Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)

Session: Artificial Intelligence

20 articles
Proceedings Article

Spontaneous Construction of higher order Voronoi Diagram

Hongmei Yang, Huaying Yin
The higher order Voronoi diagrams are difficult to construct because of their complicated structures. In traditional algorithm, production process was extremely complex. While spontaneous algorithm is only concerned with positions of generators, so it is effective for constructing Voronoi diagrams with...
Proceedings Article

On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM

Yongjie Pang, Guocheng Zhang, Zhonghui Hu, Yushan Sun
In order to solve the problem of on-line modeling of AUV's Maneuvering Motion, considering that the sample space expends in the parametric identification, a learning algorithm for least squares support vector machines (LS-SVM) based on sliding window is deduced. The method improves the identification...
Proceedings Article

Stochastic Simulation of River Water Quality Risk assessment under Coupling Effect of Reclaimed Water Recharge and Inner Source Release

Han Yan, Zhihong Zou
A river water quality model under a coupling effect of reclaimed water recharge and inner source release is constructed based on a one-dimensional steady river water quality model. In order to solve problems that triangular fuzzy numbers are not suitable for data sets having flat representation and no...
Proceedings Article

The Research of Image Feature Matching Method Based on CH-SURF

Zhaodi Wang, Jicai Deng
Since SURF (Speeded-Up Robust Features) algorithm is designed for gray images in feature extraction and recognition tasks, it can't recognize some objects of similar shape but different color. CH-SURF algorithm is proposed,which combines Color Histogram feature and SURF feature together. CH-SURF algorithm...
Proceedings Article

TOLERANCE-CONTROL SOLUTIONS TO INTERVAL LINEAR EQUATIONS

Li Tian, Wei Li, Qin Wang
In this paper, we discuss the solution of interval linear equations from the point of view of the vector components. Tolerance solutions, control solutions, algebraic solutions and localized solutions are defined based on the relationship of two vectors as a whole, this paper detailed considerate the...
Proceedings Article

Based on RFID and NFC technology Retail Chain Supermarket Mobile Checkout Mode Research

Fugui Ruan, Daijiang Chen
Radio Frequency Identification (RFID) is a non-contact automatic identification technology. NFC technology is an extension of RFID technology. This paper analyzes the application status of RFID and NFC technology and introduces the working principle of RFID, NFC technology and EPC system. Based on RFID...
Proceedings Article

A Data Fusion Algorithm Based on Improved LEACH Clustering Routing for Wireless Sensor Network

Zhang Shiyue, Jiande Wu, Xiaodong Wang
Energy limited of wireless sensor network limits the practical application. Therefore, in industrial applications we need to take into account introducing data fusion to reduce the data redundancy, improve performance, reduce energy consumption, and prolong the network life. This research idea: data...
Proceedings Article

Research on KAAS-based Social Knowledge Collaboration Service Mechanism and Application

Yuan Rao, Shaochuan Chen
Knowledge as a Service (KAAS), which merges the whole architecture of knowledge into service process, is proposed and defined in the paper. Based on the BNF definition of KAAS, the new knowledge service mechanism is provided to aggregate the knowledge resources together for satisfying various users’...
Proceedings Article

The design and implementation of satellite communication signal spectrum automatic monitoring System

Mingbo Liu, Zhong Wang, Jishi Chang
This article introduces the design idea and implement process of satellite communications signal Auto-Monitor System based on GPIB interface, and puts forward the system design frame centered with spectrum analyzer of “frequency spectrograph + GPIB/USB converter+ computer”, detailed introduces the implement...
Proceedings Article

Water demand forecasting based on adaptive extreme learning machine

Jinming Jia, Shengyue Hao
Predicting water consumption is of key importance for water supply management, which is also relevant in processes for reviewing prices.In this study, a hybrid method based on extreme learning machine model with the adaptive metrics of inputs is proposed for improving forecasting accuracy. The adaptive...
Proceedings Article

