Data explosion and higher energy consumption in flooding routing of WSN is a considerable problem. A directed flooding routing mechanism according to the sensor nodes’ hop count is presented. In this paper a distributed algorithm to calculate the node-hop is designed and a data packets forwarding criterion using node-hop is constructed. With the methods the data packets’ broadcast scale can be controlled, the data packets can be delivered more efficiently along optimized path. In the algorithm the QoS of the routing and the robustness are considered. The simulation results show that the directed flooding routing algorithm with node hops can get the energy efficiency in the WSN and keep the simplicity and reliability of the flooding routing.
{"title":"Flooding and Directed Diffusion Routing Algorithm in Wireless Sensor Networks","authors":"L. Zhao, Gaoqiang Liu, Jing Chen, Zhiwei Zhang","doi":"10.1109/HIS.2009.158","DOIUrl":"https://doi.org/10.1109/HIS.2009.158","url":null,"abstract":"Data explosion and higher energy consumption in flooding routing of WSN is a considerable problem. A directed flooding routing mechanism according to the sensor nodes’ hop count is presented. In this paper a distributed algorithm to calculate the node-hop is designed and a data packets forwarding criterion using node-hop is constructed. With the methods the data packets’ broadcast scale can be controlled, the data packets can be delivered more efficiently along optimized path. In the algorithm the QoS of the routing and the robustness are considered. The simulation results show that the directed flooding routing algorithm with node hops can get the energy efficiency in the WSN and keep the simplicity and reliability of the flooding routing.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigate the performance of various interference cancellation techniques in direct-sequence ultra-wideband (DS-UWB) communication systems. Multiple access interference (MAI) causes the performance of the conventional single user detector in DS-UWB systems to degrade. Due to high complexity of the optimum multiuser detector, suboptimal multiuser detectors with less complexity and reasonable performance have received considerable attention. A hybrid approach that employs a simulated annealing algorithm (SA) and particle swarm optimization (PSO) for the MUD problem in UWB communication systems is proposed. By taking advantage of heuristic values and the collective intelligence of SAPSO, the proposed detector offers almost the same bit error rate (BER) performance as the full-search-based optimum multiuser detector does, while greatly reducing the computational complexity. The near–far resistance of the PSOSA-based multiuser detector is also examined. The good behavior of the proposed approach is demonstrated by means of comparisons in term of bit error rate (BER) performance and implementation complexity with the classical Rake receiver and different multiuser receivers previously proposed in the literature on this subject.
{"title":"An Effective Hybrid PSOSA-Based Multi-user Detection for DS-CDMA Ultra-WideBand Communications Systems","authors":"Ho-Lung Hung, Chuan-Wang Chang, J. Wen","doi":"10.1109/HIS.2009.282","DOIUrl":"https://doi.org/10.1109/HIS.2009.282","url":null,"abstract":"In this paper, we investigate the performance of various interference cancellation techniques in direct-sequence ultra-wideband (DS-UWB) communication systems. Multiple access interference (MAI) causes the performance of the conventional single user detector in DS-UWB systems to degrade. Due to high complexity of the optimum multiuser detector, suboptimal multiuser detectors with less complexity and reasonable performance have received considerable attention. A hybrid approach that employs a simulated annealing algorithm (SA) and particle swarm optimization (PSO) for the MUD problem in UWB communication systems is proposed. By taking advantage of heuristic values and the collective intelligence of SAPSO, the proposed detector offers almost the same bit error rate (BER) performance as the full-search-based optimum multiuser detector does, while greatly reducing the computational complexity. The near–far resistance of the PSOSA-based multiuser detector is also examined. The good behavior of the proposed approach is demonstrated by means of comparisons in term of bit error rate (BER) performance and implementation complexity with the classical Rake receiver and different multiuser receivers previously proposed in the literature on this subject.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Intelligent evolutionary algorithm-probability learning based algorithm is applied to multiple constraints Qos(Quality of Service) routing problem of network. The objective function is to minimize the cost and meet multiple constraints. The procedure and the choice probability’s update strategy of PBIL algorithm are designed according to the characteristics of multiple constraints Qos routing problem. During the evolutionary process of the algorithm the constraint equation is dynamic adjusted to avoid unnecessary search and save the search time. Each invalid path is recorded as a constraint to guide the next iteration. And the probability is updated according to the solutions’ fitness. The node linkage which belongs to the excellent solution has greater probability to be chosen. The modified PBIL algorithm is tested on a network topology and some routing demands is considered. The good adaptability, validity and stability performance are fully shown by the results.
