Recent Advances in Computer Science and Information Engineering (eBook)
XXX, 786 Seiten
Springer Berlin (Verlag)
978-3-642-25781-0 (ISBN)
CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice, in Los Angeles, USA for the first and in Changchun, China for the second time, each of which attracted a large number of researchers from all over the world. The congress turns out to develop a spirit of cooperation that leads to new friendship for addressing a wide variety of ongoing problems in this vibrant area of technology and fostering more collaboration over the world.
The congress, CSIE 2011, received 2483 full paper and abstract submissions from 27 countries and regions over the world. Through a rigorous peer review process, all submissions were refereed based on their quality of content, level of innovation, significance, originality and legibility. 688 papers have been accepted for the international congress proceedings ultimately.
Title 1
Preface 4
Contents 18
Data Mining and Data Engineering Track 18
Statistical Foundations for Data Mining 18
A Novel RS-Based Key Frame Extraction Algorithmfor Video Mining in Compressed-Domain 28
Introduction 28
Relative Rough Sets Theory in This Paper 29
Concepts of Rough Sets in Data Analysis 29
Attributes Reduction in Rough Sets 30
The Proposed Algorithm in Compressed Domain 30
Extract DCT Coefficients 30
Extract DC Coefficients 31
Construct Information System 31
Reduce Information System 31
Results and Discussions 32
Conclusions 33
References 33
A Study on Small Scale Fading Model of AeronauticalRelay Channel 34
Introduction 34
Physical Model of Aeronautical Relay Channel 34
Reference Derivation of Aeronautical Relay Channel Model 35
Analysis of T2R Channel Model 35
Analysis of R2R Channel Model 35
Analysis of Overall Channel Model 36
Statistical Characteristics Analysis and Simulationof Aeronautical Relay Channel 38
Conclusions 39
References 39
An Investigation of the Performanceof Informative Samples Preservation Methods 40
Introduction 40
Algorithms 41
Experimental Results 44
Conclusion 45
References 45
Analysis of Spatial Intensity Correlation’s Effecton Registration Measures 46
Introduction 46
Registration Measures 46
Analysis of Registration Measures Curve 49
Conclusion 52
References 53
Application of Data Mining in Analysis of Electrovalence 54
Introduction 54
Fundamental 54
Objective and Methods of Data Mining 55
Association 55
Classification and Prediction 56
Clustering 56
Application of Data Mining 56
Business Understanding 57
Data Understanding 57
Data Preparation 57
Modeling 58
Evaluation 61
Deployment 61
Conclusion 62
References 62
Application of Data Mining in Power Customer Satisfaction Evaluation 63
Introduction 63
Basic Principle 64
Clustering 64
Principal Component Analysis 64
Application of Data Mining 65
Business Understanding 65
Data Understanding 65
Data Preparation 66
Modeling 66
Model Evaluation 68
Model Release 69
Application Results 69
Conclusion 70
References 70
CRM Research Based on the Decision Tree Classification Algorithm 71
Introduction 71
ID3Algorithm Principle 72
ID3 Algorithm Improvement 72
Design and Realizatino of ID3 Improving Algorithm 74
Algorithm Application 74
Experimental Result and Comparison 75
Conclusion 76
References 76
Design of Optimal Controller for Dynamic Positioning System of a Certain Drilling Platform 77
Introduction 77
The Description of DP System 78
Mathematical Modelling 78
Design of a Variable Structure Controller 79
Simulation Results 81
Conclusion 82
References 82
KKM Theorems in L-Spaces 83
Introduction 83
Preliminaries 83
KKM Theorems for Noncompact L-Spaces 85
References 88
Optimal Output of Hydropower Station Based on Rough Set Theory 89
Introduction 89
Rough Set Theory and Method 89
Information System 90
Lower and Upper Approximations 90
Knowledge Acquisition 90
Variable Precision Rough Set(VPRS) 91
Application Example 91
Data Preparation 91
Data Discretization 92
Attribute Reduction 92
Role Generation and Filtration 92
Optimal Output Rules Analysis 93
Conclusion 93
References 93
Performance Study on Fire Alarm System in Large Space Buildings 94
Introduction 94
Model Design 95
Air Sampling Pipe Network 96
Results 97
Conclusions 98
References 98
Research on Expert System for Ginseng Diseases and Pests Based on CBR 99
Introduction 99
The Implement of the Expert System 100
The Abstraction of Properties, Description of Cases, and the Establishment of Cases Database 100
The Set-Up of Database of Ginseng Diseases and Matching Strategy of the Cases 102
Input of New Case and the Process of Case Retrieval 103
Conclusions Revise and Machine Learning 103
System Conclusions and Future Work 104
References 104
Research on Reliability Evaluation Based on Vibration Severity for Gearbox 105
Introduction 105
Concepts of Vibration Severity 106
Definition of Vibration Severity 106
Classification of Vibration Severity 106
Index of Vibrating Signal and Measuring Method 107
Vibrating Measure 107
Evaluation Standard of Vibrating 107
Research on Vibration Severity 107
Reliability Estimation on Gearbox 109
Conclusions 110
References 110
