By Topic

2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation

26-28 May 2010

Filter Results

Displaying Results 1 - 25 of 133
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Welcome message from the Chairs

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2010, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • International reviewers

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2010, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Keynote Speaker 1

    Publication Year: 2010, Page(s):xxi - xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Cheap and reliable power sources are essential for the further technical development. However, fossil energy is regarded as dangerous for our environment because the unavoidable C02 releases. There are technologies already capable to capture C02 instead of releasing it, but they are barely affordable for the developing nations those who are in the biggest need for new energy resources to accomplis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker 2

    Publication Year: 2010, Page(s):xxiii - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    Prof Wang and his group have developed a Grid Computing platform, which supports universally network applications with a speedup of 2-25. Its associated protocol is the first of its kind worldwide. Best of all, this platform requires no changes in the way users work with their applications since it conforms the existing IT infrastructures. During his presentation, he is going to show a demo of usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker 3

    Publication Year: 2010, Page(s):xxv - xxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    The author discusses the development of new Information Communications Technologies (ICT) in the areas of eLearning, e-Health, e-Government, e-Journalism, etc. The current Web 2.0 combined with the 3D Telepresence, Future Internet, Semantic Web Technologies provide support to creation of social networks, content retrieval and analysis, which creates foundation for the future fully automated cybers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: Problems, techniques and applications

    Publication Year: 2010, Page(s):xxvii - xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB)

    Summary form only given. In this tutorial, we present several aspects of secure multi-party computation like privacy of Individuals, correctness of result and network traffic reductions. We first present the definition of this problem in various situations. Our definition is drawn from the previous idea and formulizations, and incorporate aspects that were previously overlooked. We also present se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PSTG: A T-Way Strategy Adopting Particle Swarm Optimization

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (942 KB) | HTML iconHTML

    As an activity to ensure quality and conformance, testing is one of the most important activities in any software or hardware product development cycle. Often, the challenge in testing is that the system may support a wide range of configurations. Ideally, it is desirable to test all of these configurations exhaustively. However, exhaustive testing is practically impossible due to time and resourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interaction Testing: From Pairwise to Variable Strength Interaction

    Publication Year: 2010, Page(s):6 - 11
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Although desirable as an important activity for quality assurances and enhancing reliability, complete and exhaustive software testing is prohibitively impossible due to resources as well as timing constraints. While earlier work has indicated that uniform pairwise testing (i.e. based on 2-way interaction of variables) can be effective to detect most faults in a typical software system, a counter ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage

    Publication Year: 2010, Page(s):12 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    In industrial process, pipes and tank may leak and sensors may have biased since corrosion, measuring noise and instrument faults exist. In order to maintain production and to prevent accident from happen it is crucial to develop reliable method of analyses of flammable gas release and dispersion. Relative mass release of the leakage is introduced as the input for the simulation model and the data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple Gesture Distinction for Brief Message Exchange

    Publication Year: 2010, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    This paper propose an idea of simple gesture distinction, which is under study by three innovative projects, including the topics of walking stick movement recognition, hand gesture recognition and building walking model generation. First, walking stick movement recognition project is presented, which is designed for senior people to interact with computer systems by using walking stick as a gestu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Social Networks for Viral Marketing Using Fuzzy Logic

    Publication Year: 2010, Page(s):24 - 28
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Viral marketing has been one of the favorite strategies for marketers to achieve deeper market penetration. As such, viral marketing like recommendation network based marketing depends on the dynamics of the social influential interaction. The dynamics of the recommendations in social networks and their impact on the desired outcome in the form of purchase decisions can be studied as per the theor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Permeability Prediction Using Extreme Learning Machines

    Publication Year: 2010, Page(s):29 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    In this work, an extreme learning machine (ELM) has been used in predicting permeability from well logs data have been investigated and a prediction model has been developed. The prediction model has been constructed using industrial reservoir datasets that are collected from a Middle Eastern petroleum reservoir. Prediction accuracy of the model has been evaluated and compared with commonly used a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of ARIMA, Neural Network and Linear Regression Models for the Prediction of Infant Mortality Rate

    Publication Year: 2010, Page(s):34 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    The aim of this paper is to compare the performances of ARIMA, Neural Network and Linear Regression models for the prediction of Infant Mortality Rate. The performance comparison is based on the Infant Mortality Rate data collected in Indonesia during the years 1995 – 2008. We compare the models using performance measures such as Mean Absolute Error (MAE), Mean Absolute Percentage Error (M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ant Colony Algorithm for Job Scheduling in Grid Computing

    Publication Year: 2010, Page(s):40 - 45
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Scheduling jobs to resources in grid computing is complicated due to the distributed and heterogeneous nature of the resources. Stagnation in grid computing system may occur when all jobs require or are assigned to the same resources. This will lead to resources having high workload and stagnation may occur if computational times of the processed jobs are high. This paper proposed an enhanced ant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Switching System for AC Powered Appliances Using Microcontroller

    Publication Year: 2010, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    This paper describes the first phase of the development process of this project. There are two phases involve in this research work. In the first phase, PROTUES simulation tools were used to design, study and analyze the proposed research work. Results from the simulation will be use as reference to re-design and develop the real-time hardware-based system. In the second phase, the hardware will b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differential Drive Wheeled Mobile Robot (WMR) Control Using Fuzzy Logic Techniques

    Publication Year: 2010, Page(s):51 - 55
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Wheeled Mobile Robot (WMR) is extremely important for active target tracking control and the reactive obstacle avoidance in an unstructured environment. Fuzzy control provides a mechanism for incorporating human-like reasoning capabilities and computationally in control systems. In this paper, a new type of controller based on Fuzzy Logic for differential drive WMR is proposed. The paper begins wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous Input Selection and Hidden Nodes Optimization for Sunspot Time Series Prediction

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Artificial Neural Network (ANN) is a popular computational intelligence technique in many applications. However, the performance depends on appropriate structure design and considered as a difficult task. Until now, there is no standard procedure in designing an optimal ANN. Two important issues in designing ANN are the selection of significant input subset and hidden nodes size. In this paper, bi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.