{"title":"Approach for Multiple Constraints Based Qos Routing Problem of Network","authors":"Shanshan Wan, Ying Hao, Yuan Yang","doi":"10.1109/HIS.2009.125","DOIUrl":"https://doi.org/10.1109/HIS.2009.125","url":null,"abstract":"The Intelligent evolutionary algorithm-probability learning based algorithm is applied to multiple constraints Qos(Quality of Service) routing problem of network. The objective function is to minimize the cost and meet multiple constraints. The procedure and the choice probability’s update strategy of PBIL algorithm are designed according to the characteristics of multiple constraints Qos routing problem. During the evolutionary process of the algorithm the constraint equation is dynamic adjusted to avoid unnecessary search and save the search time. Each invalid path is recorded as a constraint to guide the next iteration. And the probability is updated according to the solutions’ fitness. The node linkage which belongs to the excellent solution has greater probability to be chosen. The modified PBIL algorithm is tested on a network topology and some routing demands is considered. The good adaptability, validity and stability performance are fully shown by the results.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128707247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, Yi-Chia Lan
In this paper, we describe a two-stage hybrid approach to select gene features and produce dominant patterns for evaluating the pathological probability. To discover suitable genes as experiment samples for distinguishing the status of gene regulation, we utilized Receiver Operating Characteristic (ROC) method to eliminate non-significant genes of unapparent variation between normal tissues and tumors. Subsequently, these selected genes are clustered through an unsupervised learning algorithm to reduce overall training samples under the same condition. In addition, the resulting samples have been verified by means of experimenting with the SVM and KNN methods. The experimental results show that our approach has potentials to effectively reduce samples for microarray analysis.
{"title":"A Two-Stage Hybrid Approach for Feature Selection in Microarray Analysis","authors":"Chung-Hong Lee, Hsin-Chang Yang, Chih-Hong Wu, Yi-Chia Lan","doi":"10.1109/HIS.2009.45","DOIUrl":"https://doi.org/10.1109/HIS.2009.45","url":null,"abstract":"In this paper, we describe a two-stage hybrid approach to select gene features and produce dominant patterns for evaluating the pathological probability. To discover suitable genes as experiment samples for distinguishing the status of gene regulation, we utilized Receiver Operating Characteristic (ROC) method to eliminate non-significant genes of unapparent variation between normal tissues and tumors. Subsequently, these selected genes are clustered through an unsupervised learning algorithm to reduce overall training samples under the same condition. In addition, the resulting samples have been verified by means of experimenting with the SVM and KNN methods. The experimental results show that our approach has potentials to effectively reduce samples for microarray analysis.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road extraction is one of the most active research fields in information extraction from high-resolution remote sensing images. It is not only of great theoretical value, but also of a broad prospect. This paper describes the general approaches of Semi-Automated Road Extraction, presents the latest research work and the typical methods from all over the world and analyzes its characteristics. Finally the research fields of Semi-Automated Road Extraction studies are also recommended.