Study on the Method of CGF Intelligent Decision-making

Xiaoming Du, Shuchao Tian, Xuefeng Xu, Gu Ping
The intelligent decision-making method applied to the CGF behavior modeling is studied more and more. In this paper, we introduce the intelligent decision CGF definition, method, and the characteristics. It analyzes the general process of CGF intelligent decision, and constructs the CGF intelligent decision...
Proceedings Article

Stereo Image Watermarking Method for Authentication with Self-Recovery Capability

Jing Wang, Gangyi Jiang, Chen Feng, Xingbin Zeng, Xiaodong Wang, Mei Yu, Yo-Sung Ho
To address issues of content authenticity verification and integrity protection, a stereo image watermarking method based disparity is proposed. Firstly, the stereo image blocks are classified into eight types according to the smoothness of it, and the alterable-length recovery bits are generated. The...
Proceedings Article

ERWD: A Measure for Nearest-Neighbor Search in Undirected Graph

Junyin Wei, Binghui Qi, Mingxi Zhang
Finding nearest neighbors in graph plays an increasingly important role in various applications, such as graph clustering, query expansion, recommendation system, etc. To tackle this problem, we need compute the most “similar” k vertices for the given vertex. One popular class of similarity measures...
Proceedings Article

ICA and BP neural network based fingerprint recognition

Lu Zhao, Wenyong Wang
According to the recognition of fuzzy fingerprint and the ones with strong noise, proposed a new method which combining the ICA (Independent Component Algorithm) and BP (Back Propagation) neural network. First, using the FastICA method to extract fingerprint characteristics, then classify and recognize...
Proceedings Article

Interacting Multiple Gaussian Particle Filter

Yanwen Qu
Inspired by the framework of the Interacting Multiple Model (IMM), a method, called Interacting Multiple Gaussian Particle Filter (IMGPF), is proposed for solving the nonlinear Bayesian filtering problem with unknown continuous parameter. IMGPF regards the continuous parameter space as a union of disjoint...
Proceedings Article

Research and Development on Supply Chain Collaboration Management System

Yong Cen
The fierce competition pressures on supply chain management of tobacco industry enterprise increases emphasis on supply chain agility, integration, and visibility to respond rapidly and efficiently to changes in the marketplace. In this paper, we analysis the requirements and characteristics of the system,...
Proceedings Article

Convergence and Parameters Analysis of Shuffled Frog Leaping Algorithm

Lianguo Wang, Yaxing Gong
Markov chain is an effective tool for convergence analysis of intelligence optimization algorithms. This paper briefly studies the state space of the basic Shuffled Frog Leaping Algorithm (SFLA) and theoretically analyzes the convergence behavior of SFLA by using Markov chain. It is proved that the SFLA...
Proceedings Article

Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System

Huan Zhang, Shuqi Shang, Dongwei Wang, Jiasheng Wang, Ranbing Yang
A design and implementation of expert system of fault diagnosis of dry-mixed mortar based on Profibus field-bus and large-scale PLC is proposed in this paper. Firstly, the control principle and algorithm, hardware choice and integration of the control system are introduced. Secondly, by analyzing the...
Proceedings Article

Competitive Decision Algorithm for the Rooted Delay-constrained Minimum Spanning Tree

Xiaohua Xiong, Xuemin Chen, Aibing Ning
In this paper, we make research on rooted delay-constrained minimum spanning tree (RDCMST). RDCMST seeks to find a minimum spanning tree and no path from a specified root node to any other nodes may exceed a given delay bound. RDCMST is a NP-hard combinatorial optimization problem which arises both in...
Proceedings Article

AMDS: Sentence Extraction Based Proficient Framework for Multi-Document Summarization

C. Balasubramanian, K.G. Srinivasagan, S. Geetha
Rapid improvement of electronic documents in World Wide Web has made overload to the users in accessing the information. Therefore, abstracting the primary content from numerous documents related to same topic is highly essential. Summarization of multiple documents helps in valuable decision-making...