By Topic

2008 International Conference on Internet Computing in Science and Engineering

Date 28-29 Jan. 2008

Filter Results

Displaying Results 1 - 25 of 112
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Sufficient Conditions for Absolute Stability and Optimization Using Genetic Algorithms of Specific Class of Fuzzy Logic Controllers

    Publication Year: 2008, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    This paper has proposed Specific class of single input single output (SISO) Mamdani fuzzy logic proportional controllers (FLPC) with triangle input membership functions, output membership functions with the same area, the sum-product composition rule for inference and centroid of area defuzzifier for control of both stable and unstable SISO linear time invariant systems. The proposed FLPC in fact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Meta-Search Engine Merge Algorithms

    Publication Year: 2008, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The result integration algorithm is the core of mete-search engine. This paper focuses on evaluating the integration algorithms of meta-search engine, and compares meta-search engine to the general search engine by experiments. An experiment method to determine the priority of participant of meta-search engine is also proposed. The experiment result proved that the meta-search engine could get hig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous Computing in Financial Forecast and Early Warning

    Publication Year: 2008, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Establishing reliable financial forecast and early warning systems is important to protect economy from the financial crisis and to weaken its influences. In order to implement forecast and early warning of complex system by use of simple models, we presented a lag-cointegration method which obtained good result for CPI forecast. For the purpose of information sharing, we developed a new system wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Content-Based Algorithm for Blog Ranking

    Publication Year: 2008, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Due to the different structure and content character of blogs, the traditional ranking algorithm of Web page turns to be insufficient. To solve this problem, a novel ranking algorithm of blog is presented. The algorithm considers both the link analysis and the content analysis of the blog, It helps mining more implicit features of blog, such as common topics, to improve the satisfaction of the use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Realization of Random Encryption Algorithm

    Publication Year: 2008, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true random sequence, thus it ensures data security. Experiments show that the algorithm has many characteristics: understanding easily, practicality, encrypting faster, increasing the difficu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Invalidation Cache Model Based on Ant Colony Algorithm in Mobile Databases

    Publication Year: 2008, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    Mobile databases are always the core technique of the dynamic data management. Cache technique, as one of the key techniques in mobile databases, is able to reduce the contention of bandwidth and save the power energy. As the character of ant colony algorithm is choice, update, cooperation mechanism, which is accorded with the mobile agent. An invalidation cache model based on ant colony algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Potential Target Traversing Detection Algorithm Based on Voronoi Diagram

    Publication Year: 2008, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    In a wireless sensor network, sensors are scattered randomly by aircraft or rocket ejection. On account of scattered randomness, there may be sparse areas of sensors, in which, sensors cannot detect every hole and corner. Aimed at the region coverage, from another profile, the paper analyses and explains that the randomness of sensor scattered and the limitation of sensor monitor capability lead t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Inverse Protein Folding Process by Artificial Life Approaches

    Publication Year: 2008, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    We discuss general implications of artificial life approaches to protein folding which makes an attempt at simulating the actual folding process rather than just trying to predict its final result. A new inverse folding method is presented that tries to determine the unknown proteins from tertiary structure to protein sequence by model the folding process. The method of protein inverse folding is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Simulating Protein Folding Process -- Snake Algorithm

    Publication Year: 2008, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    It is a difficult problem of studying the protein folding process in the protein research field. In this paper, a new simulation algorithm-snake simulation algorithm is put forward to solve the problem. In order to prove the key function in snake simulation algorithm is correct and feasible, theory of molecule oscillation and molecule kinetics are used. In addition, bring forward a model that desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Hierarchial Fuzzy Behavior Learning of Autonomous Robot

    Publication Year: 2008, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Aiming at the changing and dynamic unstructured environments of autonomous robot, this paper analyses these kinds of effects on robot in details and thus presents a local plan architecture based on hierarchical fuzzy logic to implement the basic navigation behaviors and the coordination between these behaviors to produce a type-2 hierarchical fuzzy logic control. The problem is solved that the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Morphological Method for Clutter Elimination to Enhance and Detect Infrared Small Target

    Publication Year: 2008, Page(s):47 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (955 KB) | HTML iconHTML

    To overcome the affection of heavy clutter and dim target intensity on small target detection, an efficient morphological method through clutter elimination is proposed. The proposed adaptive method imports the property of the target region into the morphological operations, which apparently improves the performance of the method and can largely enhance the dim small target. So, the target can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Mathematical Formula Recognition Method Base on Baseline Structure Analysis

    Publication Year: 2008, Page(s):53 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    As a long time, the mathematical formula recognition has become one important problem in OCR research field, how to recognize the formula in magazine or book exactly and quickly has become one difficult task. In general, the formula recognition problem could be divided into character segmentation and structure analysis two stages. In this paper, the whole recognition process was studied in detail,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimal Condensed Cube: Data Organization, Fast Computation, and Incremental Update

    Publication Year: 2008, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    The condensed cube has been proposed to reduce the huge size of data cubes in OLAP system. The intuition of condensed cube is to compress semantically redundant tuples into their representative base single tuples (BSTs). However, previous studies showed that a minimal condensed cube is expensive to compute, and thus mainly concentrated on alternative computation methods for non-minimal condensed c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Discovery of Attribute Feature Cluster for Any Clustering Result Based on Outlier Detection Technique

    Publication Year: 2008, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    The comprehension of the clustering result is a problem that hasn't yet resolve, which having important meaning to the usage of the cluster result and the evaluation of the cluster effect. We put forward the method discovering attribute feature cluster for any clustering result based on outlier detection technique, and put forward an outlier detection algorithm based on even distribution pattern. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting Day Ahead Spot Electricity Prices Based on GASVM

    Publication Year: 2008, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Price is the key index to evaluate the market competition efficiency and reflects the operation condition of electricity market for electricity market decision-making. This paper illustrates the characteristics and methods of the electricity price forecast. In this article, we forecast electricity spot prices at a daily frequency based on one new classification techniques: genetic algorithm improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Clustering Algorithm for Prefix-Coded Data Stream Based upon Median-Tree

    Publication Year: 2008, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In actual data streams, there are lots of prefix-coded data, which widely existed in applications. What leads to non-ideal performance and clustering result is that the special treatment of these prefix-coded data structure is not considered in traditional clustering algorithm. To deal with this problem, a new concept of median-tree as well as a method of calculating the coding distance is propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICAIS: A Novel Incremental Clustering Algorithm Based on Artificial Immune Systems

    Publication Year: 2008, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Although many kinds of clustering algorithms are proposed, there has been much less work on the incremental clustering. Inspired by the artificial immune systems, the authors apply it to the incremental clustering, propose a novel incremental clustering algorithm called ICAIS. The algorithm mainly uses the mechanism of immune response of the adaptive immune system. The primary immune response corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A ROI-Based Mining Method with Medical Domain Knowledge Guidance

    Publication Year: 2008, Page(s):91 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Image mining is a growing research focus and is more than just an extension of data mining to image domain but an interdisciplinary endeavor. Very few people have systematically investigated this field. Mining association rules in medical images is an important part in domain- specific application image mining because there are several technical aspects which make this problem challenging. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.