{"title":"Semi-automatic Road Extraction from High-Resolution Remote Sensing Image: Review and Prospects","authors":"Yibo Li, Lili Xu, Hui Piao","doi":"10.1109/HIS.2009.317","DOIUrl":"https://doi.org/10.1109/HIS.2009.317","url":null,"abstract":"Road extraction is one of the most active research fields in information extraction from high-resolution remote sensing images. It is not only of great theoretical value, but also of a broad prospect. This paper describes the general approaches of Semi-Automated Road Extraction, presents the latest research work and the typical methods from all over the world and analyzes its characteristics. Finally the research fields of Semi-Automated Road Extraction studies are also recommended.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128941124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ku-Yaw Chang, S. Chen, Lih-Shyang Chen, Cheng-Jung Wu
Osteoarthritis(OA) is one of the major causes of disability in the elderly population. The accurate segmentation of the articular knee cartilages from MR images is important to clinical diagnosis and treatment. In this paper, a semi-automatic segmentation method of knee cartilage based on radial transformation is proposed. A radial transformation is the process of generating a new image, called a radial image, by re-sampling the original image in a radial approach. The cartilage boundary is initially delineated on the radial image, and then transformed back to the original image. Due to the possible round-off errors and digitization effects, the cartilage boundary on the original image requires a slight deformation to become more accurate and complete. In general, the cartilage segmentation has been considered as a two- dimensional image processing challenge. However, the proposed method turns such a challenge into a one-dimensional job by incorporating the prior knowledge of cartilage anatomy into the radial transformation, and thus simplifies the segmentation problem.
{"title":"Articular Cartilage Segmentation Based on Radial Transformation","authors":"Ku-Yaw Chang, S. Chen, Lih-Shyang Chen, Cheng-Jung Wu","doi":"10.1109/HIS.2009.54","DOIUrl":"https://doi.org/10.1109/HIS.2009.54","url":null,"abstract":"Osteoarthritis(OA) is one of the major causes of disability in the elderly population. The accurate segmentation of the articular knee cartilages from MR images is important to clinical diagnosis and treatment. In this paper, a semi-automatic segmentation method of knee cartilage based on radial transformation is proposed. A radial transformation is the process of generating a new image, called a radial image, by re-sampling the original image in a radial approach. The cartilage boundary is initially delineated on the radial image, and then transformed back to the original image. Due to the possible round-off errors and digitization effects, the cartilage boundary on the original image requires a slight deformation to become more accurate and complete. In general, the cartilage segmentation has been considered as a two- dimensional image processing challenge. However, the proposed method turns such a challenge into a one-dimensional job by incorporating the prior knowledge of cartilage anatomy into the radial transformation, and thus simplifies the segmentation problem.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A lot of research literatures in end-users’ acceptance of ERP systems, give a wide range of the failure factors on impacting ERP systems, and presented a number of models, including the Technology Acceptance Model (TAM) and the Unified Technology Acceptance and Use of Theory (UTAUT) are more applied. In this paper, combining the UTAUT model and the organizational system of Chinese enterprises, we explored different system impacts to UTAUT model. And then aiming at the acceptance of ERP system of state-owned enterprises in China, we put forward some methods to improve the acceptance.
{"title":"Influence of Organizational System to End-Users' Acceptance of ERP System in Chinese Enterprises","authors":"Shuwei Huang, Xueying Wang","doi":"10.1109/HIS.2009.323","DOIUrl":"https://doi.org/10.1109/HIS.2009.323","url":null,"abstract":"A lot of research literatures in end-users’ acceptance of ERP systems, give a wide range of the failure factors on impacting ERP systems, and presented a number of models, including the Technology Acceptance Model (TAM) and the Unified Technology Acceptance and Use of Theory (UTAUT) are more applied. In this paper, combining the UTAUT model and the organizational system of Chinese enterprises, we explored different system impacts to UTAUT model. And then aiming at the acceptance of ERP system of state-owned enterprises in China, we put forward some methods to improve the acceptance.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"2 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The capacitance sensor features non-intrusive, rapid dynamic response, low cost, wide measuring range and easy mounting, so it is suitable for application in industries. The speediness and accuracy of image reconstruction algorithm in electrical capacitance tomography are essential. This paper presents a high-speed method for electrical capacitance tomography based on the Landweber iteration method. Landweber iteration method is simple and flexible with very good regularizing features. But it converges too slowly. The weakness is overcome by the high-speed iteration method, which can reduce iteration times and maintain the reconstruction quality.