Study and Development on WEBGIS-Based Emergency Rescue Platform for Mines 111
The Goal of the System and Demand Analysis 111
The Design of the System Principle and General Structure 112
The Structure of Emergency Rescue System 112
Conclusion and Prospect 116
References 116
Study on Noun Phrase of “B+N” Structure in Search Engine Query Logs 117
Introduction 117
The Characteristics of Various Elements of "B + N" Structure Noun Phrase in Search Engine Logs 117
Monosyllable-Morpheme Distinguishing Words 118
Multi-Morpheme Distinguishing Words 118
Usage of "B + N" structure Noun Phrase in Search Engine Logs 120
Experimental Results and Analysis 121
References 122
Study on Queue Strategy of Gated Polling Multi-access Communication System 123
Introduction 123
Mathematical Model 123
System Working Conditions 124
Generation Function 124
Performance Analysis 125
Mean Queue Length 125
g(1) (i, j) 125
Mean Waiting Time 127
Simulation 127
Conclusions 129
References 129
The Climatic Characterization of Reference Evapotranspiration of Beijing Meteorological Station 130
Introduction 130
Methodology 131
Penman-Monteith Method 131
Sensitivity Coefficients 131
The Detrend Method 132
The Contribution Method 132
Study Area and Data 132
Results and Discussion 133
Annual Variation of ETp and Key Climatic Variables 133
Sensitivity of Key Climatic Variables 133
Estimate the Influence of Key Climatic Variables on ETp 134
Intra-annual Variation of Key Climatic Variables 134
Contribution of Key Climatic Variables Fluctuation to the Intra-annual Variation of Evapotranspiration 135
Summary and Conclusions 136
References 137
The Digital Design Applied to Consumer Garment Try-On Experience Integrated with Augmented Reality 138
Background 138
GUI AR Pattern 139
Software Construction 140
Operates the Procedure 141
Conclusion 143
References 144
Video Event Detection Based on Temporal Pattern Analysis 146
Introduction 146
Proposed Framework 147
Experiments 150
Conclusions 151
References 151
Intelligent Techniques for Data Mining 19
A Memetic Algorithm for Hardware Software Partitioning 152
Introduction 152
Problem Description 153
Memetic Algorithm 154
Local Search Procedure 154
Crossover Procedure 155
The Proposed Algorithm 155
Experiment 155
Conclusion 156
References 156
Dimensionality Reduction for Colon Data 158
Introduction 158
Dimensionality Reduction Method 158
Laplacian Eigenmaps 159
MDS 159
Support Vector Machine 160
Analysis of Experimental Results 161
Conclusion 162
References 162
Mechanics Analysis on Set Membership Evaluation of Real-Virtual Sensor-Based on Multi-layer Fusion 163
Introduction 163
The Principle of Set Membership Evaluation of Real-Virtual Sensor Based on Multi-layer Fusion 164
The Principle of Real-Virtual Sensor Based on Multi-layer Fusion 164
The Principle of Set Membership Evaluation of Real-Virtual Sensor Based on Multi-layer Fusion 164
Mechanism Analysis 165
Multi-sensor Adaptive Weighting Fusion Algorithm 165
The Algorithm of Real-Virtual Sensor Based on Multi-layer Fusion 166
The Estimation Algorithm of Set Membership of Real-Virtual Sensor Based on Multi-layer Fusion 166
Simulation and Analysis 168
Simulation 168
Performance Analysis 168
Conclusion 169
References 169
Web News Pages Extraction Method Based on DOM and Decision Tree 170
Introduction 170
News Pages Extraction 171
Page Preprocessing 171
Problem Definition and Framework of Decision Tree-Based Extraction Method 171
Attributes Extraction 171
Learning to Identify News Body Subtrees 172
Integrating the Results of Extraction 173
Experiment and Result 173
Learning and Building a Decision Tree 173
Accuracy Testing 174
Conclusion and Future Work 175
References 175
Feature Selection and Extraction 20
Study on Feature Selection Based on Fuzzy Clustering Algorithm 176
Introduction 176
Feature Separability Analysis Based on Fuzzy ISODATA 177
Candidate Feature Subset Generating in RFE 178
Feature Selection Experiment 179
Conclusion 181
References 182
Urban Air Quality Forecast System Based on Sample Optimization and Its Application 183
Sample Optimization 184
BP Neural Network 185
Establishment of Urban Air Quality Forecast System 186
Air Quality Prediction Model 186
Urban Air Quality Forecast System 187
Case Study 187
Site Description and Data 187
Results and Discussion 188
Conclusions 189
References 189
Clustering and Classification 20
A Fast KNN Categorization Algorithm Based on Feature Space Indexing 190
Introduction 190
KNN Algorithm and Its Improvements 191
A Fast KNN Categorization Algorithm Based on Feature Space Indexing 191
Experimental Result and Analysis 193
Conclusion 194
References 194
An Experimental Comparison of Different Features for Image Retrieval Based on Bayesian Classifier 196
Introduction 196
Features for CBIR 197
Bayesian Estimation for Relevance Feedback 198
Experimental Results and Analysis 200
Conclusion 202
References 202
An Improved Document Clustering Algorithm Based on Neural Gas Algorithm 203
Introduction 203
Our Algorithm 204
Experimental Results 206
Comparison of Quality of Clustering Algorithms 206
Comparison of Time Spent by Each Clustering Algorithm 207
Conclusion 208
References 208
