دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Sheng-Chai Chi, Chih Chieh Yang (auth.), Bogdan Gabrys, Robert J. Howlett, Lakhmi C. Jain (eds.) سری: Lecture Notes in Computer Science 4251 ISBN (شابک) : 9783540465355, 9783540465362 ناشر: Springer-Verlag Berlin Heidelberg سال نشر: 2006 تعداد صفحات: 1360 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 28 مگابایت
در صورت تبدیل فایل کتاب Knowledge-Based Intelligent Information and Engineering Systems: 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part I به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب سیستم های اطلاعات و مهندسی هوشمند مبتنی بر دانش: دهمین کنفرانس بین المللی ، KES 2006 ، بورنموث ، انگلیس ، 9-11 اکتبر 2006. مجموعه مقالات ، قسمت اول نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
نمایندگان و دوستان، ما بسیار خرسندیم که صمیمانه ترین خوش آمدگویی را به شما تقدیم کنیم، دهمین کنفرانس بین المللی اطلاعات مبتنی بر دانش و هوشمند و سیستم های مهندسی در مرکز بین المللی بورنموث در بورنموث، انگلستان، که توسط KES برای شما ارائه شده است. بین المللی. این یک کنفرانس ویژه KES است، زیرا دهمین کنفرانس در این مجموعه است، و به این ترتیب، مناسبتی برای جشن و فرصتی برای تأمل است. اولین کنفرانس KES در سال 1997 برگزار شد و توسط بنیانگذار کنفرانس KES، لخمی جین برگزار شد. در سال های 1997، 1998 و 1999 کنفرانس های KES در آدلاید استرالیا برگزار شد. در سال 2000 کنفرانس به خارج از استرالیا منتقل شد تا در برایتون، انگلستان برگزار شود. در سال 2001 در اوزاکا، ژاپن بود. در سال 2002، کرما در نزدیکی میلان، ایتالیا؛ در سال 2003، آکسفورد، انگلستان؛ در سال 2004، ولینگتون، نیوزلند؛ و در سال 2005 ملبورن استرالیا. قرار است دو کنفرانس بعدی در ایتالیا و کرواسی برگزار شود. تعداد نمایندگان از حدود 100 نفر در سال 1997 به یک رقم معمولی بیش از 500 افزایش یافته است. این کنفرانس نمایندگان بسیاری از کشورهای مختلف، در اروپا، استرالیا، حاشیه اقیانوس آرام، آسیا و آمریکا را جذب می کند و ممکن است واقعاً گفته شود که " بین المللی'. KES International که در سال 2001 تشکیل شد، به یک سازمان جهانی تبدیل شده است که یک جامعه حرفه ای برای محققان در رشته مهندسی و سیستم های اطلاعاتی مبتنی بر دانش و هوشمند فراهم می کند و از این طریق فرصت هایی برای انتشار، شبکه و تعامل فراهم می کند.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International. This is a special KES conference, as it is the 10th in the series, and as such, it represents an occasion for celebration and an opportunity for reflection. The first KES conference was held in 1997 and was organised by the KES conference founder, Lakhmi Jain. In 1997, 1998 and 1999 the KES conferences were held in Adelaide, Australia. In 2000 the conference moved out of Australia to be held in Brighton, UK; in 2001 it was in Osaka, Japan; in 2002, Crema near Milan, Italy; in 2003, Oxford, UK; in 2004, Wellington, New Zealand; and in 2005, Melbourne, Australia. The next two conferences are planned to be in Italy and Croatia. Delegate numbers have grown from about 100 in 1997, to a regular figure in excess of 500. The conference attracts delegates from many different countries, in Europe, Australasia, the Pacific Rim, Asia and the Americas, and may truly be said to be ‘International’. Formed in 2001, KES International has developed into a worldwide organisation that provides a professional community for researchers in the discipline of knowledge-based and intelligent engineering and information systems, and through this, opportunities for publication, networking and interaction.