{"title":"Study on Image Reconstruction Algorithm for Electrical Capacitance Tomography System","authors":"Yao Chen, Xiaowei Wang, Jiangyan","doi":"10.1109/HIS.2009.213","DOIUrl":"https://doi.org/10.1109/HIS.2009.213","url":null,"abstract":"The capacitance sensor features non-intrusive, rapid dynamic response, low cost, wide measuring range and easy mounting, so it is suitable for application in industries. The speediness and accuracy of image reconstruction algorithm in electrical capacitance tomography are essential. This paper presents a high-speed method for electrical capacitance tomography based on the Landweber iteration method. Landweber iteration method is simple and flexible with very good regularizing features. But it converges too slowly. The weakness is overcome by the high-speed iteration method, which can reduce iteration times and maintain the reconstruction quality.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During recent years, RFID technology raises many privacy and security concerns. However, most previous works provided authentication protocols by the assumption of secure channel between the reader and the database. But this assumption is not suitable for wireless environment. In 2005, Yang et al. proposed a scheme in which the channel between the reader and the database is assumed to be insecure. Unfortunately, Yang et al.’s scheme cannot achieve some critical security requirements. Due to above reason, we propose a new authentication protocol against all possible attacks and this method is secure even if the channel between the reader and the database may suffer from the attacks of interception, eavesdropping and masquerade. Additionally, the proposed scheme also supports the ownership transfer property inspired by Osaka et al.’s and Lei-Cao’s schemes.
{"title":"A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment","authors":"Chih-Hung Wang, Shan Chin","doi":"10.1109/HIS.2009.100","DOIUrl":"https://doi.org/10.1109/HIS.2009.100","url":null,"abstract":"During recent years, RFID technology raises many privacy and security concerns. However, most previous works provided authentication protocols by the assumption of secure channel between the reader and the database. But this assumption is not suitable for wireless environment. In 2005, Yang et al. proposed a scheme in which the channel between the reader and the database is assumed to be insecure. Unfortunately, Yang et al.’s scheme cannot achieve some critical security requirements. Due to above reason, we propose a new authentication protocol against all possible attacks and this method is secure even if the channel between the reader and the database may suffer from the attacks of interception, eavesdropping and masquerade. Additionally, the proposed scheme also supports the ownership transfer property inspired by Osaka et al.’s and Lei-Cao’s schemes.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"39 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Providing rich data collaboration services in conferencing system is vital to the success of SIP-based communication system. It not only presents design and implementation challenges, but also gives an opportunity to develop rich and innovative collaboration services conveniently to provide users with novel communication experience. In this paper we present an extended data collaboration mechanism for XCON conferencing system over IP network. It includes uniform media description, media negotiation and media delivery processes. The mechanism adopts the extended SDP and offer/answer model as media description and negotiation mechanism. And it uses RTP/RTCP and extended MSRP as the media transport control protocols respectively for audio/video and various TCP-based data collaboration applications. In this paper, the design principle and concrete implementation details is presented and analyzed in detail. We have developed a prototype implementation to prove our architecture’s feasibility and scalability.
{"title":"An Extended Data Collaboration Mechanism for XCON Multimedia Conference","authors":"W. Zhang, W. Lei, Hongbin Li","doi":"10.1109/HIS.2009.173","DOIUrl":"https://doi.org/10.1109/HIS.2009.173","url":null,"abstract":"Providing rich data collaboration services in conferencing system is vital to the success of SIP-based communication system. It not only presents design and implementation challenges, but also gives an opportunity to develop rich and innovative collaboration services conveniently to provide users with novel communication experience. In this paper we present an extended data collaboration mechanism for XCON conferencing system over IP network. It includes uniform media description, media negotiation and media delivery processes. The mechanism adopts the extended SDP and offer/answer model as media description and negotiation mechanism. And it uses RTP/RTCP and extended MSRP as the media transport control protocols respectively for audio/video and various TCP-based data collaboration applications. In this paper, the design principle and concrete implementation details is presented and analyzed in detail. We have developed a prototype implementation to prove our architecture’s feasibility and scalability.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}