An Odor Discrimination Approach Based on Mice Olfactory Neural Network 209
Introduction 209
Mice Olfactory Neural Network Model 210
Establishment of Artificial Olfactory Neural Network 211
Experiments and Result Analysis 212
Conclusions 213
References 213
Application Research of Weighted Fuzzy C Means Clustering about Soil Fertility Evaluation in Nong'an County 215
Introduction 215
Building FCM Model Based on Entropy Weighted 216
Determine the Weight Coefficient 216
Weighted Standardized Data 217
Clustering Process 217
Application of the Algorithm about Soil Fertility Evaluation in Nong'An County 218
Data Selection 218
Soil Fertility Evaluation 218
Conclusion and Discussion 219
References 220
Automatic Classification between Wind and Bowstring Instrumental Music Using Support Vector Machine 222
Introduction 222
Feature Extraction 223
Spectral Centroid 223
Spectral Spread 223
Low Energy Frame Ratio 223
MFCCs 224
Classification 224
Support Vector Machine 224
Parameter Optimization 225
Experimental Results 225
Conclusions 227
References 227
Boundary Point Recognition Algorithm Based on Grid Adjacency Relation 228
Introduction 228
Concepts 229
The Refinement of the Boundary 231
Description of the GAB algorithm 231
The Analysis of Algorithm Performance 232
Experiment Result and Discussion 232
Conclusion 234
References 235
The Application of Genetic BP Neural Network and D-S Evidence Theory in the Complex System Fault Diagnosis 236
Introduction 236
Genetic Algorithm Optimizing BP Neural Network 236
D-S Evidence Theory [16-24] 237
The Diagnostic System’s Framework Combined Genetic Neural Network with D-S Evidence Theory 238
Example 239
Conclusion 241
References 241
Research into Fuzzy Clustering with Collaboration between Multi Data Sets 242
Introduction 242
FCM Clustering Algorithm 243
Collaboration Clustering 244
Collaboration Clustering Algorithm 245
Settlement of the Optimization Problem 246
Algorithm Flow 248
Evaluation of the Collaboration Effect 249
Experimental Analysis 249
Clustering Results without Collaboration 249
Optimization of Clustering with Collaboration 250
Collaboration Effect 250
Conclusion 250
References 251
Scalable Online Incremental Learning for Web Spam Detection 252
Introduction 252
The Proposed Online Incremental Learning Framework 253
Framework Overview 253
Methodology 254
Experimental Evaluation 256
Conclusion and Future Work 257
References 257
Semi-supervised Clustering Algorithm Based on Shared Nearest Neighbors 259
Introduction 259
Problems 259
Algorithm Descriptions 260
Simulations 262
Conclusions 263
References 264
Association Rule Mining 21
A Improved MASK Algorithm Based on Privacy Preserving 265
Introduction 265
Concepts and Algorithms 266
Association Rules 266
MASK Algorithm Description 266
Improvement on MASK Algorithm 267
Principle Description 268
Improved Algorithm Description 268
Experiment and Results Analysis 269
Conclusions 270
References 270
Classification Data Mining for Digital Home Sensor Networks 271
Introduction 271
Digital Home Sensor Networks 271
Digital Home 271
Sensor Network 272
Data Mining for Digital Home Sensor Networks 272
Model of Classification Mining 272
Algorithms of Classification Mining 273
Steps of Classification Mining 273
Experiment 274
Pretreatment of Collected Data 274
Data Sort 274
Process of Classification Mining 275
Conclusion 276
References 276
Data Visualization and Exploration 21
On Ranking Senators by Their Votes 277
Introduction 277
Background 277
Ranking Legislators 277
The Combinatorial Graph Laplacian 278
Ranking 278
Algorithm 280
Computing Similarities 280
Selecting the Labeled fi 281
Experimental Results 281
Using Domain Knowledge 281
Using Internal Knowledge 281
Discussion 284
Conclusions 284
Future Work 284
References 284
Visibility Graph Analysis on Monthly Macroeconomic Series of U.S.A. from Jan-1959 to Jun-2010 Based on Complex Network Theory 285
Introduction 285
Methods and Materials 286
Results and Discussions 287
Degree Distribution of Associated Networks 287
Community Structure of Associated Networks 287
Conclusions and Application 290
References 290
Event Detection and Trend Tracking 21
Investigations of Intrusion Detection Based on Data Mining 291
Introduction 291
Intrusion Detection Techniques and Data Mining Techniques 292
Intrusion Detection Techniques and Data Mining Techniques 292
Apriori Algorithm and Clustering Algorithm 292
Experimental Test and Analysis 294
Conclusions 295
References 295
Time-Series and Sequential Data Mining 21
Research on the Change of HRV in the Process of Gradually Guided Breathing 296
Introduction 296
Materials and Methods 297
Experiment Scheme 297
Data Acquisition 297
Data Analysis 297
Results 299
The Change of Power Spectrum in Guided Breathing Process 299
The Results of HRV Parameters in Guided Breathing Process 299
Statistical Result 300
Discussion 300
Conclusion 301
References 301
The Analysis of Earthquake Precursory Based on Multiscale Technology of Wavelet Transform 302
Introduction 302
Basic Principles of Wavelet Transform 303
Seismic Data Processing Method Based on Frequency Analysis 303
