By Topic

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2011 12th ACIS International Conference on

Date 6-8 July 2011

Filter Results

Displaying Results 1 - 25 of 47
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (923 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Message from Conference Chairs

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Keynote Abstract

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB)

    Summary form only given. Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Specific Expert System Model for Diagnostic Consultation in Psychiatry

    Publication Year: 2011, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Medical Experts Systems have been one of the earliest and ongoing pursuits of the Artificial Intelligence (AI) community. Unfortunately, they still remain a largely unrealized goal. The systems that have been developed are either prototypes, or involve only small knowledge domains. One of the main reasons for this situation is explained as the lack of domain specific models. While it is true that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Neural Network Ensemble Incorporated with Dynamic Variable Selection for Rainfall Forecast

    Publication Year: 2011, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    This paper presents a novel ensemble model of artificial neural networks for rainfall forecast incorporating dynamic variable selection. In the first phase of the model, meteorological variables optimal to the response (here rainfall) are selected with the optimal lag value of the response variable. A dynamic variable selection method named, time series least angle regression (TS-LARS) is applied ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormal Crowd Behavior Detection Using Topological Methods

    Publication Year: 2011, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1965 KB) | HTML iconHTML

    In this paper we present a novel framework for abnormal behavior detection in crowded scenes. For this purpose, the theory of topological simplification on the dense field is extended to the sparse particle motion field, which is used to describe the dynamics of the crowd. We propose two new methods for analysis of boundary point structure and extraction of critical point from the particle motion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Techniques, Analysis and Interpretation for Leukemia Data Sets

    Publication Year: 2011, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1138 KB) | HTML iconHTML

    The research was carried out to build a patient management system and decision support system (considering certain types of Leukaemia as the domain) for the Hematology Department of Hospital Kuala Lumpur (HKL), Malaysia. The objective of this paper is to describe the techniques used for syntactical and contextual Image retrieval for leukemic images. The system contains an image database containing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinforcement Learning Approach to AIBO Robot's Decision Making Process in Robosoccer's Goal Keeper Problem

    Publication Year: 2011, Page(s):24 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Robocup is a popular test bed for AI programs around the world. Robosoccer is one of the two major parts of Robocup, in which AIBO entertainment robots take part in the middle sized soccer event. The three key challenges that robots need to face in this event are manoeuvrability, image recognition and decision making skills. This paper focuses on the decision making problem in Robosoccer -- The go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAC Layer Protocol Supporting the Application of WSNs in Medicine and Healthcare Domains

    Publication Year: 2011, Page(s):33 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    Application of Wireless Sensor Networks (WSN) in many fields has achieved a significant advances, many research can be seen in military, industrial control surveillance, and bush fire and wild habitant monitoring, However, it is a bit too early to claim the application of WSN in the domain of Medicine and Healthcare (M&HC) a big success. The major obstacle is the concern raised by the users th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Model Supporting Billing and QOS in the Internet

    Publication Year: 2011, Page(s):38 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    This article develops a charging scheme that is simple and easily usable for the users and provides them with the incentives to use only the resources they need. This scheme is developed on the time-volume charging approach to show how the contributing providers can share the total charge earned by each mobile and wireless service instance in a fair way, with each provider collecting the portion o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of the MMS Framework for Internet Applications

    Publication Year: 2011, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    This research focuses on the development and performance evaluation of MMS framework for internet applications. The details of the architecture and algorithms employed in the MMS framework for message delivery are presented. We implement the proposed MMS framework for internet application by building a mobile telemedicine system. On the client side, we develop MMS application that implements data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards

    Publication Year: 2011, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Recently, Hsiang and Shih proposed remote user authentication scheme using smart cards, they claims that their schemes defended against parallel session attack, and password guessing attacks. In this paper, we show that Hsiang and Shih's schemes are still vulnerable to off-line password guessing attacks and undetectable on-line password guessing attacks. Notably, problems remain in situations wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of RFID Systems - A Hybrid Approach

    Publication Year: 2011, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e., suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart RFID Reader Protocol for Malware Detection

    Publication Year: 2011, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Radio frequency identification (RFID) is a remote identification technique promises to revolutionize the way a specific object use to identify in our industry. However, large scale implementation of RFID sought for protection, against Malware threat, information privacy and un-traceability, for low cost RFID tag. In this paper, we propose a framework to provide privacy for tag data and to provide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Selection of Imbalanced Gene Expression Microarray Data

    Publication Year: 2011, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Gene expression data is a very complex data set characterised by abundant numbers of features but with a low number of observations. However, only a small number of these features are relevant to an outcome of interest. With this kind of data set, feature selection becomes a real prerequisite. This paper proposes a methodology for feature selection for an imbalanced leukaemia gene expression data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Features Extraction Using Free Score of Words for Classifying Conotoxin Superfamily

    Publication Year: 2011, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Interest in Conotoxin has been rapidly growing over the past number of years due to its potential for effective use in the design of drugs to treat a myriad of conditions including, neuromuscular disorders, chronic pain and schizophrenia. As a result it is necessary to develop powerful and efficient techniques which can accurately classify conotoxin super families. In this paper, we propose a nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Key Success Factors for Supply Chain Management System in Semiconductor Industry

    Publication Year: 2011, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Developing a supply chain management (SCM) system is costly, but important. However, because of its complicated nature, not many of such projects are considered successful. Few research publications directly relate to key success factors (KSFs) for implementing and operating a SCM system. Motivated by the above, this research proposes two hierarchies of KSFs for SCM system implementation and opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.