Front matter......Page 1
Introduction......Page 64
ABSOM Algorithm......Page 65
Evaluation of ABSOM + K-means......Page 67
Conclusions and Future Study......Page 70
References......Page 71
Introduction......Page 72
The Proposed Feature Extraction Methodology Involving Second and Third Order Probabilistic Features for Text Categorization......Page 74
Experimental Study......Page 80
Conclusions and Prospects......Page 82
References......Page 83
Introduction......Page 84
A Brief Introduction of OIF Elman Neural Network......Page 85
OIF Elman Neural Network with Profit Factors......Page 86
Selection of the Parameter Values of the Direction and Time Profit Factors......Page 88
Prediction of the Composite Index of Stock......Page 89
Conclusions......Page 90
References......Page 91
Introduction......Page 92
Turbo Jet Engine System......Page 93
Fuzzy Inference Control......Page 94
Simulation......Page 98
References......Page 99
Introduction......Page 100
Problem Description......Page 101
Mathematical Formulation......Page 102
Fuzzy Distribution Planning Model......Page 104
Computational Results......Page 106
Concluding Remarks......Page 107
References......Page 108
Introduction......Page 109
Methodology......Page 110
Design Approach......Page 111
Constraints......Page 112
Conclusion......Page 113
References......Page 114
Introduction......Page 115
Proposed Methods of Controller Design......Page 116
Fuzzy-PI Controller......Page 117
Genetic Algorithms(GAs)......Page 118
Self-tuning Fuzzy-PI Controller......Page 119
Simulation and Studies......Page 120
References......Page 121
Introduction......Page 123
Evolutionary Algorithm......Page 124
General Evolutionary Algorithm......Page 125
Hybrid Operator......Page 126
Computational Experiment......Page 127
References......Page 129
Introduction......Page 131
Context Recognition by Unsupervised Learning......Page 132
Measurement of Cluster Validity......Page 133
Design of Adaptable Face Recognition Using Cluster Validity......Page 135
Experimental Results......Page 138
Conclusion......Page 139
References......Page 140
Introduction......Page 141
Facial Expression-Insensitive Recognition Using Self-adaptive Classifier Fusion......Page 142
The Architecture of Self-adaptive Classifier Fusion......Page 143
Gabor Wavelet and Feature Space Using Genetic Algorithm......Page 144
The Facial Geometry Based Self-adaptive Recognition Insensitive to Facial Expression Changes......Page 145
Experimental Results......Page 146
Conclusion......Page 147
References......Page 148
Introduction......Page 149
Problem Initialization......Page 150
New Harmony Improvisation......Page 151
Application to the Water Network Design......Page 154
References......Page 155
Introduction......Page 157
Tabu Search Algorithm (TSA)......Page 158
Application of Algorithms to the Identification Problem......Page 159
Simulation Results......Page 160
References......Page 164
Introduction......Page 165
Requirements......Page 166
Self-configuring FPGA Simulation......Page 167
Evaluation......Page 168
Conclusion......Page 170
Introduction......Page 173
Load Measure......Page 174
Load Sharing Approach......Page 175
Experiments......Page 179
References......Page 183
Introduction......Page 185
The Degree Constrained Minimum Spanning Tree Problem: DCMST......Page 186
The Proposed Memetic Algorithm......Page 187
Experiments......Page 189
Conclusions......Page 191
Introduction......Page 193
Tournament Selection......Page 194
Real World Tournament Selection (RWTS)......Page 195
Experimental Comparison......Page 197
Conclusion......Page 200
Introduction......Page 201
Example......Page 203
The Solution Procedure with Genetic Algorithm Approach......Page 204
References......Page 206
Basic Concepts of Discretization......Page 208
Lower and Upper Approximations......Page 209
Algorithm......Page 210
Micronutrients in SARS Patients’ Body Data Set Experiments......Page 211
Iris Plants Database Experiment......Page 212
Conclusions......Page 214
References......Page 215
Introduction......Page 216
Features of Related Theories......Page 217
An Improved Combinational Clustering Method......Page 219
Experiments and Results......Page 221
References......Page 225
Introduction......Page 226
{User-Item} Matrix in Ubiquitous Recommendation Systems......Page 227
Learning User Profile Using Naïve Bayesian Classifier......Page 228
User Preferences for Recommendations......Page 229
Evaluations......Page 230
Conclusions......Page 232
References......Page 233
Introduction......Page 234
Three-Channel Imaging System......Page 235
Texture Features Extraction for Unicellular Image......Page 236
Feature Reduction and Cellular Phase Identification by Fuzzy Support Vector Machine......Page 237
Experimental Results......Page 238
References......Page 240
Introduction......Page 242
Proposed Method of Fault Diagnosis......Page 244
Performance Comparison of ANNs and SVMs for the IEC TC 10 Dataset......Page 246
Performance Comparison of ANNs and SVMs for the Taipower Company Dataset......Page 247
References......Page 248
Introduction......Page 250
Problem Formulation......Page 251
Empirical Studies......Page 253
Conclusion......Page 257
Introduction......Page 258
Attributes\' Preparation and Preprocessing......Page 259
Combining Attributes......Page 260
Areas of Interest......Page 261
Experimental Results and Conclusions......Page 263
