Loading [MathJax]/extensions/MathZoom.js
2009 Third International Symposium on Intelligent Information Technology Application | Early Access | IEEE Xplore

2009 Third International Symposium on Intelligent Information Technology Application

Volume 3 • Nov.-2009

Select a Month

[Front cover - Vol 3]

Publication Year: 2009,Page(s):C1 - C1

[Title Page i - Volume 3]

Publication Year: 2009,Page(s):i - i

[Title page iii - Volume 3]

Publication Year: 2009,Page(s):iii - iii

[Copyright notice - Volume 3]

Publication Year: 2009,Page(s):iv - iv

Table of contents - Volume 3

Publication Year: 2009,Page(s):v - xvi

IITA 2009 Reviewers - Volume 3

Publication Year: 2009,Page(s):xix - xix
With the rapid development of RFID technology in logistics industry, the integration of RFID and business process becomes an important factor for RFID projects. In this paper, we study the issues of RFID application in third-party logistics and propose a component-based solution by integrating OSGi (Open Service Gateway initiatives) and jBPM (Java Business Process Management) technology. The paper...Show More
The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mecha...Show More
A new method of optimized path planning about smart card based on Dijkstra algorithm is proposed in this paper, for the path planning problem of China road charges. The IC Card Key Infrastructure and CRC check code technology of city uni-card system are combined in the algorithm, and the division with the shortest path using the minimum rate of fees is formed based on the recursive optimized and i...Show More
For video transmission over wireless or highly congested networks, video transcoding is typically used to reduce the rate and change the format of the originally encoded video source to match network conditions and terminal capabilities. Error resilient video transcoding can insert error resilient tools in the compressed video to enhance error resilience of the video over wireless channels by incr...Show More
Aiming at the problem of higher false positive and missing report rate in network intrusion detection, an intrusion detection method based on clustering algorithm is proposed in this paper. This method applies Fuzzy C-means clustering Algorithm to the detection of network intrusion. Through the building of intrusion detection model, carries out fuzzy partition and the clustering of data, and this ...Show More
Rough set theory has been successfully applied to many areas including machine learning pattern recognition decision analysis process control, knowledge discovery from databases. An algorithm in finding minimal reduction based on prepositional satisfiability (abbreviated as SAT) algorithm is proposed. A branch and bound algorithm is presented to solve the proposed SAT problem. The experimental res...Show More
The novel translational meshing motor (TMM) has inherent torque ripple because TMM torque is highly nonlinear relationship between rotor position and phase current. The torque ripple of TMM drive system can cause undesirable acoustic noise and vibration. In this paper, a novel controller scheme for TMM is presented. The controller is based on an adaptive neuro-fuzzy inference system (ANFIS) and co...Show More
The paper propose a new non-linear dimensionality reduction algorithm based on locally linear embedding called supervised locally linear embedding in tensor space (SLLE/T), in which the local manifold structure within same class are preserved and the separability between different classes is enforced by maximizing distance of each point with its neighbors. To keep structure of data, we introduce t...Show More
Cluster analysis based on Delaunay diagrams has been widely researched in all kinds of fields. In this article, a new method is proposed to treat with datasets of non-spherical and multi-density clustering. As well as, the problem of noise data is solved by defining the conceptions of In_Points and Out_Points in this method. The above points was illustrated by two simulation experiments.Show More
The energy constraint bottleneck in the wireless sensor networks (WSN) exist objectively. To reduce energy consumption and ensure the Quality of Service (QoS) in data transmission, a method of solving the QoS multicast routing in WSN by quantum particle swarm optimization algorithm (QPSO). The algorithm is based on PSO, quantum-bit, principle of superposition and quantum gates. By the premise of a...Show More
This paper aims to develop a standard system framework for RFID application in logistics according to the existing application context within the industry. Following the mainstream standard development procedure, it begins with analysis of current RFID standard system for both home and abroad. After integrating it with RFID technology and existing domestic application status, it puts forward a sta...Show More
In order to monitor the production condition exactly and real-timely in underground and surface of coal mine, a new mobile application solutions scheme based on TD-SCDMA in coal mine is proposed. According to the high speed data service of third generation mobile communication systems, the wireless network of surface scheme was designed by the C/S structure, which can provide mobile communication ...Show More
In order to decrease the harmonics and improve the power factors in power system, a detecting algorithm of harmonics and reactive currents based on neural networks and adaptive noise canceling technology is proposed. The structure of neural network and the adaptive weights adjusting algorithm are presented. The contradiction of the detecting speed and the precision has been settled preferably. The...Show More
Visual information system contains a large number of non-alphanumeric information, which is radical departure from the largely text-based example of conventional information systems. For the effective work of information systems, data retrieval and management mechanisms play a key role, as well as a key requirement, such a system is able to search and find information on the efficiency of the appr...Show More
A Method, to locate eye in image by using gray projection, is presented. We utilize the gray differential projection cure of the facial image to locate eye vertically position and utilize the gray integral projection cure to locate eye horizontal position. The method can apply to not only the upright front side face, but also the upright side face, lift up face and low face. When the face in image...Show More
A new clustering algorithm is proposed based on particle swarm optimization (PSO). The main idea of the new algorithm is to solve clustering problem using the fast search ability of the particle swarm optimization, each particle is composed of a cluster center vector, and represents a possible solution of the clustering problem. To escape from local optimum, a new idea is proposed, that is the nei...Show More
In unsupervised learning paradigm, we are not given class labels, which features should we keep? Unsupervised feature selection method well solves this problem and has got a good effect in features selection with unlabeled data. Laplacian Score (LS) is a newly proposed unsupervised feature selection algorithm. However it uses k-means clustering method to select the top k features, therefore, the d...Show More