By Topic

Cybernetic Intelligent Systems (CIS), 2011 IEEE 10th International Conference on

Date 1-2 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Welcome from organizers

    Publication Year: 2011, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Electrocardiogram beat classification using classifier fusion based on Decision Templates

    Publication Year: 2011, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    This paper presents a ”Decision Templates” (DTs) approach to develop customized Electrocardiogram (ECG) beat classifier in an effort to further improve the performance of ECG classification. Taking advantage of the Un-decimated Wavelet Transform (UWT), which also serves as a tool for noise reduction, we extracted 10 ECG morphological, as well as one timing interval features. For clas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Particle Swarm Optimization with parameter selection approaches to solve Flow Shop Scheduling Problem

    Publication Year: 2011, Page(s):13 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A Hybrid Particle Swarm Optimization (HPSO) with parameter selection approaches is proposed to solve Flow Shop Scheduling Problem (FSSP) with the objective of minimizing makespan. The HPSO integrates the basic structure of a Particle Swarm Optimization (PSO) together with features borrowed from the fields of Tabu Search (TS), Simulated Annealing (SA). The algorithm works from a population of candi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning of multiple autonomous vehicles using RRT

    Publication Year: 2011, Page(s):20 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Criteria such as driving safety and overall travel efficiency have led to increasing attempts towards autonomy of vehicles wherein different vehicles can plan their journey, maneuver as per scenario, and communicate to each other to create an error free travel plan. In this paper we present the use of Rapidly Exploring Random Trees (RRT) for the planning of multiple vehicles in traffic scenarios. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical reasoning and decision making

    Publication Year: 2011, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Most intelligent systems have some form of decision making mechanisms built into their organisations. These normally include a logical reasoning element into their design. This paper reviews and compares the different logical reasoning strategies, and tries to address the accuracy and precision of decision making by formulating a tolerance to imprecision view which can be used in conjunction with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing completion of neural networks coursework

    Publication Year: 2011, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The assessment of the author's second year module on neural networks requires students to write a program to implement a neural network and to then apply it to a real world problem of their choice. In recent years, significant numbers of students failed to complete the work. Some did not apply their network and some even failed to implement the network. This paper describes a series of refinements... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organization for scheduling in agile manufacturing

    Publication Year: 2011, Page(s):38 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    Agility refers to the manufacturing system ability to rapidly adapt to market and environmental changes in efficient and cost-effective ways. This paper addresses the development of self-organization methods to enhance the operations of a scheduling system, by integrating scheduling system, configuration and optimization into a single autonomic process requiring minimal manual intervention to incr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving forecasts of geomagnetic storms with evolved recurrent neural networks

    Publication Year: 2011, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (843 KB) | HTML iconHTML

    Recurrent neural networks (RNNs) have been used for modeling the dynamics of the Dst index. Researchers have experimented with various inputs to the model, and have found improvements in prediction accuracy using measurements of the interplanetary magnetic field (IMF) taken from the Advanced Composition Explorer satellite. The output of the model is the one hour ahead forecasted D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New information content metric and nominalization relation for a new WordNet-based method to measure the semantic relatedness

    Publication Year: 2011, Page(s):51 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Semantic similarity techniques are used to compute the semantic similarity (common shared information) between two concepts according to certain language or domain resources like ontologies, taxonomies, corpora, etc. Semantic similarity techniques constitute important components in most Information Retrieval (IR) and knowledge-based systems. Taking semantics into account passes by the use of exter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sentences Simplification for Automatic summarization

    Publication Year: 2011, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper, we emphasize the need for conserving space within sentences by introducing a Sentences Simplification Module (SSM). The module is aimed to shorten the length of sentences via either splitting or compression. We describe how the module is integrated in a Wikipedia-based summarization framework. We highlight the performance differences obtained from introducing such a module by runnin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Category Analysis of Poetry and Prose

    Publication Year: 2011, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    The human mind creates and interprets beautiful literature. Perhaps one of the greatest challenges for Machine Intelligence is the replication of those skills. `Semantic Category Theory' indicates that human language cognition is based upon four distinct data types that can be combined in one of two ways. The analytical adjunct to Semantic Category Theory, `Semantic Category Analysis', determines ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring security requirements for software security