Introduction......Page 266
CA......Page 267
Decision Tree Method......Page 268
Model Framework......Page 269
Embodiment of Urban Growth Model......Page 270
Urban Growth Simulation......Page 272
References......Page 274
Introduction......Page 275
Multiple and Negative Rules......Page 276
Two MTNT Classifiers......Page 277
Experimental Results......Page 279
Conclusions......Page 281
Introduction......Page 283
Requirements......Page 284
Agent Navigation......Page 285
Agent Relationships......Page 286
Evaluation......Page 287
Conclusion......Page 289
References......Page 290
Process Management......Page 291
Emergent Process Agent $X_0$......Page 292
Agent Architecture......Page 293
Inference......Page 294
Interaction......Page 295
Performance Parameters --- Choosing the `Best\' Collaborator......Page 297
Delegation Strategy......Page 298
Introduction......Page 299
Building Agent Teams in the Fragmented Mobile Agent Network......Page 300
Organising Subteams......Page 301
Case Study: Software Upgrading in a Grid Network......Page 302
MA-RMS Multi-operation Teamwork Agents......Page 303
Performance Analysis......Page 304
References......Page 306
Introduction......Page 307
Real-Time Search for Shortest Path Finding......Page 308
Search Algorithms for Exploration and Mapping......Page 310
Implementation......Page 311
Experiments......Page 312
References......Page 313
Introduction......Page 315
Decentralized Autonomous FMS......Page 316
Contents of Memory......Page 317
How ROM Works......Page 319
Simulation Experiments......Page 321
References......Page 322
Introduction......Page 323
Adaptive QoS Control with M-INTER Model......Page 324
Meta-Interaction Architecture......Page 326
Applying M-INTER Model to FVCS......Page 327
Experiments and Evaluation......Page 328
Conclusion......Page 330
Introduction......Page 331
Planner Agent and the Satellite Control Problem......Page 332
MAGA Architecture......Page 333
Tracking Planner Agent (TPA)......Page 334
Flight Operation Planner Agent (FOPA)......Page 335
MAGA Architecture Behavior......Page 336
Conclusions......Page 337
References......Page 338
Introduction......Page 339
Jini Network Technology......Page 340
Configuration of the Web-Based Agent System......Page 341
Demonstration Results......Page 342
Conclusion......Page 346
Introduction......Page 347
Intelligent Agent Internal Representation......Page 348
Q-Learning......Page 349
Agent’s Triple for Input-Output Adaptation......Page 350
Reward Settings......Page 351
Experimental Results......Page 352
References......Page 354
Introduction......Page 355
Reserve Price Recommendation Methods......Page 356
Recommendation the Reserve Price Using Time Series Analysis......Page 357
Recommendation the Reserve Price Using Similarity-Based Time Series Analysis......Page 358
Experimental Evaluation......Page 359
Conclusions......Page 361
References......Page 362
Introduction......Page 363
Agent......Page 364
Single-Agent Systems......Page 365
Multi-Agent Systems......Page 366
System Architecture......Page 367
System Implementation......Page 368
Marketplace Collaboration Diagram......Page 369
Running the E-Commerce Bargain Application......Page 370
References......Page 372
Introduction......Page 373
FDRAS: Fashion Design Recommendation Agent System......Page 374
Automatic Classifications for Grouping Designs......Page 375
Example of Grouping Designs......Page 376
Evaluation......Page 378
References......Page 380
Introduction......Page 381
Business Strategies for Double Auction......Page 382
Evolutionary Selection Process of Business Strategies......Page 383
Case Study: Agent-Based Optical Bandwidth Trading......Page 384
References......Page 388
Introduction......Page 389
Case-Based Reasoning and Prototypicality Measures......Page 390
Diagnosis of Dysmorphic Syndromes......Page 391
Results......Page 394
Conclusion......Page 395
References......Page 396
Introduction......Page 397
Medical Case Histories......Page 398
Knowledge Base, Case Base, and Prototypes......Page 399
Retrieval, Adaptation, and Dialogue......Page 400
Hypothyroidism: Inefficacy of Levothyroxine Therapy......Page 401
Inefficacy of Psychiatric Drugs......Page 402
Conclusion......Page 403
References......Page 404
Introduction......Page 405
Related Work......Page 406
Reengineering for Knowledge in the Knowledge Base......Page 407
Relationships Within the Set of Rules......Page 409
Reengineering to Handle Problems Related to Consistency and Completeness......Page 410
Presenting the Sets in UML Diagrams......Page 411
References......Page 413
Introduction......Page 415
Types of Support Systems......Page 416
Actions Taken for Leadership......Page 417
Representation......Page 418
Interactions......Page 419
Emotional/Motivation Representation......Page 420
Conclusions and Further Work......Page 421
References......Page 422
Problem......Page 423
Method......Page 424
Formal Definition of the Abstract Space......Page 425
Graph for Vocational Counseling......Page 427
Modeling with the Model Graph......Page 428
References......Page 430
The Face Detection Scheme......Page 431
Illuminant Context Modeling......Page 432
Merging Process of Candidate Windows......Page 433
The Illuminant Eye Detector......Page 434
Experiment......Page 435
References......Page 437
Introduction......Page 439
