By Topic

The Fifth International Conference on Computer and Information Technology (CIT'05)

Date 21-23 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 205
  • The Fifth International Conference on Computer and Information Technology - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • The Fifth International Conference on Computer and Information Technology - Title Pages

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • The Fifth International Conference on Computer and Information Technology - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • The Fifth International Conference on Computer and Information Technology - Table of contents

    Publication Year: 2005, Page(s):v - xix
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (60 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Organization

    Publication Year: 2005, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • The Birth, Evolution and Future of the Microprocessor

    Publication Year: 2005, Page(s): 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Web Service Interactions: Analysis and Design

    Publication Year: 2005, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Protein Structure Prediction and Interpretation with Support Vector Machines and Decision Trees

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Study on Optimized Bandwidth Selection Approach of Drifting Learning

    Publication Year: 2005, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Drifting learning (DL) is an effective method to solve the regression problem in the field of data mining. The approach is established based on the combination of Local Weighted Learning (LWL) algorithm and statistical learning theory (SLT). It is shown from the theoretic analysis and simulation that better performance on estimation precision and generalization ability than the traditional methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SVM and Classification Ensembles based High-voltage Transmission Line Fault Diagnosis

    Publication Year: 2005, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    This paper analyzes the inner mechanism of basic methods for high-voltage transmission line (HTL) fault diagnosis, and proposes the new SVM based HTL diagnosis models, which has the characteristic of good generalization. We also put forward the neural network ensembles model and multiple kinds of classifiers ensembles model based on the technology of classifier ensembles. These models can further ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Support Vector Machine for Multi-class Classification

    Publication Year: 2005, Page(s):18 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Support vector machines (SVMs) for classification - in short SVC - have been shown to be promising classification tools in many real-world problems. How to effectively extend binary SVC to multi-class classification is still an on-going research issue. In this article, instead of solving quadratic programming (QP) in algorithm K-SVCR and algorithm nu-K-SVCR, a linear programming (LP) problem is in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting the Flow of Data Packets in Web Using ANFISCH Predictor Tuned by Segmented Adaptive Support Vector Regression

    Publication Year: 2005, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    This study introduces a fast and accurate non-periodic short-term predictor, ANFISNCH, as a specified Web services for forecasting the flow of data packets between server and clients. Even though ANFIS is a fast fuzzy inference or predictor, the phenomenon of volatility clustering always generates the extreme outliers embedded in the training data set because of the effect of nonlinear conditional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Quantitative Study of the Effect of Missing Data in Classifiers

    Publication Year: 2005, Page(s):28 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    In data mining approaches, predictive classification has a wide range of application. However, there are always missing data in the datasets, which affect the accuracy of classifiers. This paper investigates the influence of missing data to classifier. The sensitivity analysis of six classifiers to missing data is studied in experiments. The results indicate that, in the datasets, when the proport... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Sketch Recognition and Query Interpretation by GSQL, aGeographical Sketch Query Language

    Publication Year: 2005, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Geographic information is intrinsically spatial and it can be conveniently represented using a bi-dimensional space. Graphical user interfaces and visual languages can be used to satisfy this need. However the growing availability of sketching enables the users to have a more informal and natural approach in the interaction. For this reason this paper presents GSQL (geographical sketch query langu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rule Reasoning Method and Its Application

    Publication Year: 2005, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    In this paper we present a rule reasoning method, which is based on rough sets theory, for inducing rules from examples. The key idea of the method is that it combines a criterion of the dependency degree of attributes with decision makers' priori knowledge to select attributes of objects. Especially, it uses a compound weights algorithm to perform a proper reduction owing to several reductions th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial QBE Interface for Web GIS

    Publication Year: 2005, Page(s):44 - 48
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Many applications use geographic data, such as land management, urban planning, tourism, vehicle guidance and navigation, and e-commerce. A related research problem is to define user-friendly interfaces for Web GIS. There is a need for the definition of simple and user-friendly interfaces to allow the users to pose ad-hoc queries. Query-by-example (QBE) is a user-friendly language developed for a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case Study: Distance-Based Image Retrieval in the MoBIoS DBMS

    Publication Year: 2005, Page(s):49 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Similarity search leveraging distance-based index structures is increasingly being used for complex data types. It has been shown that for high dimensional uniform vectors with similarity norms, any clustering and partitioning index method is outperformed by sequential scan. However, intrinsic clustering of real data usually leads to low intrinsic dimensionality. MoBIoS (the molecular biological i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-blocking Disk-Tape Join Algorithm for Data on Tertiary Storage Systems

    Publication Year: 2005, Page(s):58 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Massive data accumulated by business or scientific applications have reached such a great amount that they can be accommodated only on tapes. In order to make full use of these data, tools of data analysis and data mining should be developed. In such applications, disk resident data are needed to join with tape resident data. Many disk-tape join methods have been proposed, examples are CDT-NB and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Tracking Data Derivation in Information Systems

    Publication Year: 2005, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Modern enterprises are becoming increasingly dependent upon the data produced from information systems to support their operations. So the knowledge of how such data are derived is vitally important to them. Unfortunately, as the systems evolve, their functionality tends to become more complex and associated documentation less reliable. Consequently, accurate knowledge of data derivation cannot al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Indexing Method for Approximate Search in Text Databases

    Publication Year: 2005, Page(s):70 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    We present an index structure to support the approximate keyword search in text databases. In an approximate keyword search query, the user presents a query word Q and a tolerance value k (kges0), and wishes to find all documents in the database that contain the query word Q or any other word in the vocabulary that matches Q approximately (We say that two words match each other approximately if th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage and Query over Encrypted Character and Numerical Data in Database

    Publication Year: 2005, Page(s):77 - 81
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    There is some private and sensitive data in database, which need to be protected from attacking. In order to reinforce the security of data, an effective mechanism, cryptographic support has been widely used. However, we must make a tradeoff between the performance and the security because encryption and decryption greatly degrade the query performance. To solve such a problem, a novel approach is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling FD and MVD Inferences in MLS

    Publication Year: 2005, Page(s):82 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    In today's information society, privacy protection has become a very important concern. In this paper we research the inference problems due to functional dependencies (FD) and multi-valued dependencies (MVD) in multilevel secure database (MLS) with element classification instances. To deal with the secure problem brought by inference channels we present our FD and MVD based inference control algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure Learning Based on Ordering of Sets

    Publication Year: 2005, Page(s):88 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    When learning Bayesian networks from data, in many real circumstances, experts of domains could give the relationships between the classes of variables. In this paper, the problem of `learning Bayesian networks based on ordering of sets' is formulated. To solve this problem, we propose a partitioned greedy search algorithm for learning structures of Bayesian networks based on the ordering of sets.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.