2011 Fifth Asia Modelling Symposium

24-26 May 2011

Filter Results

Displaying Results 1 - 25 of 62
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (1004 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - ix
    Request permission for commercial reuse | |PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2011, Page(s):x - xi
    Request permission for commercial reuse | |PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | |PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2011, Page(s):xiii - xiv
    Request permission for commercial reuse | |PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | |PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | |PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2011, Page(s):xvii - xxiii
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (207 KB)

    These keynote speeches discuss the following: safe nuclear power generation supported by simulation and simulators; sensing instrumentation for micro-environment data management; and CERTs, ICT and Cyber Security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial

    Publication Year: 2011, Page(s):xxiv - xxv
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (96 KB)

    Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Modeling of Material Properties Using GMDH-based Abductive Networks

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (326 KB) | HTML iconHTML

    Material properties are very important in most material science and engineering computations. A number of modeling and machine learning techniques have been used for the prediction of material properties, including Fuzzy Regression, Adaptive Fuzzy Neural Network, Extreme Learning Machine, and Sensitive Based Linear Learning Method. This paper proposes the application of Abductive Networks to the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Nadaraya-Watson Kernel Regression: Surface Approximation for Extremely Small Samples

    Publication Year: 2011, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB) | HTML iconHTML

    The function approximation problem is to find the appropriate relationship between a dependent and independent variable(s). Function approximation algorithms generally require sufficient samples to approximate a function. Insufficient samples may cause any approximation algorithm to result in unsatisfactory predictions. To solve this problem, a function approximation algorithm called Weighted Kern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation of Influenza with Biological Agent: A New Approch for Increasing System Robustness

    Publication Year: 2011, Page(s):13 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (381 KB) | HTML iconHTML

    Influenza is a pandemic disease which has the ability to mutation and adaptation with different conditions of environment. Through this approach, influenza has been able to overcome the Immune System (IS) and to kill thousands of people all around the world. A model based on the approach of influenza and according to the OODA (Observation-Orientation-Decision-Action) control loop has been introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Road Visual Condition Rating Assessment Using Artificial Neural Network and Support Vector Machine

    Publication Year: 2011, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (246 KB) | HTML iconHTML

    Annually, the Philippine government'sDepartment of Public Works and Highways (DPWH) gathers visual road condition data for use in the rehabilitation of the Philippine national road network. Alongside the condition data of the road, inventory and traffic data are also gathered simultaneously. In literature, Visual Condition Index (VCI) is used to determine the condition of a road. The data gatherin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Signal Denoising Method for Text Meaning Vectors

    Publication Year: 2011, Page(s):23 - 25
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (204 KB) | HTML iconHTML

    The extraction of meaning or at least inter-dependencies using data and text mining methods is well understood. Numerous approaches have been taken to select relevant information from often very large data sets. The discarding of items that are not relevant to a parameterized retrieval is usually based on an 'include or do not include' decision imbedded in some kind of branch-and-bound algorithm, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Two Cost Functions for Evolutionary Synthesis of Control Law for Higher Periodic Chaotic Logistic Equation

    Publication Year: 2011, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1021 KB) | HTML iconHTML

    This research deals with a synthesis of control law for chaotic logistic equation by means of analytic programming. The novelty of the approach is that a tool for symbolic regression -- analytic programming - is used for the purpose of stabilization of higher periodic orbits -- oscillations between several values of chaotic system. The paper consists of the descriptions of analytic programming as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence and Diversity Measurement for Vector Evaluated Particle Swarm Optimization Based on ZDT Test Problems

    Publication Year: 2011, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (391 KB) | HTML iconHTML

    Vector Evaluated Particle Swarm Optimization (VEPSO) has been successfully applied to various applications. However, the VEPSO actual performance is still uncertain. Hence, this paper will evaluate the VEPSO performance in term of convergence and diversity ability using Generalized Distance and Spread measurement respectively. Simulation with ZDT benchmark test problems show VEPSO is weak in solvi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of Plagiarism Detection Methods

    Publication Year: 2011, Page(s):39 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB) | HTML iconHTML

    Plagiarism has become one area of interest for researchers due to its importance, and its fast growing rates. In this paper we are going to survey and list the advantage sand disadvantages of the latest and the important effective methods used or developed in automatic plagiarism detection, according to their result. Mainly methods used in natural language text detection, index structure, and exte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IGCRGA: A Novel Heuristic Approach for Personalization of Cold Start Problem

    Publication Year: 2011, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (678 KB) | HTML iconHTML

    IGCRGA, an acronym for Information Gain Clustering through Rank Based Genetic Algorithm, is a novel heuristic used in Recommender System (RS) for solving personalization problems. In a bid to improve th equality of recommendation of RS and to alleviate the problem associated with personalization heuristics, which use fitness value in the clustering process, IGCRGA is proposed in this work. Besides... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Object-Based and Ontology-Based Models in Context-Aware Systems

    Publication Year: 2011, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    Today, context-aware systems are discussed as one of the key subjects in ubiquitous computing systems. In this area, researchers have been trying to find some techniques for context information modeling. So that attaining general and efficient model for managing, storing and retrieving data and contextual information is a necessary aspect. In this regard and in order to achieving this goal, severa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Parallel Automaton: A Mathematical Tool for Defining Highly Expressive Formal Workflows

    Publication Year: 2011, Page(s):56 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (404 KB) | HTML iconHTML

    The definition and simulation of processes using Work flow technology is becoming more and more popular. In that way, to standardize and simulate complex processes it is needed high expressive languages able to be automatically executed by computers. Currently, high expressive languages that can be used for simulation and definition of processes are based in Petri Nets technology. Nevertheless, Pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward High Accuracy Transaction Level Energy Modeling for System-on-Chip Buses

    Publication Year: 2011, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1015 KB) | HTML iconHTML

    Our daily life now heavily depends on various electronic appliances, which are typically operated by one or more IC chips. Such chips are designated as System-on-Chips (SoCs) when they integrate a CPU and a set of peripheral modules. Due to the worldwide strong momentum to pursue green technology, low energy has become a key requirement for modern SoCs. In this work, we developed an energy modelin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability Testing Methodology: Effectiveness of Heuristic Evaluation in E-Government Website Development

    Publication Year: 2011, Page(s):68 - 72
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (347 KB) | HTML iconHTML

    Software development organizations consist of marketing, project management, development, design, and quality assurance team. It is important for the various teams within the organization to understand the benefits and limitation of incorporating various usability testing methods within the software development life cycle. Some of the reasons for poor usability include effort prioritization confli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.