By Topic

2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)

Date Nov. 28 2006-Dec. 1 2006

Filter Results

Displaying Results 1 - 25 of 234
  • International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce - Table of contents

    Publication Year: 2006, Page(s):v - xxii
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Message from the Program and Organizing Chair of CIMCA 2006

    Publication Year: 2006, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (131 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program and Organizing Chair of IAWTIC 2006

    Publication Year: 2006, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (131 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Hybrid Inductive Learning-based Scheduling Knowledge Acquisition Algorithm

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    It is a crucial issue that constructing a successful knowledge base to satisfy an efficient adaptive scheduling for the complex manufacturing system. Therefore, a hybrid inductive learning-based scheduling knowledge acquisition algorithm is presented in this paper. We combined genetic algorithm (GA) with simulated annealing (SA) to develop a hybrid optimization method, in which GA was introduced t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Approach for Fault Diagnosis based on Multilevel Flow Models and Artificial Neural Network

    Publication Year: 2006, Page(s): 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Proper and rapid identification of malfunctions is of premier importance for the safe operation of nuclear power plants (NPP). Many monitoring or/and diagnosis methodologies based on artificial and computational intelligence have been proposed to aid operator to understand system problems, perform trouble-shooting action and reduce human error under serious pressure. However, because no single met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Genetic Neuro-Model Reference Adaptive Controller for Petroleum Wells Drilling Operations

    Publication Year: 2006, Page(s): 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Motivated by rising drilling operation costs, the oil industry has shown a trend towards real-time measurements and control. In this scenario, drilling control becomes a challenging problem for the industry, especially due to the difficulty associated to parameters modeling. One of the drill-bit performance evaluators, the rate of penetration (ROP), has been used in the literature as a drilling co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neuro-fuzzy Learning Applied to Improve the Trajectory Reconstruction Problem

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    This paper presents the application of a neuro-fuzzy learning approach to classify air traffic control (ATC) trajectory segments from recorded opportunity traffic. This method learns a fuzzy system using neural-network theory to determine its parameters (fuzzy sets and fuzzy rules) by processing data samples. The problem is prepared for analysing the Markov-chain probabilities estimated by an inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Process Control - A Neuro-Fuzzy Approach in Intelligent Workflow Model Based on Extended Petri Nets

    Publication Year: 2006, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    With business applications going toward collectivization and internationalization, many researchers have focused their attention on intelligent workflow for inter-organizational cooperation. This paper mainly introduces a neuro-fuzzy approach for the realization of intelligent workflow management systems (WfMSs). The formal model of intelligent workflow is called intelligent neuro-fuzzy extended P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serving Text-Mining Functionalities with the Software Architecture Plato

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    As information systems are dealing with a growing amount of unstructured text information, text mining technologies and their corresponding software tools have become increasingly widespread. However, text mining is still a young discipline that is starting to witness the advent of flexible, robust, and general software architectures that leverage the abundance of research results in benefiting ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research for Web Usage Mining Model

    Publication Year: 2006, Page(s): 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    Web usage mining is a kind of data mining that it mines the information of server logs after users browse the Web pages. After introducing the staple technology and process of Web usage mining, the article advances an architecture of Web usage mining and presents the work principle of system. In addition, the article discusses some key technologies in system design such as session identification a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrospective Analysis for Mining the Causes in Manufacturing Processes

    Publication Year: 2006, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    There has been a considerable growth in the use of statistical process control (SPC) for improving the quality in business, industries, or software development since the last decade. However, the processes are growing much more complex, and there is a tremendous increase of data size owning to the use of automated record machine. The conventional SPC tools become less effective in analyzing and id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Elicitation in Precise and Imprecise Domains - A Comparative Study, Sweden and Brazil

    Publication Year: 2006, Page(s): 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    This paper presents a comparative study between two groups from different cultural contexts, Sweden and Brazil, when choosing among risky prospects. The study explores whether there are differences in choice behaviours when the uncertainty in the prospects is expressed as interval estimates instead of the traditional use of point estimates, as well as when prospects are displayed with and without ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Layer Definition and Analyses of Controller Area Network Bus for Wire Harness Assembly Machine