Discrimination and Separation between High and Low Frequency Information for Digital Data of Precursors 304
Discrimination between Trend and Short-Term Anomalies of Digital Precursory Data 305
Conclusions 306
References 307
Image and Multi-media DataMining 21
Analysis Method Based of Digital Image of Wool or Cashmere 308
The Principle of Watershed Algorithm 308
Mark Watershed Algorithm Used in Cashmere Image Segmentation 309
Filtering and Enhancement of Cashmere Image 309
Obtain Morphological Gradient Image 309
Mark and Modify the Local Maximum Image 310
Modify the Gradient Image 310
Do Watershed Algorithm on Modified Gradient Image 311
Character Parameter Extract 311
Using Sub-measurement to Measure the Diameter 311
Precision Analysis of Measurement Results 312
Conclusion 312
References 312
Population Density Analysis in Underground Public Space Based on Digital Video and Pattern Recognition 314
Introduction 314
Design and Analysis for Digital Video Recording System 315
Recognition and Classification Mechanism of Population Images 316
Object Detection with Matlab Toolkit 316
Matrix Expression for Pre-detection Results 318
Classification Mechanism Based on Potential Function 318
Population Density Analysis in Underground Supermarket 319
Approach to Population Density Analysis 319
Algorithm of Population Density Calculation 319
Conclusion 319
References 319
Text andWeb Mining 22
A New Preprocessing Phase for LSA-Based Turkish Text Summarization 320
Introduction 320
Applying LSA 321
Data Representation 321
Algortihm I 321
Algorithm II 322
Performance Evaluation Process 322
Data Corpus and Evaluation Sets 322
Preprocessing Methods 323
Test Datasets 323
Experimental Results 323
Conclusion and Future Works 325
References 325
Recognition of Chemical Names in Chinese Texts 326
Introduction 326
Methods 327
Overview 327
Corpus Generation and Word Segmentation 327
Chinese NER as a Sequence Tagging Task with CRF 328
Experiments 330
Variance under Different Tagging Units 330
Comparisons of Different Feature Selection 331
Determine Effective Interval of Feature Values 331
Conclusions 332
References 332
Data Mining in Financial Engineering 22
Exploration on Data Recommendation Prototype Based on Data-Sharing-Platform 334
Introduction 334
System Design 334
Over all System Framework 334
Design of User Database 335
System Work Flow 336
System Implementation Technology 337
System Architecture Technology 337
System Application 337
Summary and Future Work Prospect 338
References 338
The Study of Financial Early-Warning Model in Chinese Listed Companies by Fuzzy Neural Network 340
Introduction 340
Based on Fuzzy Neural Network Model for Financial Risk Warning 340
Fuzzy Comprehensive Evaluation Model 340
Based on BP Neural Network to Build the Financial Early-Warning Model 342
Case Analysis and Network Testing 344
Case Selection 344
Financial Forecast Results Verify the Analysis 344
Paper Preparation 344
References 345
Information Fusion 22
A Multi-source Spatial Data Fusion Method Used for Terrain Simulation 347
Introduction 347
Multi-source DEM Data Fusion 347
Representations of DEM 347
Pretreatment of DEM Data 348
Fusion Strategy of DEM Data 348
Treatment of Special Points 350
Fusion Results Analysis 351
Conclusions and Future Work 352
References 352
Other Topics in Data Mining 22
A New Method of Outlier Detection 353
Introduction 353
The Method of Outlier Detection Based on Data Whole Difference Degree 353
Experiment and Simulation 356
Conclusion 358
References 358
Acoustic Recognition of Artillery Projectiles by SVM 359
Trajectory Shock Wave Signal 359
Support Vector Classification Machine 360
Modelling 360
Algorithm 361
Shock Wave Signal Based Support Vector Target Classification 363
Extraction of Target Characteristic Variables 363
Training and Testing 364
Conclusion 364
References 364
Algorithm for Data Mining Based on Fuzzy Logic 366
Introduction 366
Fuzzy Relation on Data System 366
Effect Characteristic of Intersection Values u 367
Data Model of ( X,U,P) and Characteristic 368
Studying of Decision Effect of M 369
Summary 370
References 370
Analysis on Electro-Mechanical Response of Carbon Fiber under Off-Axis Tension in Multivariate Regression Modeling Procedures 371
Introduction 371
Experimental and Methods 372
Experimental Design and Specimen Testing 372
Data Sets 372
Theoretical Analysis 374
Constructing Model 374
Prediction and Application 374
Conclusion 376
References 376
Application of Data Mining for Fluid Identification in Complicated Reservoir 377
Introduction 377
Data Mining 378
Practical Example for Data Mining 378
Date Set 379
Conventional Cross-Plot in Fluid Identification 379
The Model and Analysis 380
Conclusion 381
References 381
Audio Classification for Blackfoot Language Analysis 383
Introduction 383
The Proposed Framework 384
Audio Syntactic Analysis 384
Subspace-Based Modeling 384
SS Classification and Decision Fusion 386
Conclusions 388
References 388
Neural-Based Decision Trees Classification Techniques: A Case Study in Water Resources Management 389
Introduction 389
Neural Decision Tree 390
Artificial Neural Networks 390
Neural Decision-Tree Construction 390
Experiment 391
Study Site 391
