By Topic

Soft Computing Applications (SOFA), 2010 4th International Workshop on

Date 15-17 July 2010

Filter Results

Displaying Results 1 - 25 of 53
  • Authors index

    Publication Year: 2010, Page(s): 265
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):3 - 6
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2010, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Paraconsistent logics and applications

    Publication Year: 2010, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In this expository paper we discuss some applications of paraconsistent annotated logics. They have the capability of manipulating concepts like fuzziness, inconsistency, and paracompleteness in a non-trivial manner. Such systems are new and they were discovered recently at the end of last century. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Micro-power generators for ambient intelligence applications

    Publication Year: 2010, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    Intelligent environments employ electronics unobtrusively integrated with the ambient to predict and to respond to the needs of people, enhancing many aspects of the everyday life. Wireless sensor network (WSN) are at the center of ambient intelligence applications. They consists of thousands of distributed sensing devices, that continually collect and transmit information about the surrounding en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic systems as approximators - where do we stand today?

    Publication Year: 2010, Page(s): 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    Summary form only given. Much of the commercial success of fuzzy logic as used in fuzzy logic systems (FLSs) is due to extrinsic properties of the fuzzy logic, namely to the systems with defuzzification. Since the first engineering application pioneered by Mamdani, until now, FLS control systems are mere function approximators and interpolators conveniently and intuitively built using FLSs. The sa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coverage influence on the dependability of PLC architectures

    Publication Year: 2010, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    The paper illustrates a way of using analytical methods in order to analyze the dependability of several replicated PLC architectures characterized by imperfect coverage. Firstly, we establish the general modeling frame of the dependability and we state the assumptions taken into account for modeling the reliability and safety of PLC systems. Then, the considered architectures are described by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of PLC systems dependability by assuming coverage

    Publication Year: 2010, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    The paper evaluates the dependability of PLC systems based on assuming the failure modes of the system components. It is introduced a model of the service provided by a system to a single user as a sequence of pairs value-time which has to be recognized by the user. The service model is then improved in order to be applied for the case of a single service provided to multiple users. The formalism ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient fuzzy search enabled hash map

    Publication Year: 2010, Page(s):39 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    Hash maps are data structures widely used in modern programming languages like Java for their simplicity and efficiency. When fuzzy string search is needed (like in natural language processing) finding an approximate key match in a regular Java HashMap is a trivial task. It usually requires the brute force method of iterating trough the set of keys and use of string metrics methods. Although this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliminating bias in fuzzy fault trees for electrostatic risk assessment

    Publication Year: 2010, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    Experts often turn to fault trees when trying to quantify the risk of electrostatic discharges. The fuzzy fault tree yields not only an estimation for the risk, but through examining the membership function of the top event, information on the accuracy of the result can be gained. Usually triangle-shaped membership functions are used, and the calculation is only performed for the three characteris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical neural model for workflow scheduling in Utility Management Systems

    Publication Year: 2010, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    The emerging computational grid infrastructure consists of heterogeneous resources in widely distributed autonomous domains, which makes job scheduling very challenging. Although there is much work on static scheduling approaches for workflow applications in parallel environments, little work has been done on a real-world Grid environment for industrial systems. Utility Management Systems (UMS) ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arificial intelligence in machine tools design based on genetic algorithms application

    Publication Year: 2010, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1027 KB) | HTML iconHTML

    The design of machine tools activity is an area with hundreds of years old. With the development of CAD/CAE systems, the engineers' work was greatly simplified. However, CAD/CAE systems are unable to overcome a critical threshold, thereby leaving the designer with many problems to be solved. Artificial intelligence field is also very exciting to develop this area. This paper presents a first attem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital system for adjusting the angular velocity of an induction motor

    Publication Year: 2010, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    This paper presents the hardware and software implementation of a digital system for regulating the speed of an AC motor. It provides detailed considerations which laid the basis of the choice of adjustment method implemented, as well as the benefits resulting from the use of the method chosen. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and simulating palletization automated plants operation

    Publication Year: 2010, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    The paper describes the way in which we can model and simulate a part of a complete automated manufacturing technological flow, namely the palletization part, meaning pieces arrangement in a certain order requested by the user. The purpose of the modelling is the determination of an adequate operation algorithm that can be further implemented in a real situation. In this case, we suppose that piec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues for GRID systems

    Publication Year: 2010, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1271 KB) | HTML iconHTML

    Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utilized in a Grid network are complex. There could be computing resources (PDA, PCs, workstations, servers, and clusters), storage resources (hard-disks, memory), Input-Output resources (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • About the reliability analysis of a fault-tolerant phased-mission danger control system

    Publication Year: 2010, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1433 KB) | HTML iconHTML

    In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from phase to phase. Furthermore, the duration of any phase can use deterministic or random models. All these changes and possibilities affect the system reliability. Thus, in this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework on virtualisation applications and benefits

    Publication Year: 2010, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (847 KB) | HTML iconHTML

    To dramatically improve the efficiency, resources and applications availability within the institution, now, the step that must be made it seems very small and achievable through virtualization. The reduction of the capital and operational costs it will be made by virtualizing the IT infrastructure in a “virtual” infrastructure, obtaining in the same time an increase of the efficienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing systems for user&Control-Plan traffic of Packet Core of GPRS-UMTS networks

    Publication Year: 2010, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    The resources of actual tracing tools for Control-Plane and User-Plan traffic are limited and most of them are crashing under the task of tracing 100% User-Plan traffic. This paper proposes a new tracing system for UP&CP traffic of Packet Core networks, like GPRS-UMTS networks, in order to verify their functionality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new solution approach for the bearing only target tracking problem

    Publication Year: 2010, Page(s):95 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1450 KB) | HTML iconHTML

    Though the motivation for the initial researches on the topic had been military applications, target tracking problem has many practices in real life. In this paper, target tracking is used in the meaning of estimating the range, course and speed of the target moving on the constant route with constant speed. The inputs for the algorithm are the passive sonar measurements, that are bearings (line ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new on-line predictive monitoring using an integrated approach adaptive filter and PCA

    Publication Year: 2010, Page(s):101 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1236 KB) | HTML iconHTML

    A new on-line predictive monitoring methodology is introduced, based on a combined adaptive principal component analysis (PCA) and an adaptive predictor filter in an autoregressive (AR) formulation. An adaptive PCA-based monitoring scheme is developed utilizing the process historical data to recursively track the dynamic behavior of the industrial process plant based on statistical Hotelling and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust model for consumer protection (TMCP)

    Publication Year: 2010, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    In the future, in e-commerce, the main actors will be the intelligent agents, who will dramatically reduce online shopping by human factors because of their reactive, proactive and social characteristics. Internet technology nowadays determines us to be less prepared to control and sanction the increasing number of users and of those service providers who have a doubtful behavior. The model develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining knowledge and data to discover intelligent molecular biomarkers: Prostate cancer i-Biomarkers

    Publication Year: 2010, Page(s):113 - 118
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Currently, there are some paradigm shifts in medicine, from the search for a single ideal biomarker, to the search for panels of molecules, and from a reductionistic to a systemic view, placing these molecules on functional networks. There is also a general trend to favor non-invasive biomarkers. Identifying non-invasive biomarkers in high-throughput data, having thousands of features and only ten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.