB and vein image processing. According to the study of existing algorithms and techniques, a hand vein image segmentation and refinement algorithm is introduced in this section, a normalized image of the hand veins is processed by the Gaussian filtering and median filtering, in order to remove certain amount of speckle noise. By using local dynamic threshold segmentation NiBlack algorithm, a coarse vein image is produced. An image of veins lines with smaller distortion is obtained by refinement algorithm. It is also show some experimental results of VBB. The last section of this paper is about some new developments of biometrics.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the bi-modulation mechanism in body, we present reinforcement and suppress intelligent controller (RSIC), and design its control algorithm in this paper. Corresponding to the relative physiological system, we design the structure of RSIC, which includes super management unit (SMU), reinforcement control unit (RCU), suppress control unit (SCU), and assistant control unit (ACU). When set point changes or great error appears, the RCU first takes an effect. And the RCU will output a high or low limit value with a bionic filter, which can accelerate the rise time of control system. After a set time, the SCU will be enabled and output a reverse output compare to output of RCU with another bionic filter, which may reduce or avoid the overshoot or vibration. The final comprehensive effect of RCU and SCU is the coming control stable output. When the control system gets a stable status, the ACU will work with the conventional PI law to improve the control accuracy. SMU can make RCU, SCU, and ACU cooperate with each other. The simulation results indicate that RSIC has better control performance than conventional PID control algorithm.
{"title":"The Design and Application for a Bio-inspired Nonlinear Intelligent Controller","authors":"Liu Bao, L. Fei, Wang Junhong","doi":"10.1109/GCIS.2012.80","DOIUrl":"https://doi.org/10.1109/GCIS.2012.80","url":null,"abstract":"Based on the bi-modulation mechanism in body, we present reinforcement and suppress intelligent controller (RSIC), and design its control algorithm in this paper. Corresponding to the relative physiological system, we design the structure of RSIC, which includes super management unit (SMU), reinforcement control unit (RCU), suppress control unit (SCU), and assistant control unit (ACU). When set point changes or great error appears, the RCU first takes an effect. And the RCU will output a high or low limit value with a bionic filter, which can accelerate the rise time of control system. After a set time, the SCU will be enabled and output a reverse output compare to output of RCU with another bionic filter, which may reduce or avoid the overshoot or vibration. The final comprehensive effect of RCU and SCU is the coming control stable output. When the control system gets a stable status, the ACU will work with the conventional PI law to improve the control accuracy. SMU can make RCU, SCU, and ACU cooperate with each other. The simulation results indicate that RSIC has better control performance than conventional PID control algorithm.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The architecture of two tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing and processing data, has aroused researchers' attention because of the benefits of power and storage saving. In a sensor network, multiple sensor data streams are correlated. Correlation tracking can describe the key trends and reduce the complexity of further data processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper we propose a method to guarantee both the utility and privacy of data on storage nodes through correlation tracking. To preserve privacy, we add random noise on original data. To preserve utility, the additive noise is distributed along the direction of sensor data. We provide both a mathematical and experimental evaluation on real dataset to validate the effectiveness of our algorithm.
{"title":"Privacy Preservation in a Two-Tiered Sensor Network through Correlation Tracking","authors":"Songtao Ye, Junfei Liu, Jin Zhang","doi":"10.1109/GCIS.2012.108","DOIUrl":"https://doi.org/10.1109/GCIS.2012.108","url":null,"abstract":"The architecture of two tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing and processing data, has aroused researchers' attention because of the benefits of power and storage saving. In a sensor network, multiple sensor data streams are correlated. Correlation tracking can describe the key trends and reduce the complexity of further data processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper we propose a method to guarantee both the utility and privacy of data on storage nodes through correlation tracking. To preserve privacy, we add random noise on original data. To preserve utility, the additive noise is distributed along the direction of sensor data. We provide both a mathematical and experimental evaluation on real dataset to validate the effectiveness of our algorithm.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}