Data and Modelling 391
Results 392
Simulation and Discussions 393
Conclusions 393
References 394
Personalized Recommendation Based on Desktop Context 395
Introduction 395
Extraction of Desktop Context 396
Desktop Resources Extraction 397
Work Scenario Context Extraction 398
Experiment of Personalized Recommendation 399
Conclusions 399
References 400
The Classification Recognition of Projectiles Wear Mark Based on Support Vector Machine Method 401
Introduction 401
The Basic Theory of Support Vector Machines 402
The Classification of Striation Wear Mark with SVM Method 403
Conclusion 405
References 406
Data Integration, Interoperability, and Metadata 23
An Integrated Spatial Topology Model of Urban Public Transport Networks Based on Walking Paths Oriented to Passenger’s Views 407
Introduction 407
Spatial Topology Modeling of Urban Transport Networks 408
Urban Road Network Spatial Topology Modeling 408
Public Transport Network Spatial Topology Modeling 409
Integrated Spatial Topology Model of Urban Transport Networks Based on Walking Paths 410
Waking Path Network Spatial Topology Modeling 410
Integrated Multiple Transport Networks Based on Walking Paths 410
Conclusion 411
References 412
Data Structures and DataManagement Algorithms 23
The Design of ATmega161 and USB Connection Data Acquisition System 413
Introduction 413
The Data Acquisitions System Outlines 414
Data Acquisition System's Composition 414
USB Introduces 414
The System Hardware Designs 414
Based on USB Data Acquisition System Structure Drawing 414
Chipset Options 415
Hardware Connection Diagram 415
System Software Design 416
The Composition of USB Device 416
Initialize USB 416
The Conclusion 417
References 417
Data Privacy and Security 23
Order Exchange Key in Data Encryption 418
Introduction 418
Fundamentals 419
Detailed Application Method and Particular Techniques 422
Conclusion and Further Research 423
References 423
Weighted Social Networks Anonymizing Publication 424
Introduction 424
Weighted Social Network Privacy Model 425
Weighted Social Networks Graphs 425
Bipartite Graphs Model 425
Anonymizing Weighted Social Networks 427
K-Automorphism Publication 427
KAP Algorithm 427
Information Loss 429
Experimental Results 430
Conclusion 431
References 431
XML Data Processing and Algorithms 23
Efficient Structural XML Index for Multiple Queries 433
Introduction 433
Index for Multiple Queries 434
Architecture of Index System 434
Document Parser 434
Query Engine 434
Further Optimization 436
Supporting Complex Query 436
Optimization for Queries 437
Optimization for Indexing Documents 437
Evaluation for Optimized Index 438
Experiments 438
Experimental Parameters 439
Experimental Results 439
Conclusion 440
References 440
Distributed, Parallel, Peer-to-Peer Databases 23
An Efficient KNN Query Processing Approach on High-Dimensional Data Objects in P2P Systems 442
Introduction 442
Construction of SCBO Network 443
Constructing Strategy and Clustering Scheme 443
Clustering Encoding Strategy 444
Neighborhood Establishment among Clusters 444
KNN Query Processing Algorithm 445
Performance Evaluation 446
Experiment Setup 446
Experiment Results 447
Conclusion and Future Works 448
References 448
Research on Parallelizing Trie-Based Apriori Algorithm 450
Introduction 450
Trie-Based Apriori Algorithm 450
Parallelizing Programs 452
Experiments and Analysis 453
Conclusions 455
References 455
Web Search 23
A Web Log Mining System Based on MDP Algorithm 456
Introduction 456
MDP Algorithm 457
Basic Idea of MDP Algorithm 457
Design and Construction of MDP-Tree 457
Web Log Mining System Based on MDP Algorithm 458
Analysis of Data Source 458
Data Preprocessing 459
Mining Association Rules 459
Conclusion 461
References 461
Databases Applications 24
Design and Implementation of Test Paper Management System 463
Introduction 463
System Design 463
Goals 463
System Structure Design 464
Database Design 464
System Implementation 465
Knowledge Point Editor 465
Test Question Browsing and Editing 466
Summary 467
References 467
Embedded Real-Time Database System Concurrency Control Protocol A-Based FDA 468
Introduction 468
Alternative and Concurrency Control 469
Alternative Features 469
Effects of Alternative on Concurrency Control 469
Concurrency Control Protocol Based on Alternative A-BASED FDA 470
A-Based FDA's Basic Strategy 470
A-Based FDA Implementation 472
A-Based FDA Advantages 472
Summary and Outlook 473
References 473
Data Streams 24
A Data Mining Algorithm of Frequent Pattern for Data Flow Based on Landmark Window 474
Introduction 474
Two-Tuple Transaction Algorithm Principle 475
Two-Tuple Transaction Representation 475
The Data Mining Algorithms Description 476
Experiment 477
Conclusion 478
References 479
Temporal and Multimedia Databases 24
A Recovery Approach for Real-Time Database Based on Transaction Fusion 480
Introduction 480
Related Works 481
Real-Time Database Recovery Algorithm with Transaction Fusion 481
Definitions 482
Recovery Algorithm 482
Performance Analysis and Test 484
Conclusions 485
References 485
Systems, Platforms, and Middleware 24
A Data Collection Framework with Extensible Protocol Based on XML 487
