By Topic

Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on

Date 19-20 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 219
  • [Front cover - Vol 2]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1962 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2008, Page(s):v - xix
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from Workshop Chairs - Volume 2

    Publication Year: 2008, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (166 KB) | HTML iconHTML
    Freely Available from IEEE
  • PACIIA 2008 Organizing Committee - Volume 2

    Publication Year: 2008, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • PACIIA 2008 Committee Members - Volume 2

    Publication Year: 2008, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Distributed and Parallelled EM Algorithm for Distributed Cluster Ensemble

    Publication Year: 2008, Page(s):3 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    The paper introduces base clusterings distributed cluster ensemble which can handle the problems of privacy preservation, distributed computing and knowledge reuse. First, the latent variables in latent Dirichlet location model for cluster ensemble (LDA-CE) are defined and some terminologies are defined. Second, Variational approximation inference for LDA-CE is stated in detail. Third, base on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory

    Publication Year: 2008, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    It's necessary to create a credible and general evaluating index model in network threat assessment. According to the network indices' effect, this paper proposed an algorithm which combines grey correlation degree in grey theory with traditional analytic hierarchy process (AHP) to determine the indices. It considered both objective and subjective factors. Experiments showed that this method had a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blog Community Discovery Based on Tag Data Clustering

    Publication Year: 2008, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Blog is increasingly becoming an important source of information. Blog community is a kind of a group of bloggers with the same interest and common topics on the Internet. To use blog resources effectively, one important way is to identify blog communities and their members in order to refine the blog circle. In this paper, we first define the blog community and the community center, and then cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RBF Neural Networks and Its Application in the Simulation of a Random Vibration System

    Publication Year: 2008, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Radial basis function neural network (RBF-NN) is applied to simulate a random vibration system in this paper. First, an overview of random vibration system is introduced, and the dynamic model of the system and the spectral density of external excitation are presented. Then, a radial basis function neural network is proposed to predict the random vibration based on a biological neuron system. Radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AND/OR Tree Search Algorithm in Web Service Composition

    Publication Year: 2008, Page(s):23 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Composition of web services has received much interest to support business-to-business or enterprise application integration. Web service composition lets developers combine single services as a composite one to achieve complex goal. It is a highly complex task and already beyond the human capability to deal with the whole process manually, so AI-based approach for automated web service compositio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of Critical Flux through Adiabatic Capillary Tubes Based on Artificial Neural Network

    Publication Year: 2008, Page(s):28 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Evaluating the critical flux in capillary tubes is the key to the research on flow characteristics in capillary tubes. The mathematical model of refrigerant flow through the capillary tubes was presented. The numerical solutions were obtained based on the program made. Data derived from capillary tube theoretical models were used as example collection to train the back propaganda(BP)network model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Reliability Multi-Scale Prediction Model Based on EMD and RBF Network

    Publication Year: 2008, Page(s):31 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Aiming at the prediction precision and applicability problem for the traditional software reliability prediction models, from the point of nonlinear time sequence, this paper presented a novel software reliability prediction model using RBF neural network based on empirical mode decomposition theory. In the paper, the fault data series obtained from software reliability test phase is decomposed in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Scheduling Algorithm for Distributed Kahn Process Networks in a Cluster Environment

    Publication Year: 2008, Page(s):36 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    In this paper, a novel dynamic task scheduling algorithm is proposed for parallel applications modeled in Kahn process networks (KPN) running in a distributed multi-processor cluster. Static job scheduling algorithms do not work for the purpose for that the complexity of a KPN model remains unpredictable at compile time. Dynamic load balancing strategies ignore the explicit data dependences among ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Estimation of the New Feature Extracting Method for Tamper Detection in Printed Documents

    Publication Year: 2008, Page(s):43 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In this paper, we report the experimental result of the estimation of our proposed technique to extract the feature of the printed documents for tamper detection. We have compared the proposed technique which uses median points as a feature and the existing technique which uses the area of the black dots as a feature. As an experiment, we calculated the median point of alphabets and numbers, and p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Condition Monitoring of Equipment Using a Joint RSAR and Fuzzy ART Neural Network Method

    Publication Year: 2008, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Working conditions are monitoring parameters are huge and neural network learning time too long in the condition monitoring of multi word condition equipment. To improve monitoring efficiency, a joint rough set attribute reduction (RSAR) and Fuzzy ART (adaptive resonance theory) neural network method is proposed in this study. The dimension of an input vector to Fuzzy ART neural networks can be re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Document Query Optimization Based on Memetic Algorithm

    Publication Year: 2008, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    To efficiently retrieve relevant documents from the explosive growth of the Internet and other sources of information access, an efficient document query optimization approach based on memetic algorithm (MA) is proposed. Experimental results show that the proposed algorithm can improve the precision of document retrieval compared with other conventional query optimization algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Estimating Network Reliability Using an Artificial Neural Network

    Publication Year: 2008, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    This paper presents a method to estimate the all-terminal reliability of network by neural networks. We first employ the scheme that a network topology is mapped into a binary vector, and use Monte Carlo simulation to obtain sample data of network reliability. Then the neural networks are constructed, trained and validated with the network topologies, links reliabilities and data set of network re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Case Retrieval Method in the Conceptual Design Based on Rough Set

    Publication Year: 2008, Page(s):61 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    A rough set-based case retrieval method was presented in intelligent CAD system of the conceptual design. The case knowledge representation model of the conceptual design based on rough set was brought forward by analyzing features of CAD systems. An approach of reducing the feature attributes and calculating the feature attributes weighting was proposed based on rough set theory. The continuous f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Clustering Algorithm with Ant Colony Optimization

    Publication Year: 2008, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    Clustering analysis is an important area of data mining. A kind of new clustering algorithm with ant colony optimization based on cluster center initialization is proposed in this paper. The new algorithm gives initialized cluster centers by different methods, then solves clustering problems by iterated method. Three methods of cluster center initialization are used in clustering algorithm with an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction Method of Knowledge Base Based on Fuzzy and Modular Ontology

    Publication Year: 2008, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Ontology construction is a time consuming and labor intensive task and it is difficult to reuse existed ontology, so the conventional knowledge base based ontology building methods are in a low efficiency. From the view of facilitating knowledge sharing and reusing, modularization is introduced into ontology. But most current methods of ontology modularization are restricted to man-made factors to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextual Hidden Markov Tree Model for the Dual-Tree Complex Wavelet Transform

    Publication Year: 2008, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Multiresolution models such as the wavelet domain hidden Markov tree (HMT) provide a powerful approach for image modeling and processing because of the persistence properties of wavelet coefficients. In this paper, a new HMT model based on the dual-tree complex wavelet transform is proposed. The model is extended from the contextual hidden Markov tree (CHMT) to the complex wavelet transform, which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Long Term Load Forecasting Based on Improved Genetic Neural Network

    Publication Year: 2008, Page(s):80 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Considering the features of long term load forecasting are complicated, this paper proposes a generic neural network model that is able to adapt to and learn from amount of non-linear or imprecise rules, so it is a model with highly robustness. For avoiding the inflexibility of the generic neural network itself, many experiences and opinions of experts are introduced during the use, so that a comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.