Overall Architecture and Operation of INMA......Page 440
Description of the Domain Knowledge......Page 441
Domain Knowledge Representation Assistant......Page 443
Conclusions and Future Work......Page 445
References......Page 446
Introduction......Page 447
Related Work......Page 448
Mobile Technologies for the Front-End Level......Page 449
ALIMOS Operation and Evaluation......Page 451
Conclusions and Future Work......Page 453
The Metadata for POI Contents......Page 455
POI Attributes......Page 456
User Attributes......Page 457
Computing Algorithm of the Similarity......Page 458
Final POI Recommendation......Page 459
Results......Page 460
Conclusion......Page 462
References......Page 463
Introduction......Page 464
Architecture of RETE Network Hardware Accelerator......Page 465
RETE Network......Page 466
Parallel Matching Processing Module......Page 467
System Development Process......Page 468
Performance Evaluations......Page 469
References......Page 470
Introduction......Page 472
Problem Formulation......Page 473
Location Phase......Page 474
Routing Phase......Page 476
Computational Results......Page 477
Conclusion......Page 478
References......Page 479
Introduction......Page 480
Background......Page 481
Segmentation Vote from Words of Text Document......Page 482
Experimental Study......Page 484
References......Page 487
Introduction......Page 488
MultiCAD Design Framework......Page 489
Intelligent User Profile Module......Page 490
Machine Learning Component......Page 492
Machine Learning Component Configuration......Page 493
Preliminary Results......Page 494
Conclusions......Page 495
References......Page 496
Introduction......Page 498
Empirical Study Concerning User Emotions......Page 499
Results of the Empirical Study......Page 500
Stereotypes for Affect Perception......Page 501
Trigger Conditions and Inferences......Page 503
User Modeling Component......Page 504
References......Page 505
Introduction......Page 506
Overview of Proposed Garbage Collector......Page 507
Definition......Page 508
Solution......Page 509
Experimental Environment......Page 510
Results......Page 511
Conclusions......Page 512
References......Page 513
Introduction......Page 514
Related Work......Page 515
Security Access Authorizations Specification......Page 516
Propagation Policy and Default Policy......Page 517
XML Authorization System Strategy for Browsing Access Request......Page 518
XML Authorization and Memory Management Evaluation......Page 519
Conclusion......Page 520
References......Page 521
Introduction......Page 522
Model Construction......Page 523
Hybrid Heuristic Algorithm Within TA Model......Page 524
Heuristic Indexes for HW-SW Partitioning......Page 525
Hybrid Heuristic Algorithm for TA Model......Page 527
Experimental Results......Page 528
Summary......Page 529
Introduction......Page 530
Transmission Modeling for WAP Packet in Wireless Network......Page 531
Analysis of WAP Packet Transmission Time Using SAR Algorithm and RLP Layer......Page 532
References......Page 537
Introduction......Page 538
Introducing Neurons in Sensor Nodes......Page 539
Quality of Service in Wireless Sensor Networks......Page 540
Performance Evaluation by Simulation......Page 541
Learning Phase......Page 542
Execution Phase......Page 543
Conclusion and Future Works......Page 545
Introduction......Page 546
Related Works......Page 547
Rough Set-Based Anomaly Detection......Page 548
Performance Evaluation......Page 551
References......Page 552
Introduction......Page 553
Π-Type Membership Function......Page 554
ATM Based on SPMF......Page 555
Application to Linguistic Approximation......Page 557
Conclusions......Page 559
References......Page 560
Introduction......Page 561
Basic Concepts of Rough Set......Page 562
Fault Diagnosis Decision System of Power Systems......Page 563
Induce the Factors That Cause Multi-faults......Page 564
Induce More Abstract Rules from the Above Rules......Page 566
Discussions......Page 567
References......Page 568
Introduction......Page 569
Degree of Match in Consideration of Weight Ratio $(DM/WR)$......Page 570
Static Calculation Method of Degree of Association $(SCM/DA)$......Page 571
Dynamic Calculation Method of Degree of Association $(DCM/DA)$......Page 572
Data for Evaluation......Page 573
Evaluation of Calculation Method of Degree of Association......Page 574
Evaluation of ‘Two Words Association Mechanism’......Page 576
References......Page 577
Introduction......Page 578
Fuzzy Cognitive Maps Background and Description......Page 579
Support Vector Machines Background......Page 580
Fuzzy Cognitive Map Grading Model......Page 581
Description of the Tumour Grading Procedure Using SVMs......Page 582
Conclusions......Page 584
References......Page 585
Introduction......Page 587
VQ-Markov-Based Identification......Page 589
Fuzzy Fusion......Page 591
Experimental Results......Page 592
Conclusions......Page 594
Introduction......Page 595
Our Approach......Page 596
Filter Block......Page 597
Adaptive Filter Fusion......Page 598
Feature Extraction......Page 599
Algorithm for Our Developed System......Page 600
Face Recognition Experiments......Page 601
References......Page 603
Introduction......Page 605
Wavelet Transform......Page 606
Feature Vector and Retrieval Algorithm......Page 607
Experiment Result......Page 609
Conclusion......Page 610
References......Page 612
Introduction......Page 613
