By Topic

2009 Third Asia International Conference on Modelling & Simulation

25-29 May 2009

Filter Results

Displaying Results 1 - 25 of 153
  • [Front cover]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (448 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2009, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • International reviewers

    Publication Year: 2009, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • DNA Computing Models and Practice

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    This paper will introduce the theory and practice of DNA-based computing models (DNAbCM). Several models will be provided with the basic tools necessary to understand current research in DNAbCM. Discussion will focus on potential applications to artificial intelligence, scheduling problem, molecular memory and smart machines (or bio-robotics). Following a brief review of DNA structure, an overview... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Cyberspace and 3D Telepresence Collaborative Environments

    Publication Year: 2009, Page(s):3 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    The ubiquity of current Internet and future cyberspace facilitate creation of very effective and real-time collaborative environment supported with the Telepresence in 3D imaging. The ubiquity of current internet and future cyber-space facilitates creation of very effective and real-time collaborative environment supported with the 3D Telepresence and a new generation of Video Conferencing Technol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in Supply Chain Simulation

    Publication Year: 2009, Page(s):5 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    The lecture aims to provide an insight into modern approaches to simulation-based analysis of supply chains. It gives an overview of using modeling and simulation (M&S) for facing different types of activities in supply chain management. In particular, different issues are considered, starting with new criticality such as: green logistics; supply chain resilience; sustainable logistics; logist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks

    Publication Year: 2009, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    The paper deals with detection of steganography content. Steganography is an additional method in cryptography which helps to hide coded messages inside pictures or videos. To hide a message is very important but also revealing such content is important to avoid of usage by jailbirds. The revealing of steganography is not easy. This paper shows how neural networks are able to detect steganography ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Research for Conceptual Modeling of Policy-Based Mobile Agent Groups

    Publication Year: 2009, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Mobile agents are increasingly play significant role in distributed information systems. This article addresses the problem that happens when a mobile agent leaves a group and wants to join another one. Therefore, it has to follow different polices which may have conflicts with its own requirements. The paper studies the problem from cooperative management point of view and goes to the technologic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Immune Bidirectional Regulation-Based Decoupling Control in Single Shift Gas Turbine Plant

    Publication Year: 2009, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Gas turbine is a complex, strong non-linear and multi-variable coupling pneumatic thermodynamics system. Its typical model in stability studies consists of load-frequency control, temperature control, and acceleration control. A strong coupling relationship exists among three control systems which affect the rotate speed of turbine and the exhaust temperature of turbine. A decoupling control metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fitting Membership Function with PSO Inertia Weight for Truck Backer-Upper Problem

    Publication Year: 2009, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    In this paper, optimization is utilized for fuzzy control system that automatically backs up a truck to a specified point on a loading dock. Particle swarm optimization with inertia weight (FPSOw) is used to fit the membership function of fuzzy system in searching for better decision. From the simulation conducted,it shows that the FPSOw is able to generate an optimal set of parameter for the fuzz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint-Based Genetic Algorithms for Machine Requirement of Semiconductor Assembly Industry: A Proposed Framework

    Publication Year: 2009, Page(s):29 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Having an accurate capacity planning is always an ultimate goal for semiconductor manufacturing. However, as capacity planning is highly affected by the demand forecast uncertainty, there is a necessity to make the gap closer to ensure profitability. The paper defines the problems faced by a semiconductor company in handling capacity planning and balancing the capital investment cost against the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review of ANN Technique for Modeling Surface Roughness Performance Measure in Machining Process

    Publication Year: 2009, Page(s):35 - 39
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The former, which is defined as modeling of machining processes, is essential to provide the basic mathematical models for formulation of the certain process objective functions. With conventional approaches such as statistical regression technique, explicit models are developed that required complex physical understanding of the modeling process. With non conventional approaches or artificial int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an Intelligent Route Planning System Using an Enhanced A*-search Algorithm

    Publication Year: 2009, Page(s):40 - 44
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Traffic congestion has become a major problem in many countries. One of the main causes is the failure to manage a journey. Vehicles tend to choose the shortest paths which ended up congesting a certain area. If a journey is well managed, using alternative paths may lead to the same destination in a shorter period of time. Therefore, with the importance of sustainable environment, intelligent rout... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flood Pattern Detection Using Sliding Window Technique

    Publication Year: 2009, Page(s):45 - 50
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Patterns could be discovered from historical data and can be used to recommend decisions suitable for a typical situation in the past. In this study, the sliding window technique was used to discover flood patterns that relate hydrological data consisting of river water levels and rainfall measurements. Unique flood occurrence patterns were obtained at each location. Based on the discovered flood ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Based Model for Call Centers Using Knowledge Management

    Publication Year: 2009, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    A call center is an organizational unit where inbound calls are received or outbound calls placed for the purposes of sales, support, advice and other business transactions. By applying knowledge management solutions, we can meet call centerspsila challenges and gain benefits of reduced training costs, improved call handling and greater flexibility. This paper describes a solution to agent mediate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and Recognition Algorithm in 3D Object Features

    Publication Year: 2009, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Extraction of 3D object is often an important pre-processing step in recognizing object. Analysis over previous related works of multiple researchers necessitates the use of either feature selection algorithm or extraction algorithm prior to classification. Algorithm becomes an important part of future application programs for checking design rules and generating manufacturing advice and plans. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Ants for Clustering with Adaptive Aggregation Conditions: Application to Image Clustering

    Publication Year: 2009, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The world of ants is a reach source of inspiration since real ants are able to solve collectively relatively complex problems. Particularly, several ant based clustering algorithms have been proposed in the literature. These clustering models were derived from several phenomena among real ants such as cemetery organization, recognition system, building alive structures, etc. In this work, we try t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Method for Logging Strategy Using Case Based Reasoning in Soccer Simulation

    Publication Year: 2009, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    In the real world, teams use a set of primitive strategies to achieve goal that in fact consists of consecutions of the passes and the movementspsila manner of the players for achieving goal. By using case based reasoning, it is possible, along with using primitive strategies, to register a successful succession to achieve goal, or a shot on goal, in the case base; and in the similar cases these s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.