This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm complexity within polynomial complexity.
{"title":"A Novel Data Purification Algorithm Based on Outlier Mining","authors":"Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao","doi":"10.1109/HIS.2009.231","DOIUrl":"https://doi.org/10.1109/HIS.2009.231","url":null,"abstract":"This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm complexity within polynomial complexity.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The combustion in circulated fluidized-bed (CFB) boiler is a complex and multi-variables coupling process. It is too difficult to build an exact mathematic model to describe the process. The main stream pressure control is an important subsystem of burning system, and it is difficult for the norm PID algorithm to control it. According to these, the human-simulated intelligent control technique is applied to the main steam pressure. It compensates the disadvantages of traditional control method and had perfect advantages in economy and in reality. The control rules of the controller can be modified, compensated and perfect in the practical operation. The practice shows that this controller has strong self-adaptability.
{"title":"The Application of Intelligent Control to Combustion Control System of CFB Boiler","authors":"Qingjin Meng, B. Xing, Hongliang Yu, Jingjian Wu","doi":"10.1109/HIS.2009.145","DOIUrl":"https://doi.org/10.1109/HIS.2009.145","url":null,"abstract":"The combustion in circulated fluidized-bed (CFB) boiler is a complex and multi-variables coupling process. It is too difficult to build an exact mathematic model to describe the process. The main stream pressure control is an important subsystem of burning system, and it is difficult for the norm PID algorithm to control it. According to these, the human-simulated intelligent control technique is applied to the main steam pressure. It compensates the disadvantages of traditional control method and had perfect advantages in economy and in reality. The control rules of the controller can be modified, compensated and perfect in the practical operation. The practice shows that this controller has strong self-adaptability.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we use four types of restricted rotations for tree transformation proposed by Wu et al [13] and develop their algorithm to transform weight sequences between any two binary trees. Converting a source tree to a destination tree, it is not necessary to rotate each pair of corresponding nodes whose weights are the same. From the proposed algorithm, we can also obtain an upper bound of n - 1 between any two binary trees.
{"title":"A Developed Restricted Rotation for Binary Trees Transformation","authors":"Ro-Yu Wu, Jou-Ming Chang, Chir-Ho Chang","doi":"10.1109/HIS.2009.23","DOIUrl":"https://doi.org/10.1109/HIS.2009.23","url":null,"abstract":"In this paper, we use four types of restricted rotations for tree transformation proposed by Wu et al [13] and develop their algorithm to transform weight sequences between any two binary trees. Converting a source tree to a destination tree, it is not necessary to rotate each pair of corresponding nodes whose weights are the same. From the proposed algorithm, we can also obtain an upper bound of n - 1 between any two binary trees.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the Least Significant Bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable and robust to attacks; it can improve the performance of image watermarking.
{"title":"LSB Algorithm Research Based on Chaos","authors":"Guang-ming Yang, Yang Zhou","doi":"10.1109/HIS.2009.201","DOIUrl":"https://doi.org/10.1109/HIS.2009.201","url":null,"abstract":"In this paper, we have researched the conceptions and methods of the image compression and chaotic, then improved the information hiding algorithm based on the Least Significant Bits (LSB). Embedding the compressed watermarking image in the host image with chaotic method, this can enhance the robustness and security of the LSB algorithm. The experiment results demonstrate that the algorithm is stable and robust to attacks; it can improve the performance of image watermarking.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li
An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper. The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure. The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc.
{"title":"Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link","authors":"Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li","doi":"10.1109/HIS.2009.157","DOIUrl":"https://doi.org/10.1109/HIS.2009.157","url":null,"abstract":"An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper. The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure. The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Considering the high requirement of the ability to process data, BF561 is chosen as hardware platform, which is the new microprocessor especially designed for multimedia application, so are the embedded operation system uClinux whose kernel can be configured freely and the PJSIP stack to develop the endpoint. The video telephone endpoint is achieved which integrates software and hardware, transmit data through networks, has lower power consumption. By means of online test, this endpoint works smoothly.
{"title":"Software Design of Embedded VideoTelephone Based on PJSIP Stack","authors":"Lifeng Wei, Qinghui Wang, Hongwei Ren","doi":"10.1109/HIS.2009.261","DOIUrl":"https://doi.org/10.1109/HIS.2009.261","url":null,"abstract":"Considering the high requirement of the ability to process data, BF561 is chosen as hardware platform, which is the new microprocessor especially designed for multimedia application, so are the embedded operation system uClinux whose kernel can be configured freely and the PJSIP stack to develop the endpoint. The video telephone endpoint is achieved which integrates software and hardware, transmit data through networks, has lower power consumption. By means of online test, this endpoint works smoothly.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay. Aimed at the privacy preservation of searching content in P2P network, especially the network without searching server, a concealment searching model based on one-way function and Soundex algorithm is proposed. It can protect searching content of peers and resist attacks of snooping, replay, disguise and so on, meanwhile the model support accurate search and fuzzy search. According to the analysis, this concealment searching model achieves relatively high security as well as searching effectively.