Introduction 487
DCFEP XML Core Technology and Implementation 488
Uniform Web Service Interface(UWSI) 489
XML Protocol Converter (XMLPC) 489
Data Matching Processor (DMP) 490
Hash Cache(HC) 491
Data Check and Backup Device (DCBD) 491
Data Check and Backup Device (DCBD) 491
Thread Scheduling (TS) 492
Protocol Selector (PS) 492
Application of Building Energy Data Collection for DCFEP XML 492
The Uniform Code and XML file 492
Energy Data Collection Experiment 493
Conclusion 494
References 494
Data Storage 24
Optimizing Oracle System Based on SGA 496
Introduction 496
SGA Overview 496
Optimization 497
Shared Pool Optimization 497
Buffer Cache Optimization 498
Redo Log Buffer Optimization 499
Large Pool Optimization 499
Java Pool Optimization 500
Conclusion 500
References 500
Road Crosses High Locality Sorting for Navigation Route Planning 502
Introduction 502
Gap-Free Quantity Binary Sort 503
Spatial Locality of Continuous Blocking 503
Cyclic Recursive Sorting 504
Continuous Blocking of Sorted Crosses 505
Application on Road Network 506
References 507
Intelligent Systems Track I 24
Case-Based and Temporal Reasoning 24
Emergency Case Supporting System for EngineeringAccidents by CBR 508
Introduction 508
Implement Framework of Two-Stage ECSS for Engineering Accidents 509
Basic Cycles of CBR in ECSS for Engineering Accidents 509
Case Presentation 509
Case Initializing and Case Retrieving 512
Case Adaptation 513
Case Maintenance 513
Running Result and Analysis 513
Conclusion 514
References 514
Decision Support Systems 24
Fast Face Detection Based on Enhanced AdaBoost 516
Introduction 516
Related Work 517
Training and Computing Weak Clasthreshold 518
Experiment and Analysis 519
Conclusions 521
References 521
Fuzzy Systems 25
A Compound Fuzzy Control Studying on Main Road in City 523
Introduction 523
Intersection Model and Analysis 524
Design of Fuzzy Controller in Artery Road 524
Fuzzy Controller Design Ideas 524
Fuzzy Controller Design Steps 525
Simulation Computer and Analysis 527
Conclusion 527
References 528
A Semi-supervised Fuzzy SVM Clustering Framework 529
Introduction 529
Semi-supervised Fuzzy SVM Clustering Framework 530
SVM 530
Semi-surprised Fuzzy SVM Clustering Framework 530
Optimization of Objective Function 531
Experimental Results and Discussions 532
Concluding Remarks 533
References 534
An Algorithm of Building Fuzzy Petri Nets Based on the Simplified Fuzzy Productions 535
Introduction 535
The Relevant Concepts of FPN 536
The Formal Definition of FPN 536
A Series of Basic Concepts of FPN 536
Three Types of Basic Fuzzy Production 536
Formal Definition of Fuzzy Production 537
Three Types of Fuzzy Production 537
Simplification Algorithm of “or” Fuzzy Production 538
An Algorithm of Building FPN Based on Fuzzy Productions 538
One by One Relationship between Fuzzy Productions and FPN 538
Main Body of This Algorithm 539
A Case in These Algorithms 540
Fuzzy Production Base as “Ethernet Has Problem” 540
To Further Process the ‘or’ Fuzzy Productions by Algorithm1 541
The Final FPN Model 541
Conclusion 542
References 542
An Effective Approach to Detect Hard Exudates in Color Retinal Image 544
Introduction 544
Proposed Alogorithm 545
Preprocessing 545
Histogram Thresholding 546
Fuzzy C-Mean Segmentation 547
Experiment and Discussion 547
Conclusion 549
References 549
Design and Simulation of Fuzzy Control Algorithm in OCC Processing 550
Introduction 550
Fuzzy Control Algorithm Design 551
System Model 551
Fuzzy Rules 552
Fuzzy Control Process Simulation 553
Simulation Model 553
Simulation Results and Discussion 553
Conclusions 556
References 556
Genetic and Evolutionary Algorithms 25
Optimal Hierarchical Remote Sensing Image Clustering Using Imperialist Competitive Algorithm 557
Introduction 557
Imperialist Competitive Algorithm 558
Hierarchical Image Clustering Using ICA 560
Implementation Results 561
Conclusion 563
References 563
Optimization Estimation of Muskingum Model Parameter Based on Genetic Algorithm 564
Introduction 564
Principle of Muskingum Model 565
Principle and Process of Genetic Algorithm 566
The Application of Genetic Algorithm for Muskingum Model Parameter Estimation 567
Conclusion 569
References 570
Recursive Genetic Algorithm for Robot Manipulator Motion Planning in the Existence of Obstacles 571
Introduction 571
Problem Definition 572
Methodology 573
Representation 573
Trajectory Generation 573
Genetic Operators 573
Fitness Function 574
The Recursive Genetic Mechanism 575
Results and Discussions 576
Problem 1 576
Problem 2 577
Problem 3 578
Problem 4 578
Conclusions and Future Work 579
References 580
Research on Convergence of Self-adaptive Mutation Algorithm 582
Introduction 582
Algorithm 582
Preparation 583
Convergence 585
Conclusion 587
References 587
Human-Machine Interaction 25
Head Movements and Animating Facial Expressions Based on Multi-curve Spectrum 588
Introduction 588
3D Virtual Face Model and Head Movements 589
The External Modelling of Virtual Face 589
The Internal Modelling of Virtual Eye 590
The 3D Movement of Virtual Head 590
The Driven of 3D Head Movement Using HFMS 590
The Expression of HFMS 590
The Control Mechanism of HFMS 590