    Publication Year: 2011, Page(s):70 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature. This is because properties and metrics for measuring... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A provisioning model towards OAuth 2.0 performance optimization

    Publication Year: 2011, Page(s):76 - 80
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP, SharePoint, Exchange Server, etc.) require a mechanism to predict and manage performance expectations. As these applications become more and more ubiquitous in the Cloud, the scale and performance expectations become an important factor impacting architectural decision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A recommender system for telecom users: Experimental evaluation of recommendation algorithms

    Publication Year: 2011, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user about the presence of services which may meet user i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audit and research challenges in digital forensics

    Publication Year: 2011, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    New dimensions to computer misdemeanors such as information leakages, masquerading, electronic fraud, deformation of corporate cultures and identities through fallacious electronic publicities are alarming across the globe. Hence, corporate organizations are facing serious challenges in coming up with security frameworks that will adequately safeguard their assets and liabilities on a daily basis.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A critical evaluation of datasets for investigating IDSs and IPSs researches

    Publication Year: 2011, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Complex and new cases of intrusions, new bugs, security issues and vulnerabilities are evolving everyday for a number of reasons. Consequently, researchers in the domains of Intrusion Detection Systems and Intrusion Prevention Systems constantly design new methods to lessen the aforementioned security issues. However, getting suitable datasets for evaluating various research designs in these domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent channel access technique in Cognitive Radio networks

    Publication Year: 2011, Page(s):98 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1245 KB) | HTML iconHTML

    Future networks, especially in the framework of smart cities will be populated with various kinds of equipment accessing wireless communication channels. A much higher device variety will arise, ranging from identifiable objects to notebooks and smart phones. These aspects require high-level intelligent wireless access network. In order to cope with the vast number of technologies (machine-to-mach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination of Taylor and Chan method in mobile positioning

    Publication Year: 2011, Page(s):104 - 110
    Cited by:  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Due to increase in location based services, the need for efficient network based location methods has been made of paramount of importance. Among the mobile positioning techniques Time of Arrival (TOA) and Time Difference of Arrival (TDOA) arisen as promising techniques. In order to deal with such technology some theoretical approaches have been put forward to draw the estimation under the technol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time series analyses for forecasting network intrusions

    Publication Year: 2011, Page(s):111 - 116
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Intrusion Detection Systems are fast-growing techniques for monitoring and garnering electronic evidences about suspicious activities that signify threats to computer systems. Generally, these mechanisms overwhelmingly describe and record patterns of suspicious packets as alerts in the form of intrusion logs. Thereafter, analysts must subsequently validate the content of each intrusion log to asce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods of sensory augmentation through electro-tactile stimulation of the tongue

    Publication Year: 2011, Page(s):118 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A device has been constructed and a series of trials have been performed in order to demonstrate the efficacy and further advantages of an electro-tactile array mounted onto the tongue surface for the purpose of sensory augmentation. Tests have shown that by using a low resolution array a computer-human feedback loop can be successfully implemented in order to complete tasks such as object trackin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using probabilistic networks for the London plan knowledge representation

    Publication Year: 2011, Page(s):123 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    London Plan is the London mayor's strategic plan. Policy 4A puts forward the “Tackling climate change” scenario. Many research studies have analyzed the environmental and social aspects of the policy, but lack of an extensive financial assessment is identifiable. The Influence Diagrams in this paper concern financial assessment of Policy 4A.2 of the London Plan. Its nature is complex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel technique for object oriented relational database design

    Publication Year: 2011, Page(s):128 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    This paper reflects on a new method for implementing and designing object oriented relational databases. An introduction of the conventional methods is given initially. This method directly derives the database and its relational tables out of systems' classes and this is the novelty of this algorithm. Systems' class recognition is also embedded within the proposed method. Furthermore, the project... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design methodology for the verification of hybrid dynamical systems

    Publication Year: 2011, Page(s):133 - 138
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    This work presents the OHMS methodology. The main aim of it is to design a model of a complex system easy to process by formal model checking procedure. The outcome is a verification report showing safety of the system. As the novel approach the complex mathematical notation is hidden form the user and use object base approach with graphical notation. It gives the user better experience and more f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.