{"title":"An Efficient Concealment Searching Model in P2P Network","authors":"Hongfeng Zhu, Tianhua Liu, Zhenhua Tan","doi":"10.1109/HIS.2009.194","DOIUrl":"https://doi.org/10.1109/HIS.2009.194","url":null,"abstract":"Abstract With the development of application of the peer-to-peer networks, the problem of the privacy preservation has aroused extensive concern. Though many previous researches have focused on the realization of the anonymous communications, these anonymous technologies usually need complex structures which increase the cost of maintenance and the difficulty of management, and prolong the transmission delay. Aimed at the privacy preservation of searching content in P2P network, especially the network without searching server, a concealment searching model based on one-way function and Soundex algorithm is proposed. It can protect searching content of peers and resist attacks of snooping, replay, disguise and so on, meanwhile the model support accurate search and fuzzy search. According to the analysis, this concealment searching model achieves relatively high security as well as searching effectively.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent years have witnessed the wide recognition of the importance of ontology and rule in the AI research. In this paper, we report our implementation and evaluation of a rule-based approach to querying regular EL+, a restriction of a well known description logics based ontology language EL+, by only allowing regular role axioms. It is known that, without such a restriction, query answering in EL+ in general is undividable. In our approach, a regular EL+ ontology is first translated into a logic program which contains a set of rules, and then by forward chaining reasoning the pseudo model of the above logic program is calculated. Query answering for EL+ is rewritten to instance checking in the pseudo model of a logic program. To the best of our knowledge, this is the first report of implementation and evaluation for regular EL+ ontologism.
{"title":"Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies","authors":"Yuting Zhao, Jeff Z. Pan, Y. Ren","doi":"10.1109/HIS.2009.314","DOIUrl":"https://doi.org/10.1109/HIS.2009.314","url":null,"abstract":"Recent years have witnessed the wide recognition of the importance of ontology and rule in the AI research. In this paper, we report our implementation and evaluation of a rule-based approach to querying regular EL+, a restriction of a well known description logics based ontology language EL+, by only allowing regular role axioms. It is known that, without such a restriction, query answering in EL+ in general is undividable. In our approach, a regular EL+ ontology is first translated into a logic program which contains a set of rules, and then by forward chaining reasoning the pseudo model of the above logic program is calculated. Query answering for EL+ is rewritten to instance checking in the pseudo model of a logic program. To the best of our knowledge, this is the first report of implementation and evaluation for regular EL+ ontologism.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using OCT raw data. This approach made use of the signal characteristic of OCT scan line, integrated with support vector machine (SVM), hidden markov model (HMM) and circle fitting technologies to measure the thickness of the nacreous layer of seawater pearls. The experimental results show this approach is accurate and adaptable.
{"title":"Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography","authors":"Chengkun Xue, Yankui Sun, Daoshun Wang, Peng Li","doi":"10.1109/HIS.2009.72","DOIUrl":"https://doi.org/10.1109/HIS.2009.72","url":null,"abstract":"The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using OCT raw data. This approach made use of the signal characteristic of OCT scan line, integrated with support vector machine (SVM), hidden markov model (HMM) and circle fitting technologies to measure the thickness of the nacreous layer of seawater pearls. The experimental results show this approach is accurate and adaptable.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"89 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image integrity. For achieving these purposes, we first utilize the concept of self-reference to preserve the significant information of a protected image. Then we embed the information into the protected image using the technique of wet paper coding. According to experimental results, the new scheme is highly sensitive to detect and locate the tampered area. In particular, the results show that the quality of recovery image is satisfactory.
{"title":"A Self-Reference Watermarking Scheme Based on Wet Paper Coding","authors":"Chinchen Chang, Pei-Yu Lin, Jung-San Lee","doi":"10.1109/HIS.2009.52","DOIUrl":"https://doi.org/10.1109/HIS.2009.52","url":null,"abstract":"Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image integrity. For achieving these purposes, we first utilize the concept of self-reference to preserve the significant information of a protected image. Then we embed the information into the protected image using the technique of wet paper coding. According to experimental results, the new scheme is highly sensitive to detect and locate the tampered area. In particular, the results show that the quality of recovery image is satisfactory.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}