Experiment Result 591
Conclusion 593
References 593
Implementation of Eye Tracking with Webcam Images 594
Introduction 594
Controlling the Flow of the Images 595
Detecting Eye Pupil Center 596
Conclusions and Future Work 598
References 599
Research and Development of the Head Unit of Interactive Humanoid Robot 600
Introduction 600
Mechanical System of Humanoid Head 601
Face Detection and Face Recognition 601
Face Detection Based on Adaboost 601
Face Recognition Based on 2DPCA 602
Control Unit of Humanoid Robot Head 603
The Realization of Human-Computer Interaction Function 604
Conclusion 604
References 605
The Chinese Describing of GIS Path Based on Continuous Polar Coordinate 606
Introduction 606
Describing Knowledge Base of Path 607
Describing Words Base of Path 607
Landmark Features’ Name Base 607
Describing Rules Base of Path 608
Algorithm of PNLD Based on Continuous Polar Coordinate 608
Structure of Road Network Topology 608
Preprocessing of Road Nodes 609
Calculating Polar Coordinate of Nodes 610
Constructing of Sentence of PNLD 611
Prototype System 612
Conclusions 613
References 613
Usability Evaluation and Redesign of E-Government: Users’ Centred Approach 614
Introduction 614
Literature Review 615
Methodology 616
Task Design 616
Usability Questionnaire 617
E-Government Website Selection 617
Participants 617
Experimental Evaluation Procedure 618
Results of Experiment 1 618
User’ Perception 618
Users’ Performance 619
Design of the Proposed Solutions 620
Results of Experiment 2 621
Users’ Perception 621
Users’ Performance 622
Conclusion 623
References 623
Neural Networks 26
A Research Based on a Modified Genetic Algorithm for the Overfitting of Resonance Maching Network 625
Introduction 625
A Learning Strategy of Network Improvement Bases on the Genetic Algorithm 626
A Kind of Modified Adaptive Genetic Algorithm 626
A Network Learning Strategy Based on the Modified Genetic Algorithm 628
Experiments 629
Data Description 629
Initialization 629
Experiments and Results 629
Conclusion 630
References 630
Application of BP Neural Network in History Match and Productivity Prediction of Coalbed Methane 631
Introduction 631
Basic Principles of BP Neural Network 632
Predicting Technique of BP Network 632
Application of BP Network in Productivity Matching and Predicting for CBM Wells 633
Learning Example 633
Training Example 633
Match and Predictive Results 634
Conclusions 635
References 636
Application of RBF Neural Network and ANFIS on the Prediction of Corrosion Rate of Pipeline Steel in Soil 637
Introduction 637
Introduction of RBF-NN and ANFIS 638
Soil Corrosion Test 638
Corrosion Rate Predictions 639
Results Analysis 640
Conclusions 642
References 642
Dynamic Network Clustering with Affinity Propagation 643
Introduction 643
Affinity Propagation 644
Dynamic Network Clustering Algorithm 645
Experiments 646
Summary 648
References 648
Electric Load Forecasting Based on Improved Grey Neural Network 649
Introduction 649
Power Load Forecasting Model 649
Grey System Theory 649
BP Neural Network 650
Improved Gray Neural Network 650
Algorithm Applied 652
Conclusion 653
References 653
Forest Growth Simulation Based on Artificial Neural Network 654
Introduction 654
Materials and Methods 655
Results and Analysis 656
Model Development 656
Training Results of the Model 657
Performance Analysis of the Mode 657
Conclusions and Discussion 658
References 659
Fuzzy Adaptive Back Propagation Model Based on Genetic Algorithm 661
Introduction 661
TBP-Algorithm 661
CFABP Algorithm 662
Extracting Fuzzy Rules for CFABP Based on Genetic Algorithm 663
Encode Fuzzy Rules 664
Evaluate Individuals 664
Simulation Results 665
Simulation 1: Function Approximation 665
Simulation 2: Character Recognition 666
Conclusion 666
References 666
Lagurre Orthogonal Polynomial Basis Functions Neural Network 667
Introduction 667
Non-linearity Compensation Principle of Thermocouple Sensors 668
Lagurre ANN 669
Experiments and Results 670
Conclusions 671
References 671
Study on Fabric Classification with Support Vector Machines Based on Half-Circle Skirts Shape Simulated in 3D Virtual Try-On 673
Introduction 673
Experiment 674
Fabric Test 674
3D Virtual Try-On 674
Parameters Selection for Objective Evaluation of Half-Circle Skirt Sharp Style 675
Simulate Validation 675
Cluster Analysis of Half-Circle Skirt Shape Style 676
Model for Fabric Classification on SVM According to Skirt Shape Style 677
Construction of SVM Classification Model 677
C-Support Vector Classification Machine Classifier 678
Experiments of the Fabric Classification Model on SVM 678
Conclusion 679
References 680
The Classification of Children’s Occupational Therapy Problems Using Neural Network 682
Introduction 682
Methods 683
Results and Discussion 685
Conclusion 686
References 687
Pattern Recognition 26
Enhancement of Template-Based Face Detection by Belief Propagation in Ordered Component Search 688
Introduction 688
The Face Detection Algorithm 690
Experimental Results and Discussion 692
Conclusion 693
References 693
Face Recognition Based on DWT and Improved Linear Discriminant Analysis 694
Introduction 694
