By Topic

Complexity and Intelligence of the Artificial and Natural Complex Systems, Medical Applications of the Complex Systems, Biomedical Computing, 2008. CANS '08. First International Conference on

Date 8-10 Nov. 2008

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (54 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2008, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Modeling of Social Transitions Using Intelligent Systems

    Publication Year: 2008, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (814 KB) | HTML iconHTML

    In this study, we reproduce two new hybrid intelligent systems, involve three prominent intelligent computing and approximate reasoning methods: Self Organizing feature Map (SOM), Neuro-Fuzzy Inference System and Rough Set Theory (RST), called SONFIS and SORST. We show how our algorithms can be construed as a linkage of government-society (or any other similar systems) interactions, where governme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web-Based Knowledge Management in Distributed Systems

    Publication Year: 2008, Page(s):11 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    A study regarding the use of the semantic Web technologies within complex systems-distributed file systems, grid platforms and wiki-like applications-is presented from the perspective of the knowledge management, especially the modeling of the implicated resources. Several case studies are described, involving the use of actual semantic Web model, languages, and technologies-including microformats... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex Mobile Multiagent Systems

    Publication Year: 2008, Page(s):21 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    Mobile agents as network computing technology has been applied to solve various parallel and distributed computing problems, including parallel processing, information search and network management. Protection of the mobile agents in the network and against the hosts is a difficult task. In this paper, we analyze the increased security solutions provided by a novel class of mobile agents called IC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trajectory Errors of the 6-PGK Parallel Robot

    Publication Year: 2008, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    This paper presents a method to determinate a desired trajectory for the manipulated object by the 6-PGK parallel robot, with an imposed velocity, when some vibration motions act in the prismatic motor joints. By using the Lagrangian approach the dynamic equations of motion of the parallel robot were deduced. The supplementary generalized forces that must be introduced in system to correct the tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agile MDA Approach for the Development of Service-Oriented Component-Based Applications

    Publication Year: 2008, Page(s):38 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Agile Model Driven Architecture (MDA) software development processes apply agile principles in the context of executable models. In this paper we present an agile MDA approach for constructing, running, and testing executable UML service-oriented components. This work is part of a series referring to COMDEVALCO - a framework for Software Component Definition, Validation, and Composition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geometrical Method for Description of the 6-PGK Parallel Robot's Workspace

    Publication Year: 2008, Page(s):45 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (729 KB) | HTML iconHTML

    The 6-PGK parallel robot has a new configuration different from the Stewart platform. In this paper a geometrical method to determine exactly the boundary of the workspace in a horizontal cross-section, due to the limitations on the range motion of the prismatic kinematics pairs is presented. This method is illustrated with examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Algorithms: A Decision Tool in Industrial Disassembly

    Publication Year: 2008, Page(s):55 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    In the recycling process of the Waste Electrical and Electronic Equipment (WEEE) the disassembly process has a central role. Disassembly is not the reverse of the assembly process, real difficulties occur in the tasks assignment process of the disassembly operations. Since this is a multi objective optimization problem, we prove that genetic algorithms provide a useful multi-criteria decision tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach for Detecting Intrusions Using Jordan/Elman Neural Networks

    Publication Year: 2008, Page(s):62 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Intrusion detection system (IDS) is an effective tool that can help to prevent unauthorized access to network resources. A good intrusion detection system should have higher detection rate and lower false positive. A new classification system using Jordan/Elman (J/L) neural network for ID is proposed to detect intrusions from normal connections with satisfactory detection rate and false positive. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Certain Complexity Threshold during Growth of Functioning Networks

    Publication Year: 2008, Page(s):69 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Certain threshold on network size axis was observed in statistical mechanisms of adaptive evolution. Now it is investigated. This threshold is connected with maturation of chaos and lies far above the critical point of percolation. It can be treated as complexity threshold defining the term 'complex network' for Kauffman chaotic networks. Distributions of damage size are obtained using simulation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Classes and Graph Complexity Measures

    Publication Year: 2008, Page(s):77 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In this paper, we propose an information-theoretic approach to discriminate graph classes structurally. For this, we use a measure for determining the structural information content of graphs. This complexity measure is based on a special information functional that quantifies certain structural information of a graph. To demonstrate that the complexity measure captures structural information mean... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heuristic Chaotic Neural Network: Candidate Model for Perception

    Publication Year: 2008, Page(s):85 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1127 KB) | HTML iconHTML

    In this paper a new Chaotic Neural Network (CNN) have been made. This network contains desired number of interacting units and each one has its own chaotic dynamic and strange attractor caused by creating convex hull among output units. Having a special interaction characteristic, the model is able to create enormous different chaotic behaviors. Lyapunov Exponent and phase space plane criteria hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Channel Capacity of Communication Networks

    Publication Year: 2008, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    We propose a new measure that quantifies the communication capabilities of networks. More precisely, in this paper we show that the well known channel capacity of a memoryless channel, introduced in information theory, can be defined for arbitrary directed networks. We argue that this new measure, which we call network channel capacity, might be useful for characterizing and classifying communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Principal Components Methods

    Publication Year: 2008, Page(s):103 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Multivariate statistical methods for the analysis of large quantities of data have been applied to problem solving in different domains during the last decades. This paper summarizes the main points of the principal components analysis (PCA) method and its robust fuzzy alternatives, and describes a few applications highlighting the practical usefulness of this approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified Advanced Image Coding

    Publication Year: 2008, Page(s):110 - 116
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1191 KB) | HTML iconHTML

    JPEG is a popular DCT-based still image compression standard, which has played an important role in image storage and transmission since its development. Several papers have been published to improve the performance of JPEG. Advanced image coding (AIC) combines intra frame block prediction from H.264 with a JPEG-style DCT, followed by context adaptive binary arithmetic coding (CABAC) used in H.264... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Improvements of t-Cherry Junction Trees

    Publication Year: 2008, Page(s):117 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1034 KB) | HTML iconHTML

    One of the important areas of machine learning is the development and use of probabilistic models for classification and prediction. In our earlier work we introduced a special kind of junction tree, based on a hypergraph structure called t-cherry tree and on some information theoretical concepts. In this paper we present a possibility for the improvement of these junction trees, by ldquocutting a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multidimensional Data Model for Analysis of Agricultural Soil Characteristics

    Publication Year: 2008, Page(s):126 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    A multidimensional data model for the analysis of soil properties is built. An analysis of it is performed using OLAP (on-line analytical processing) operations. A risk measure for soil quality assessment (based on the upper partial moment) is introduced in the multidimensional data model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of KSAm-like Algorithms

    Publication Year: 2008, Page(s):130 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    RC4 is one of the most widely used stream cipher. It is fairly simple and efficient, and is used, among other things, in WEP, TKIP and SSL/TLS protocols. Fluhrer, Mantin and Shamir show that RC4 is completely insecure in the WEP mode of operation, and most of the discovered weaknesses are related to the key-scheduling algorithm (KSA) part of RC4. Crainicu and Boian propose a new variant of key-sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.