Supervised Clustering Method......Page 614
Detection of Semantic Training Sites Algorithm......Page 615
Semantic Supervised Clustering (SSC) Algorithm......Page 616
Results......Page 617
Conclusions......Page 619
References......Page 620
Introduction......Page 622
OFM-Based Robot Localization and Semantic-Map Building......Page 623
Extended Kalman Filter-Based SLAM Using Object Landmarks......Page 624
Performance Evaluation for Object Landmark-Based SLAM......Page 629
Concluding Remarks......Page 630
Introduction......Page 632
The Outline of the Proposed Eye Location Method......Page 633
The Decision of Eye Candidate Window Using Haar Feature Based Bayesian Classifier......Page 634
Eye and Non-eye Class Modeling......Page 635
Eye Candidate Window Using Haar Feature Based Bayesian Classifier......Page 636
The Proposed Merging Strategy......Page 637
The Proposed Arbitration Strategy......Page 639
Experiments......Page 641
References......Page 643
Introduction......Page 645
Face Detection......Page 646
Eye Location......Page 647
Eye Feature Interpolation......Page 648
Head Gesture Recognition......Page 649
Experimental Results......Page 650
References......Page 652
Introduction......Page 653
Occupant Classification......Page 654
Stereo Matching Algorithm......Page 655
Support Vector Machine as a Classifier......Page 656
Exceptional Conditions......Page 657
Stereo Image Database......Page 658
Performance of the System......Page 659
References......Page 660
Introduction......Page 661
Overview of the Gesture Analysis Algorithm......Page 662
Feature Extraction and Training......Page 663
Recognition System......Page 664
Recognition of Local and Global Gestures......Page 665
Conclusion......Page 667
References......Page 668
Introduction......Page 669
An Anfis-Based Novel Approach for Camera Calibration......Page 670
Adaptive Neuro-fuzzy Inference System: Anfis......Page 671
Conclusions......Page 674
Introduction......Page 677
Description of the Compression Algorithm......Page 678
Compression Approach......Page 679
Decompression Method......Page 680
Compressed DEM Management......Page 681
Accessing Data Elevations......Page 682
Tests and Results......Page 683
Conclusions......Page 684
References......Page 685
Introduction......Page 686
Fuzzy Similarity Measures......Page 687
Results......Page 690
Conclusions......Page 692
Introduction......Page 694
Statistical Characteristics Analysis......Page 695
Determining Stretching Function......Page 696
Performance Results......Page 698
References......Page 700
Introduction......Page 702
Related Work......Page 703
Qualitative Normalised Templates for Arm Motion......Page 704
Human-Arm Motion Model......Page 706
Experimental Evaluation......Page 707
Concluding Remarks......Page 708
Introduction......Page 710
A Quick Look to Fuzzy ALC......Page 711
The Fuzzy Description Logic ALCFC......Page 712
Reasoning for Satisfiability of ALCFC Concepts w.r.t. Empty TBoxes......Page 714
Conclusions......Page 717
Introduction......Page 718
Extended Fuzzy Description Logics......Page 719
Concept and Role Constructors......Page 720
Extended Fuzzy Description Logic Knowledge Bases......Page 721
Cut Links Between Two Knowledge Bases......Page 722
Reasoning Issues......Page 723
References......Page 724
Introduction......Page 726
Set of Experience Knowledge Structure......Page 727
Similarity......Page 728
Similarity Metrics for Sets of Experience Knowledge Structure......Page 730
Functions......Page 731
Conclusion......Page 732
References......Page 733
Introduction......Page 734
Hierarchical Consortium Model......Page 735
Integrated (Structural) Project Team Model......Page 737
Conclusions......Page 739
References......Page 741
Introduction......Page 742
Standardization Focused on Steel Detailing Design: CIS/2 LPM/6......Page 743
Knowledge Representation Using Ontologies – The OWL Approach......Page 744
Modules Description......Page 745
Tool 1 – Parts Generation and Verification from FEA (Finite Element Analysis) Results......Page 746
Tool 2 – Semantic Visualization of the CAD Model in Virtual Reality......Page 747
Conclusions and Acknowledgements......Page 748
References......Page 749
Introduction......Page 750
Classification......Page 751
Process of Aggregation......Page 753
Criteria of Aggregation......Page 754
Aggregation Strategies......Page 757
References......Page 759
Introduction......Page 761
Measures......Page 762
Conceptualization of Topological Relationships......Page 763
Topological Description......Page 764
Experimental Results......Page 766
References......Page 767
Problem Statement......Page 769
Efficient Analysis and Generation of Pitch Sequences......Page 770
Efficient Analysis......Page 771
Local Optimization......Page 772
Test Cases......Page 773
Conclusion......Page 775
Introduction......Page 777
Rough Set Concepts......Page 778
Algorithms......Page 779
Clinical SARS and Coronary Heart Disease Data Experiments......Page 780
Conclusions and Discussions......Page 781
References......Page 782
Introduction......Page 783
Materials......Page 784
Methods......Page 785
Results and Discussion......Page 786
Conclusions......Page 789
Introduction......Page 791
Protein Ontology Conceptual Framework......Page 792
Comparing GO and PO......Page 794
Mining Facilitated by Protein Ontology......Page 797
References......Page 799
The Definition of Complex Ontology Mapping......Page 801
The Ontology Fusion Mechanism......Page 803
Comparison with Related Works......Page 806
Discussion and Conclusion......Page 808
Introduction......Page 809
Adaptive QoS Issues......Page 810
Service Framework......Page 811
Strategies for Adaptive QoS......Page 812
Architecture......Page 813
Conclusion......Page 814
Introduction......Page 816
Related Works......Page 817
Multi-dimensional Information Browsing......Page 818
Liquid Browsing and Service Migration......Page 820
Integrated Retrieval of Heterogeneous Multimedia Resources......Page 821
Multimedia Information Browser......Page 822
References......Page 824
Related Work......Page 826
System Architecture......Page 827
Model Induction......Page 828
Hyperlink Recommendation......Page 829
Evaluation......Page 831
Conclusions and Future Work......Page 833
Introduction......Page 834
Temporal Learner Model......Page 836
Domain Knowledge and Exercise Knowledge......Page 837
Overview of Proposed System......Page 838
Permanent Learner Model......Page 839
Experiment......Page 840
Conclusion......Page 841
References......Page 842
Introduction......Page 843
Metadata......Page 844
Fuzzy Instructional Model......Page 845
User Model......Page 846
Intelligent Tutoring Planning......Page 848
Application Example......Page 849
References......Page 850
Introduction......Page 851
Regulation and Components of the KSSL......Page 852
Input Module of the KSSL......Page 853
Training and Recognition Models Using RDBMS......Page 854
Fuzzy Max-Min Module for the KSSL Recognition......Page 855
Experiments and Results......Page 856
Conclusions......Page 859
References......Page 860
Introduction......Page 861
Regulation of the KSSL......Page 862
In-put Module of the KSSL and Recognition Models Using RDBMS......Page 863
The KSSL Recognizer Using Fuzzy Max-Min Composition......Page 865
Integration Architecture of Speech and Gesture for MMRI......Page 867
Experiments and Results......Page 868
Conclusions......Page 869
References......Page 870
Introduction......Page 871
Decorrelating Properties of AP and SAF......Page 872
Subband Affine Projection Algorithm......Page 874
Simulations......Page 876
Conclusions......Page 878
Introduction......Page 880
Binary-Tree Structured Filter Banks......Page 881
Noise Cancelling Technique......Page 882
Simulations......Page 884
FPGA Implementations......Page 885
Conclusions......Page 887
Introduction......Page 888
Data Pre-processing......Page 890
Feature Extraction/Selection......Page 891
Results and Discussion......Page 892
Introduction......Page 896
SIRM Fuzzy Controller......Page 897
Neural Network......Page 898
Adaptive Tabu Search......Page 899
Results and Discussions......Page 900
References......Page 903
Introduction......Page 904
Current Mode Fuzzy Gain Scheduling of PI Controller......Page 905
Simulation and Experimental Results......Page 909
References......Page 911
Introduction......Page 913
OR and AND Fuzzy Neurons......Page 914
SURFCon and Its Two-Step Optimizations......Page 915
Experimental Results......Page 917
Conclusions......Page 919
References......Page 920
Introduction......Page 921
Robot Model and Problem Statement......Page 922
Robust Control......Page 923
Experimental Results......Page 925
References......Page 928
Introduction......Page 929
Limit-Cycle......Page 930
Setting Occupancy Box......Page 931
The Limit-Cycle Navigation Method Using Occupancy Boxes......Page 932
Vector Field Method for Navigation Scheme......Page 933
Simulation......Page 934
Experiment......Page 935
References......Page 936
Introduction......Page 937
Knowledge-Based Approach for Robot Security......Page 938
Security-Aware Robot Control Model......Page 939
Knowledge-Based Security Architecture......Page 940
Security Policy Implementation and Policy-Base Development......Page 941
Implementation......Page 942
A Case Study on Netfilter/Iptables......Page 943
Summary and Outlook......Page 944
Structure of the Humanoid Robot......Page 945
Structure of the Proposed System......Page 946
Word Knowledge-Base About Action......Page 947
Unknown Word Processing......Page 948
Dynamic Generation of Joint Parameters......Page 950
Conclusions......Page 951
References......Page 952
Introduction......Page 953
Dynamic Localization......Page 954
Position Estimation Using Extended Kalman Filter......Page 957
Experiments......Page 959
References......Page 960
Introduction......Page 961
Interface Device Between POS and Fingerprint Identification System......Page 962
Fingerprint Registration and Matching Procedure......Page 963
Algorithm of Credit Dealing System......Page 965
Operating Results......Page 966
Conclusion......Page 967
References......Page 968
Introduction......Page 969
Authentication Scenarios......Page 971
Performance Evaluation of Three Scenarios......Page 974
Scenario 2, Extraction by the Client and Matching by the Server......Page 975
Summary of Performance Evaluation......Page 976
Conclusions......Page 977
References......Page 978
Introduction......Page 979
2-Party Choe-Kim Scheme......Page 980
3-Party Choe-Kim Scheme......Page 981
Server-Impersonation Attack on 2-Party Scheme......Page 982
Server-Deception Attack on 3-Party Scheme......Page 983
Implementation Scenarios......Page 984
Conclusion......Page 985
Introduction......Page 987
Mobile RFID Technology......Page 988
Privacy on Mobile RFID Services......Page 989
Service Architecture Model for Secure Mobile RFID Network......Page 990
Phone-Based Mobile RFID Middleware System......Page 991
Security Enhanced Mobile RFID Middleware System......Page 992
Mobile RFID Privacy Protection Service......Page 994
Secure Mobile RFID Information Service System......Page 995
Conclusion......Page 996
References......Page 997
Introduction......Page 998
Overall Architecture for 16 Rounds......Page 999
The Subcomponents for One Round......Page 1000
Strict Avalanche Criterion......Page 1001
Differential Cryptanalysis......Page 1002
Linear Cryptanalysis......Page 1003
References......Page 1004
Introduction......Page 1006
Learning Content Module......Page 1007
Domain Knowledge Module......Page 1008
Tutor......Page 1009
Operator Model......Page 1011
Operator Interface......Page 1012
References......Page 1013
Introduction......Page 1014
Genetic Algorithms Using QCX or the Quadratic Crossover Operator......Page 1015
Mathematical Model of the Air Defence Problem......Page 1018
Numerical Results and Conclusions......Page 1020
References......Page 1021
Introduction......Page 1023
Operation of e-Shop System and Customer Data Description......Page 1024
AIS-Based Customer Data Clustering Algorithms......Page 1026
Comparison of Customer Data Clustering Algorithms and Conclusions......Page 1028
Introduction......Page 1031
System Architecture......Page 1032
The Evolution Process......Page 1033
The Genetic Algorithm......Page 1034
System Evaluation......Page 1036
Conclusions......Page 1037
References......Page 1038
Introduction......Page 1039
Gene Expression Microarray Data Preprocessing......Page 1040
Gene Selection Methods......Page 1041
Experimental Design and Methodology......Page 1042
Experimental Results and Discussions......Page 1043
Conclusions......Page 1044
Introduction......Page 1047
Locally Targeted Mobile Web Search in Telematics......Page 1048
Personalized Local Web Search in Telematics......Page 1049
Examples of Query......Page 1051
Personalized Ranking Algorithm Based on the PI......Page 1053
References......Page 1054
Introduction......Page 1055
Time Series Data Patterns......Page 1056
Price Pattern Search......Page 1057
Generalization of Patterns......Page 1058
Buying Point Recommendation......Page 1059
Experiment Environment......Page 1060
Goods Recommendation System......Page 1061
Buying Point Recommendation Agent Module......Page 1062
References......Page 1063
Sensuous Judgment System......Page 1065
Sensuous Judgment Knowledge Base......Page 1066
Calculation of the Degree of Association......Page 1067
Simple Sensuous Association Method from Combination of Nouns and Adjectives/Adjectival Equivalents......Page 1068
Evaluation of Simple Sensuous Association Method......Page 1069
Setting a Threshold Value......Page 1070
Evaluation of Sensuous Association Method......Page 1071
References......Page 1072
Introduction......Page 1074
Context Information......Page 1075
System Description......Page 1076
The Scenario for the Bowling Game......Page 1077
Accelerometer Signal Analysis for the Bowling Action......Page 1078
Posture Estimation......Page 1079
Implementation......Page 1080
Experimental Results......Page 1081
References......Page 1082
Introduction......Page 1084
Role-Task Model for Advanced Service Navigation......Page 1086
Proposed Role-Task Model......Page 1087
Flow of Service Navigation Based on Role-Task Model......Page 1088
Comparison Between Query, Place and Role-Based Service Navigation......Page 1089
Conclusion......Page 1090
Basic Concepts of Discretization and Rough Set Theory......Page 1092
Several Experimental Results......Page 1094
Discussions......Page 1098
References......Page 1099
Introduction......Page 1100
PV-Graph for 1D Forecasting Search......Page 1101
PV-Graph for 2D Forecasting Search......Page 1102
PV-Graph for Moving Region Search......Page 1103
Analysis and Conclusion......Page 1104
Introduction......Page 1106
LB-Scan......Page 1107
Extension of the Prefix-Querying Method......Page 1108
Performance Evaluation......Page 1111
Conclusions......Page 1112
Background......Page 1114
Multi-resolution Analysis of Numeric DNA Sequence......Page 1115
Intrinsic Energy Based Wavelet Decomposition Technique for Genomic Sequences......Page 1117
References......Page 1120
Introduction......Page 1122
Selfish Routing......Page 1123
Model of Door-to-Door Transportation......Page 1125
Selfishness on Door-to-Door Transportation......Page 1126
Conclusion......Page 1128
Introduction......Page 1130
Fault-Tolerant Cluster Management Tool......Page 1131
Intelligent Fail-Over Mechanism......Page 1133
Implementation and Performance Analysis......Page 1135
References......Page 1137
Introduction......Page 1138
DC Motor Driven by DC-DC Converter......Page 1139
The Unified Large-Signal Model for DC-DC Converter......Page 1140
The Averaged DC Motor Drive System......Page 1142
Neuro-PID Speed Controller for Averaged DC Motor Drive System......Page 1143
References......Page 1145
Introduction......Page 1146
Using a Knowledge Based System to Detect SLS Violations......Page 1147
The Monitoring System Architecture......Page 1148
Implementation......Page 1149
Example of an SLS Violation Scenario......Page 1150
Conclusion......Page 1151
Introduction......Page 1153
Background of TLDP Algorithm......Page 1154