Wavelet Analysis 695
Linear Discriminant Analysis 696
Experiment 698
Conclusion 699
References 699
Incomplete Barcode Reading Mechanism with Remote Database Access 700
Introduction 700
Barcode Systems 700
Hardware and Software Architecture 701
Recognition 701
Image Pre-processing 702
Barcode Localization and Division 702
Bars Recognition 702
Code Recognition 703
Comparing the Results of Bars and Digits Recognition 703
Data Base Access 703
Experimental Results 704
Conclusion 705
References 705
Local Feature Image Fusion Algorithm Based on Wavelet Transform 706
Introduction 706
Fusion Algorithms 706
Fusion Rules 707
Fusion Procedures 707
Fusion Evaluations 708
Experiments 709
Conclusions 710
References 710
One Infrared Face Recognition Method with Matrixized Model 712
Instruction 712
The Framework of MatLSSVM 713
Experiment 715
Conclusion 716
References 716
One-Dimensional Feature Extraction Method for Iris Image 718
Introductions 718
Local Texture Image of Iris 718
The Proposition of Local Texture Image 718
LTI Method 719
Analysis of Algorithm LTI 719
One-Dimensional Iris Feature Extracting and Encoding 721
Registration of Iris Image 722
Conclusions 722
References 723
Rademacher Complexity Analysis for Matrixized and Vectorized Classifier 724
Introduction 724
Rademacher Complexity Analysis 725
MHKS and MatMHKS 725
Rademacher Complexity Analysis 726
Experiments 727
Conclusion and Future Work 728
References 729
Recognition of Plate Shape Defect Based on RBF-BP Neural Network 730
Introduction 730
Analysis of the Shape Defect Pattern 731
Determination of the Basic Plate Shape Patterns 731
Normalization Processing of Standard Shape 731
The Plate Shape Defects Recognition Model of Combinational RBF-BP Neural Network 732
Determination of Input Neurons 732
Determination of Output Neurons 732
Effectiveness Analysis of Shape Pattern Recognition 733
Training of BP, RBF-BP Network 733
The Results of Simulation Analysis 734
The Analysis of Actual Shape Pattern Recognition 734
Conclusion 735
References 735
The Texture Feature Extraction for Multi-objective Image in Complex Traffic Environment 736
Introduction 736
Gray Level Concurrence Matrix 737
The Principle of Gray Level Concurrence Matrix 737
Parameters of the CLCM 737
Two-Dimensional Wavelet Transform 738
Texture Feature Extraction Algorithm of Multi-target Image of Intricate Traffic Environment 738
Texture Feature Selection of Multi-target Image 738
Multi-target Image Texture Feature Extraction 739
Experiment Results and Analysis 739
Conclusion 740
References 741
Machine Learning 27
A Novel Fuzzy Sarsa Learning Incorporated with Ant Colony Optimization 742
Introduction 742
Fuzzy Sarsa Learning and Ant Colony Optimization 743
Fuzzy Sarsa Learning 743
Ant Colony Optimization 744
A NACO-FSL Method 745
Configuration of NACO-FSL 745
Simulation 746
Conclusion 746
References 746
A Study Based on Distributed Supervised Machine Learning System for Text Classification 748
Introduction 748
Consistency Analyses 749
Classifier Performance Evaluations 749
Dempster-Shafer Theory (Evidence Theory) [11] 750
Distributed Supervised Machine Learning Algorithm 750
Concepts 750
Algorithms 751
DSMLS Model 752
Experiments 752
Results 753
Conclusions and Future Work 754
References 754
Content-Based Remote Sensing Image Retrieval Using Image Multi-feature Combination and SVM-Based Relevance Feedback 756
Introduction 756
Features Extraction in Remote Sensing Images 757
Color and Texture Features 757
Spectral Feature 757
Support Vector Machine Based Relevance Feedback 757
Support Vector Machine 757
SVM-Based Relevance Feedback 758
Experiments 759
Experimental Environment 759
Parameter Selection 759
Experimental Results 759
Conclusions and Future Work 761
References 761
Ranking Learning Model Applying Visual Features for Image Search 763
Introduction 763
Relative Works 763
Ranking Learning 763
Reranking 764
Ranking Learning Model for Image Retrieval 764
Modeling 764
The Optimization of Factor w for Ranking Learning 765
Model Solution 766
Solution for Ranking Parameter w 766
Ranking Prediction 766
Experiment Analysis 766
Experiment Setting 766
Experimental Results 767
Conclusions 767
References 768
SVM Classification for Large Data Sets by Support Vector Estimating and Selecting 769
Introduction 769
Support Vector Machine 770
Support Vectors Estimating and Selecting 771
Experiments 772
Summary 774
References 774
Author Index 776
Erscheint lt. Verlag | 25.1.2012 |
---|---|
Reihe/Serie | Lecture Notes in Electrical Engineering | Lecture Notes in Electrical Engineering |
Zusatzinfo | XXX, 786 p. 278 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik |
Technik ► Elektrotechnik / Energietechnik | |
Schlagworte | Applied Computing • information engineering |
ISBN-10 | 3-642-25781-X / 364225781X |
ISBN-13 | 978-3-642-25781-0 / 9783642257810 |
Haben Sie eine Frage zum Produkt? |
Digital Rights Management: ohne DRM
Dieses eBook enthält kein DRM oder Kopierschutz. Eine Weitergabe an Dritte ist jedoch rechtlich nicht zulässig, weil Sie beim Kauf nur die Rechte an der persönlichen Nutzung erwerben.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich