By Topic

2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications

Sept. 28 2008-Oct. 1 2008

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3248 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2008, Page(s):iii - iv
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2008, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • BIC-TA 2008 Organisation

    Publication Year: 2008, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Abstracts of invited presentations

    Publication Year: 2008, Page(s):5 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the power of endocytosis and exocytosis

    Publication Year: 2008, Page(s):7 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    Summary form only given. Endocytosis is the process of moving items that are outside of the cell into the cytoplasm of the cell. Exocytosis is the process of moving items from the cytoplasm of the cell to the outside of the cell. These processes are abstracted by systems of mobile membranes. In my talk I will discuss the modelling and computational power of mobile membranes. First I will show how ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social interaction is a powerful optimiser: The particle swarm

    Publication Year: 2008, Page(s):9 - 10
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    The particle swarm algorithm helps computer scientists and engineers solve hard problems, and also suggests insights into the computational power of social interaction. The method evolved out of social psychological simulations of social influence processes featuring a positivity bias in self-presentation and a proclivity for mimicry, with some random noise added. In this talk I will introduce the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insect vision

    Publication Year: 2008, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB)

    Summary form only given. In my talk, I will discuss the research my colleagues and I are carrying out at the Insect Vision Research Laboratory at the University of Adelaide. This research asks how the brain makes sense of the world viewed by the eye. Insects are ideal for tackling this problem at theoretical, physiological and behavioural levels. With a visual system that accounts for as much as 3... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full papers

    Publication Year: 2008, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Efficient DNA sticker algorithms for DES

    Publication Year: 2008, Page(s):15 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    The data encryption standard (DES) is an algorithm with approximate 72 quadrillion possible keys. The security of the DES is based on the difficulty of picking out the right key after the 16-round nonlinear function operations. In this paper, we propose a concrete recursive sticker molecular algorithm to the DES. The molecular sticker algorithm includes three parts: initializing the key space with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-Time-Pads encryption in the tile assembly model

    Publication Year: 2008, Page(s):23 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Recent research has demonstrated that the ultra-scale computation by self-assembly DNA tiles could be implemented in the laboratory. One of the significant applications is the DNA-based cryptography systems. In this paper, we detail procedures for the DNA-based cryptography based on the One-Time-Pads (OTP) which is in principle unbreakable. In order to implement the whole encrypting and decrypting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm for elliptic curve Diffie-Hellman key exchange based on DNA tile self-assembly

    Publication Year: 2008, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    DNA tile self-assembly is a promising paradigm for nanotechnology. Recently, many researches show that computation by DNA tile self-assembly maybe scalable. In this paper, we propose the algorithm for elliptic curve Diffie-Hellman key exchange based on DNA tile self-assembly. First we give the DNA tile self-assembly model to compute the scalar multiplication, then we can successfully implement the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An encryption scheme using DNA technology

    Publication Year: 2008, Page(s):37 - 42
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The vast parallelism, exceptional energy efficiency and extraordinary information density inherent in DNA molecules are being explored for computing, data storage and cryptography. DNA cryptography is a new field of cryptography arising with the research of DNA computing in recent years. In this paper, an encryption scheme is designed by using the technologies of DNA synthesis, PCR amplification a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast solution to the partition problem by using tissue-like P systems

    Publication Year: 2008, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Tissue-like P systems with cell division is a computing model in the framework of membrane computing based on the intercellular communication and cooperation between neurons. In such a model, the structure of the devices is a network of elementary cells. Tissue-like P systems with cell division have the ability of increasing the number of cells during the computation. In this paper we exploit this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Input data analysis by neural network

    Publication Year: 2008, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    The back propagation training algorithm, used to train non-linear feed forward multi-layer artificial neural networks, is capable of estimating the error present in the data presented to a network. While of no use during the training of a network, such information can be useful after training to permit the input data to be itself adjusted to better fit the internal model of a trained neural networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of bio-inspired multi-stage regulations for diagnostic molecular automata

    Publication Year: 2008, Page(s):55 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Bio-inspired natural computing is expected to bring new solutions to various problems confronting us. We already presented a novel concept for transcriptome diagnosis using transcription-based molecular automata. Here we introduce new multi-stage regulations to this diagnostic system in order to reduce the background noise and increase the sensitivity. We use two explicit detector probes with a st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the 0–1 planning problem based on self-assembly of DNA tiles

    Publication Year: 2008, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    DNA tile self-assembly has been proved to enable programmable manipulation of biological systems as a tool of molecular computation. It is mainly based on the property that is the spontaneous self-ordering of substructure into superstructure driven by annealing of Watson-Crick base-pairing DNA sequences. We take full advantage of the superiority of DNA tile self-assembly to construct a molecular c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction of muscle areas from ultrasonographic images using refined histogram stretching and fascia information

    Publication Year: 2008, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3360 KB) | HTML iconHTML

    Ultrasonography constructs pictures of areas inside the body needs in diagnosis by bouncing ultrasound off internal tissues or organs. In constructing an ultrasonographic image, the weakness of bounding signals induces noises and detailed differences of brightness, so that having a difficulty in detecting and diagnosing with the naked eyes in the analysis of ultrasonogram. Especially, the difficul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Pooling Networks: A biologically inspired model for robust signal detection and compression

    Publication Year: 2008, Page(s):75 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Stochastic Pooling Networks (SPN) were recently introduced as a general conceptual framework for modeling surprising nonlinear interactions between redundancy and two forms of dasianoisepsila: lossy compression and randomness. The SPN approach arose from studies of biological signal transduction by populations of sensory neurons, but is also suitable for modeling several modern communications and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evolutionary cluster validation index

    Publication Year: 2008, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    This paper presents a new evolutionary method for the cluster validation index (CVI), namely eCVI. The proposed method learns CVI from the generated training data set using the genetic programming (GP), and then outputs the optimal number of clusters after taking parameters of a test data set into the learned CVI. Each chromosome encodes a possible CVI as a function of the number of clusters, dens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automata-based L-Grammar extraction from multiple images for virtual plants

    Publication Year: 2008, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    L-system (Lindenmayer system) and its application have been one of the most famous and powerful tools for virtual plant modelling. But it is really hard to develop L-grammar manually for a given plant depending only on imagination or experience. For bridging this gap, a novel automatic L-grammar extraction approach is presented in this work. Initially, image processing as well as pattern recogniti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective feature extraction by trace transform for insect footprint recognition

    Publication Year: 2008, Page(s):97 - 102
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    The paper discusses insect footprint recognition. Footprint segments are extracted from scanned footprints, and appropriate features are calculated for those segments (or cluster of segments) in order to discriminate species of insects. The selection or identification of such features is crucial for this classification process. This paper proposes methods for automatic footprint segmentation and f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient genetic algorithm based on the cultural algorithm applied to DNA codewords design

    Publication Year: 2008, Page(s):103 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    DNA encoding problem, which has been proved to be an NP hard problem, is a key problem for DNA computing, and usually solved by optimization algorithms. A new efficient genetic algorithm based on cultural algorithm for the design of DNA codewords is presented in this paper. In this hybrid optimization method, to abstract and manage the information efficiently, the conventional genetic algorithm is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.