    Publication Year: 2006, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    With the feature of multi-master bus access, nondestructive contention-based arbitration and flexible configuration, controller area network (CAN) bus is applied into the control system of wire harness assembly machine (WHAM). To accomplish desired goal, the specific features of the CAN bus is analyzed by compared with other field buses and the functional performances in the CAN bus system of WHAM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ACO-based Approach to Improve C-means Clustering Algorithm

    Publication Year: 2006, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    This paper presents an improved C-means clustering algorithm based on ACO. The proposed method use pheromone to evaluate individual colony's iterative result. In contrast with the existing C-means clustering algorithm, method in the paper need not appoint the number and pre-centers of clusters beforehand and it updates pheromone according to the transfer process of data points among different temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Series Prediction Using Nonlinear Support Vector Regression Based on Classification

    Publication Year: 2006, Page(s): 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In this paper, an introduction of traditional time series prediction model using SVM has been first given, and then followed by description of a new network training algorithm and a nonlinear regression algorithm of support vector machine which are based on classification. Compared with traditional SVM regression algorithm, CSVR algorithm is less sensitive and more robust. It is another advantage ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction of the Communication Traffic for Multi-word Searches in DHTs

    Publication Year: 2006, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4205 KB) | HTML iconHTML

    In large-scale wireless networks, efficient file searching mechanisms are essential for users. Many studies have been done on a distributed hash tables (DHTs) which are one kind of peer-to-peer system. In DHT networks, we can certainly and effectively get the desired files if they exist. However, much communication traffic comes from multi-word searches. If we increase the storage redundancy, we c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of Lost Data in Virtual Control System with Networked Sensors

    Publication Year: 2006, Page(s): 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3236 KB) | HTML iconHTML

    In majority of the control applications, individual sensors, or dedicated 'loop controllers', are hooked to the central control room directly through some kind of a bus or data highway. Virtual control system (VCS) paradigm assumes a virtual controller (control room), existing in a virtual network space, but with real endpoints. The real endpoints are realized with network connected sensors and ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology for UML Modeling and Formal Verification of Real-Time Systems

    Publication Year: 2006, Page(s): 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    In the paper, we present a methodology developed in order to verify probabilistic timed properties related to dependability of real-time systems. The methodology is made of three essential steps. The first one is a UML profile called DAMRTS (dependability analysis models for real-time systems) designed using GME tool. The aim is to model a real-time system with qualitative and quantitative informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Divisive Hierarchical K-Means

    Publication Year: 2006, Page(s): 18
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    This paper focuses on clustering methods for content-based image retrieval CBIR. Hierarchical clustering methods are a way to investigate grouping in data, simultaneously over a variety of scales, by creating a cluster tree. Traditionally, these methods group the objects into a binary hierarchical cluster tree. Our main contribution is the proposal of a new divisive hierarchy that is based on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smartive: Agreement-based Mobile Composite Agents for Multimedia Services

    Publication Year: 2006, Page(s): 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    This work considers encapsulation of multimedia contents as services, and their autonomous provision and distribution by agents. This approach enables content providers to have their contents provided and distributed together with their own business logics regarding interaction with other services and contents, control logic for various options upon provision, and value-added services. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research and Application on Business Tier Based on J2EE

    Publication Year: 2006, Page(s): 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    After analyzing and researching on management system's specific business in logistic enterprises based on J2EE model, this paper proposes the design scheme of business tier with the ideology of design pattern, makes more reasonable design and improvement to abstract domain model from the business tier in maximum, resultingly the whole system is more flexible, expandable and reusable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved FSM Method for Web-based Applications

    Publication Year: 2006, Page(s): 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Functional size measurement (FSM) methods are intended to measure the size of software by qualifying the functional user requirements of the software. COSMIC-FFP is a common ISO-standardized FSM method. According to the dynamic characteristic of Web-based applications, this paper presents a COSMIC-FFP-like method to measure the functional size of Web-based applications. Through experiment, it is p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.