Architecture of First Level DP......Page 1155
Architecture of Second Level DP......Page 1157
Conclusion......Page 1159
Introduction......Page 1161
The TRIZ Components......Page 1162
The TRIZ Problem Solving Approach......Page 1163
The Domain Layer......Page 1164
The Inference Layer......Page 1165
The Task Layer......Page 1166
Conclusions......Page 1168
The Characteristics of the Chinese Apprenticeship......Page 1169
The Employees’ Quality in the New Economy Times......Page 1171
The Effect of the “5P” Apprenticeship......Page 1172
Quantitative Analysis......Page 1173
References......Page 1177
Introduction......Page 1178
A 2D Representation of Fuzzy Reasoning......Page 1179
A 2D Representation of CBR and SBR......Page 1180
A Unified 2D Representation of EBR......Page 1182
Concluding Remarks......Page 1184
References......Page 1185
Motivation......Page 1187
Preliminaries......Page 1188
Semi-Approximation MBR......Page 1189
Analysis of the Number of Node Accesses......Page 1190
Experimental Results......Page 1191
Conclusion......Page 1192
References......Page 1193
Introduction......Page 1194
Annotation to Capture Experience......Page 1195
Scenario-Based Requirements......Page 1196
Supporting Interpretation......Page 1197
Ant&Cow......Page 1198
Conclusion......Page 1199
References......Page 1200
Introduction......Page 1202
Related Works......Page 1203
Broadcast Organization and Cell Index Structure......Page 1204
Range Query Processing......Page 1206
Performance Evaluation......Page 1207
Conclusion and Future Work......Page 1208
Introduction......Page 1210
Graph Structured Fuzzy System......Page 1211
Generation of Fuzzy Systems by L-Systems......Page 1213
Genetic Operations......Page 1214
Simulation and Results......Page 1215
Conclusion......Page 1217
Introduction......Page 1218
Preliminary......Page 1219
Cache Management Scheme......Page 1220
System Parameter and Scenario......Page 1222
Experiments......Page 1223
Conclusion and Future Work......Page 1224
Introduction......Page 1226
u-Edutainment and Its Framework......Page 1227
m-Learning Edutainment......Page 1228
r-Learning Edutainment......Page 1229
v-Learning Edutainment......Page 1230
c-Learning Edutainment......Page 1231
References......Page 1232
Introduction......Page 1234
Traces for Reflexivity in Computer Mediated Activity......Page 1235
Traces for Experience Sharing and Reusing......Page 1236
Towards a Trace-Based System Framework for EME......Page 1237
Traces and Traces-Models......Page 1238
Traces-Based System Architecture......Page 1239
Conclusion......Page 1240
References......Page 1241
Introduction......Page 1242
Image Data......Page 1243
Image Processing......Page 1244
Results and Discussion......Page 1247
Conclusions......Page 1248
Results and Discussion......Page 1249
Further Work......Page 1250
References......Page 1251
Introduction......Page 1253
Molecular Sequence Alignment......Page 1254
The Smith-Waterman Alignment Algorithm......Page 1255
Ranking Locations from Google Snippets......Page 1256
Results......Page 1258
Conclusions and Further Work......Page 1259
Introduction......Page 1261
Pistons Measurement Points Selection......Page 1262
Experimental Results on the Sampling Points......Page 1263
Temperature Field Principle Using FEA......Page 1264
Boundary Condition......Page 1265
FEA Simulation Results......Page 1266
Concluding Remarks......Page 1267
Introduction......Page 1269
Pure Fuzzy Logic Model......Page 1270
The Case Studies......Page 1271
Case Study 1: Fuzzy and Neuro-fuzzy Modelling......Page 1272
Case Study 2: Engine Fuel Injection Control Using Fuzzy Logic......Page 1274
References......Page 1277
Introduction......Page 1279
Overview of Related Work......Page 1280
Application of Clustering in Data Matching......Page 1281
Digram Clustering......Page 1283
Evaluation Metrics......Page 1284
Experimental Results......Page 1285
Discussion of Results and Conclusions......Page 1286
References......Page 1287
Introduction......Page 1289
Image Processing......Page 1290
Feature Extraction......Page 1291
Normalisation of Extracted Data......Page 1292
Input Data Analysis......Page 1293
Neural Output Analysis......Page 1294
Conclusions......Page 1295
References......Page 1296
Governance......Page 1297
Integrated Framework for Security Governance......Page 1300
Conclusion......Page 1301
References......Page 1303
Introduction......Page 1305
Received Beacon Signal Level and Rain Rate......Page 1306
Proposed of Prediction Model......Page 1308
Conclusions......Page 1311
References......Page 1312
Introduction......Page 1313
Security Engineering in Ubiquitous Computing Environment......Page 1314
Proposed Model......Page 1315
Applying to RFID Service Network......Page 1317
Conclusion and Further Works......Page 1320
References......Page 1321
Introduction......Page 1322
Value-Creating in Technical Aspect......Page 1323
Business Value-Creating in Technology Environment......Page 1325
References......Page 1329
Introduction......Page 1330
Scenario 1......Page 1331
Scenario 2......Page 1332
Processes in the Scenario......Page 1333
Analysis of the Business Model......Page 1336
Conditions for Working the Business Model......Page 1337
Which RFID Can Be Used?......Page 1340
System Architecture......Page 1342
Comparison with the Related Works......Page 1343
References......Page 1345
Back matter......Page 1347