By Topic

Artificial Intelligence (MICAI), 2010 Ninth Mexican International Conference on

Date 8-13 Nov. 2010

Filter Results

Displaying Results 1 - 25 of 38
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (699 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (124 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (170 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (153 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2010 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organization and Conference Committee

    Publication Year: 2010 , Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010 , Page(s): xi - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Solution to the Registration Problem Using Differential Evolution and SSD-ARC Function

    Publication Year: 2010 , Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1078 KB) |  | HTML iconHTML  

    The problem of image registration is to find the best set of parameters of an affine transformation, which applied to a given image yields the closest match to a target image (possibly with noise). We present a method to perform parametric image registration based on Differential Evolution. Besides using Differential Evolution, we propose to use an error function robust enough to discard misleadin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Algorithm with Immigration Like Strategies of Diversification

    Publication Year: 2010 , Page(s): 11 - 15
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (570 KB) |  | HTML iconHTML  

    This paper presents an improvement in the process of diversification of populations in the genetic algorithms using immigration and an appropriate selection of operators. The proposal significantly enhance the quality of solutions obtained, because it prevents premature convergence like result from the loss of diversity in the genetic material of individuals by inbreeding between them, the inbreed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary Meanline Design for Gas Turbines Using Multi-objective Optimization

    Publication Year: 2010 , Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (151 KB) |  | HTML iconHTML  

    Designing gas turbines is a very complex task. It is not a linear procedure but an iterative one, composed by several phases. In the initial phase, the general geometric characteristics and estimate efficiency of the turbine are determined. This phase is known as the meanline design, and it is very important because it determines the starting point for more complex analysis. In this work we use a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparation between Bee Swarm Optimization and Greedy Algorithm for the Knapsack Problem with Bee Reallocation

    Publication Year: 2010 , Page(s): 22 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    The Knapsack Problem is a classical combinatorial problem which can be solved in many ways. One of these ways is the Greedy Algorithm which gives us an approximated solution to the problem. Another way to solve it is using the Swarm Intelligence approach, based on the study of actions of individuals in various decentralized systems. Optimization algorithms inspired on the intelligent behavior of h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a Genetic Algorithm Based on Abstract Data Type in Electronic Games' Scenarios Adaptive Evolution

    Publication Year: 2010 , Page(s): 28 - 33
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    The importance of artificial intelligence in electronic games has increased in response to the requirements of a more realistic behavior. For the application of such techniques, an excellent candidate is the RPG game genre which provides rich and interactive environments that, similarly to a real world environment, have interesting events taking place simultaneously. Using a RPG game as background... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a Choice Function for Guiding Enumeration in Constraint Solving

    Publication Year: 2010 , Page(s): 37 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (190 KB) |  | HTML iconHTML  

    In Constraint Programming, selection of a variable and a value of its domain enumeration strategies are crucial for resolution performances. We propose to use a Choice Function for guiding enumeration: we exploit search process features to dynamically adapt a Constraint Programming solver in order to more efficiently solve Constraint Satisfaction Problems. The Choice Function provides guidance to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-parametric Modeling of the Optical Nerve Response by Trans-corneal Stimulation Using Differential Neural Networks

    Publication Year: 2010 , Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4482 KB) |  | HTML iconHTML  

    Nowadays, the field of biomedical intelligent stimulators has received more and more attention. Those devices have been applied for the treatment of several pathologies. Among others, the visual diseases have attracted special attention due the difficulties associated to obtain desired responses in the optical nerve. The trans-corneal stimulation is strongly dependent on many factors. One of the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intentional Learning Procedures as Intention Revision Mechanisms

    Publication Year: 2010 , Page(s): 51 - 56
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (309 KB) |  | HTML iconHTML  

    By recovering some insights from a philosophical analysis about intentions we focus on intentions as plans writ large. Using this assumption we suggest proof of how an existing implementation of BDI learning procedures works as an intention revision mechanism as suggested in an abstract specification. Finally, we translate the abstract postulates in terms of AgentSpeak(L) so that the intention rev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rule Based System for Reliability Centered Maintenance

    Publication Year: 2010 , Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    In order to achieve failure free functionality of heavy plant equipment, reliability centered maintenance technique is used which has its own limitations, such as tedious preventive maintenance tasks and significant start up costs. Moreover, previous method uses cased based reasoning which does not work when two or more cases conflict and no or an inapplicable solution is provided to the problem. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Updates Based on ASP

    Publication Year: 2010 , Page(s): 63 - 66
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    We present a semantics for an update operator. This semantics is based on a concept called minimal generalized answer sets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Argument from Autonomy Revisited

    Publication Year: 2010 , Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    Since the problem of autonomy is a fundamental philosophical issue of Artificial Intelligence, our goal in this paper is to revise the Argument from Autonomy with the help of some distinctions extracted from a broader framework of discussions in philosophy. We make a revision of the Argument from Autonomy by making a series of distinctions between agents, programs, and between the origins and exer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying Using Specific Rules with High Confidence

    Publication Year: 2010 , Page(s): 75 - 80
    Cited by:  Patents (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    In this paper, we introduce a new strategy for mining the set of Class Association Rules (CARs), that allows building specific rules with high confidence. Moreover, we introduce two propositions that support the use of a confidence threshold value equal to 0.5. We also propose a new way for ordering the set of CARs based on rule size and confidence values. Our results show a better average classif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Mining and Rules Detection for Unstructured Information

    Publication Year: 2010 , Page(s): 81 - 85
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1050 KB) |  | HTML iconHTML  

    In this article we show how to find evidence of incomplete or fractured processes in non-structured reports of known business processes, by means of rules, patterns and detection of cause-effect relationships. A priori classifications and probabilities of process activities are used as inputs for the analysis and rules detection. In this method we use a domain-specific ontology associated to proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT2 TSK NSFLS2 ANFIS

    Publication Year: 2010 , Page(s): 89 - 93
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (585 KB)  

    This article presents a novel learning methodology based on the hybrid mechanism for training interval type-2 non-singleton type-2 Takagi-Sugeno-Kang fuzzy logic systems (FLS). Using input-output data pairs during the forward pass of the training and prediction processes, the interval type-2 non-singleton type-2 TSK FLS the consequent parameters are tuned by using the recursive least squares (RLS)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Home Technologies: Uses and Abuses

    Publication Year: 2010 , Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1027 KB) |  | HTML iconHTML  

    This paper discusses the research and technologies around the area of smart homes. It takes the position that the word smart has been used in many contexts both where it makes sense and where it does not. Furthermore from a pedagogical point of view, the paper discusses the use of a smart home lab as means to teach various AI paradigms that require a live interaction with its environment. Here the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Key Parameters for Greenhouse Using Fuzzy Clustering Techniques

    Publication Year: 2010 , Page(s): 103 - 106
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (667 KB) |  | HTML iconHTML  

    The clustering techniques are usually used in classification and pattern recognition. Moreover, fuzzy logic is used for system modeling when the information is scarce, inaccurate or its behavior is described using a complex mathematical model. As example of this type of system, a greenhouse is considered, where the variables are: in-house and out-house temperature, humidity for both inside and out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.