By Topic

Computer Modeling and Simulation (EMS), 2011 Fifth UKSim European Symposium on

Date 16-18 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (569 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Welcome message from the Chairs

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (158 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Keynote Addresses

    Publication Year: 2011, Page(s):xvii - xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB)

    These keynote addresses discuss the following: energy, growth and simulation; signal processing challenges in brain-computer interfacing; and classification and comparison of modeling approaches and simulation techniques based on benchmarks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary Presentation

    Publication Year: 2011, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2011, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (104 KB) | HTML iconHTML
    Freely Available from IEEE
  • An Improved Artificial Weed Colony for Continuous Optimization

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    In this paper, after a literature review, studies will be concentrated on standard deviation of invasive weedoptimization's normal distribution function which is used for distributing seeds of each weed over the search space. Although invasive weed optimization is a great algorithm to solve real world practical optimization problems but there is a serious drawback in distributing the seeds over th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Clustering and Interpolation Techniques for the Time-Efficient Simulation of Complex Models within Optimization Tasks

    Publication Year: 2011, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    Several widely used model optimization techniques such as, for instance, genetic algorithms, exploit on intelligent test of different input variables configurations. Such variables are fed to an arbitrary model and their effect is evaluated in terms of the output variables, in order to identify their optimal values according to some predetermined criteria. Unfortunately some models concern real wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic-Neuro-Fuzzy Controllers for Second Order Control Systems

    Publication Year: 2011, Page(s):12 - 17
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Overshoot, settling and rise time define the timing parameters of a control system. The main challenge is to attempt to reduce these parameters to achieve good control performances. The target is to obtain the optimal timing values. In this paper, three different approaches are presented to improve the control performances of second order control systems. The first approach is related to the desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Collaborative E-learning Strategy

    Publication Year: 2011, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Evaluating learners in terms of collaboration capabilities in a collaborative e-learning session can be quantified based on several parameters. These parameters include learner's contribution in the collaborative e-learning session. They also include learner's collaboration history in collaborative e-learning sessions and the collaboration capabilities of the group in which he participates. These ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bimodal System for Emotion Recognition from Facial Expressions and Physiological Signals Using Feature-Level Fusion

    Publication Year: 2011, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    This paper presents an automatic approach for emotion recognition from a bimodal system based on facial expressions and physiological signals. The information fusion is to combine information from both modalities. We tested two approaches, one based on mutual information which allows the selection of relevant information, the second approach is based on principal component analysis that allows the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A memetic algorithm for program verification

    Publication Year: 2011, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    We present a memetic algorithm for program safety properties verification. This problem is expressed by means of Reach ability of some erroneous location L in the program. We use a new method for program modeling: A Separation Modeling Approach: ASMA, in which programs are represented by two components: Data Model DM, and Control Model CM. The erroneous location is represented by its "Location Acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-Statistical metrics for estimating redundancies in forensic investigations of network intrusions

    Publication Year: 2011, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Most statistical methods do not perfectly conform to real cases of cyber crimes. Consequently, using statistical methods to analyze intrusion logs in order to present evidentiary values in courts of law are often refuted as baseless and inadmissible evidences regardless of the input spent to generate the reports and whether the reports are well-grounded evidences or not. Sometimes, complainants ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Electrical Capacitance Tomography Method Using Online Pressure and Temperature Data Measurements

    Publication Year: 2011, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    In this paper, a new formulation of the Electrical Capacitance Tomography (ECT) problem for real-time image reconstruction of the multiphase flow fluid passing through a given section of a pipeline is presented. The suggested Regularized Constrained Gauss-Newton (RCGN) algorithm determines the dielectric distribution of the internal fluid by solving the inverse and forward problems on the data cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Learning and Database in Robustness of Security Tools: Based on Immune System Modeling

    Publication Year: 2011, Page(s):47 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Increasing complexity and dynamics of systems has reduced the efficiency of security tools. For overcoming this problem, security tools introduce newer patches, thereby the size of database and computation overloads are increased. By Biological Immune System (BIS) modeling and simulation, its behavior in different situations will be considered and the effect of database size and learning ability i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Composition of Dynamic-Cost Services in Service-Oriented Architectures

    Publication Year: 2011, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Service-oriented architecture becomes a major computing practice in modern enterprise software systems. In several cases, the cost of the services could depend on the combination of the services utilized. In addition, there could be several constraints imposed on the service composition process. One of the important constraints is to impose an upper bound on the number of clients' usages of servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of Reference Evapotranspiration Using Limited Climatic Data and Bayesian Model Averaging

    Publication Year: 2011, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1143 KB) | HTML iconHTML

    Motivated by the increased number of sensors and sensor networks for environmental and weather monitoring, we propose a method to estimate reference evapotranspiration (ETo) from limited climate data. There are several modifications to the standard FAO Penman-Monteith equation (FAO PM) that enables us to use limited climatic data for estimating ETo, however these equations have to be adjusted loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation on Different Kernel Functions for Weighted Kernel Regression in Solving Small Sample Problems

    Publication Year: 2011, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    Previously, weighted kernel regression (WKR) has proved to solve small problems. The existing WKR has been successfully solved rational functions with very few samples. The design and development of WKR is important in order to extend the capability of the technique with various kernel functions. Based on WKR, a simple iteration technique is employed to estimate the weight parameters with Gaussian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Ant Colony Optimization and Simulated Annealing for Rule Induction

    Publication Year: 2011, Page(s):70 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    This paper proposes a hybrid of ant colony optimization and simulated annealing for rule induction. The hybrid algorithm is part of the sequential covering algorithm which is the commonly used algorithm to extract classification rules directly from data. The hybrid algorithm will minimize the problem of low quality discovered rule by an ant in a colony, where the rule discovered by an ant is not t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.