By Topic

2012 Fourth International Conference on Knowledge and Systems Engineering

17-19 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 45
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (657 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (657 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Virtual Environments for Enriching Student Learning

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    Higher Education faces a revolutionary opportunity for change created by the confluence of pressures from economic and societal changes along with opportunities for new modes of education offered by the advancement and widespread availability of Information and Communication Technology. Advances in learning technologies are creating opportunities to improve education in 21st century competencies s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured specification for program verification

    Publication Year: 2012, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Summary form only given, as follows. Traditionally, the focus of specification mechanism has been on improving its ability to cover a wider range of problems more accurately, while the effectiveness of verification is left to the underlying theorem provers. Our work attempts a novel approach, where the focus is on designing good specification mechanisms to achieve better expressivity (the specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shift Error Analysis in Image Based 3D Skull Feature Reconstruction

    Publication Year: 2012, Page(s):4 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    3D skull is crucial in skull-based 3D facial reconstruction [1, 2, 3, 4, 5, 6, 7, 8]. In 3D reconstruction, especially in skull-based 3D facial reconstruction, features usually play an important role. Because, the accuracy in feature detection strongly affects the accuracy of the 3D final model. In this paper, we concentrate on accuracy of 3D reconstructed skull, one important part in skull-based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Hybrid Approach of Image Segmentation Using MeanShift and Saliency Maps

    Publication Year: 2012, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    Image segmentation is an important problems in the field of image processing. In this paper, we propose a hybrid approach of image segmentation, combining MeanShift, an image segmentation method, and Saliency Maps, a regions-of-interest detection method. Our proposed method uses low-level features of color image, such as luminance, color and spatial. The results from experiments showed that our pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Bad SNPs from Illumina BeadChips Using Jeffreys Distance

    Publication Year: 2012, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Current microarray technologies are able to assay thousands of samples over million of SNPs simultaneously. Computational approaches have been developed to analyse a huge amount of data from microarray chips to understand sophisticated human genomes. The data from microarray chips might contain errors due to bad samples or bad SNPs. In this paper, we propose a method to detect bad SNPs from the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Maximum Likelihood Method for Detecting Bad Samples from Illumina BeadChips Data

    Publication Year: 2012, Page(s):26 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (885 KB) | HTML iconHTML

    Genotype data provide crucial information to understand effects of genetic variation to human health. Current microarray technologies are able to generate raw genotype data from thousands of samples across million of SNP sites. These raw data are processed by computational methods, called genotype caller, to obtain genotypes. Genotype calls of different callers might not be consistent due to noise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on 4D GIS Spatio-Temporal Data Model

    Publication Year: 2012, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The GIS applications require the attributes of semantic, space and time data. Spatial data describe the shape, size, location. Temporal data record the time of creation, loss of the space object and history of the changes are stored in the database. The modeling stage is very important first step to build a database of space-time in a GIS application. There have been many models of the authors hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying Data with Fuzzy Information in Object-Oriented Databases Based on Hedge Algebraic Semantic

    Publication Year: 2012, Page(s):39 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    In this paper, we present an approach for handling the attribute values of object classes with fuzzy and uncertain information in object-oriented database based on hedge algebraic theory. Through this approach, semantics is quantified by semantics quantitative mapping of hedge algebra in such a way that still preserves semantic order and may allow to manipulate the data on the real domain of attri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Object Identification Based on Fuzzy Object Functional Dependencies in Fuzzy Object-Oriented Databases

    Publication Year: 2012, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    In this article, we propose a method of object identification in the state of fuzzy object-oriented database schema based on different notions of fuzzy object functional dependencies. Here, fuzzy object functional dependencies allow to express constraints on attributes of arbitrary object types including the types themselves. Moreover, the different forms of object identification are also introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mutation Operators for Simulink Models

    Publication Year: 2012, Page(s):54 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    Mutation testing is a fault-based technique widely used for testing software. Particularly, it allows the effectiveness of a set of test data to be evaluated in terms of the ability to reveal faults. Nowadays, many industrial complex systems are more and more developed. Such systems require more testing activities to ensure a good quality. Simulink is one of the most popular tools to develop this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Data in Composite Web Services

    Publication Year: 2012, Page(s):60 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Service-oriented architecture (SOA) provides a solution for building information systems with reusability, flexibility, and extensibility. In SOA, new services can be developed by using existing services. BPEL is considered as the main means for composing services. In service composition, a composite service may be built from element services which belong to different administrative domains. There... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concept Learning for Description Logic-Based Information Systems

    Publication Year: 2012, Page(s):65 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The work [1] by Nguyen and Szalas is a pioneering one that uses bisimulation for machine learning in the context of description logics. In this paper we generalize and extend their concept learning method [1] for description logic-based information systems. We take attributes as basic elements of the language. Each attribute may be discrete or numeric. A Boolean attribute is treated as a concept n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the formal concept analysis algorithm to construct domain ontology

    Publication Year: 2012, Page(s):74 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Although with different purposes, both Domain Ontology and Formal Concept Analysis (FCA) are models used to present modeling concepts. FCA uses a lattice in mathematics to present concepts based on objects and attributes, whereas domain Ontology also presents concepts and is used in various areas, e.g., biology, information retrieval, information extraction, etc. In this article we propose a metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Neighborhood Influence in Text Classification

    Publication Year: 2012, Page(s):79 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Standard supervised learning approaches have been widely applied on the text classification problem. These standard approaches exploit only the local content of the document. However, the additional information in the relationship between the items can be used to improve the overall accuracy of the classification process. To make use of this information, the authors propose a statistical model to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving Block-Based Neural Network and Field Programmable Gate Arrays for Host-Based Intrusion Detection System

    Publication Year: 2012, Page(s):86 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    In this paper, we design a prototype with hybrid software-enabled detection engine on the basis of an evolving block-based neural network (BBNN), and integrate it with a Field Programmable Gate Arrays (FPGA) board to enable a real-time host-based intrusion detection system (IDS). The established prototype can feed sequence of system calls obtained from a server directly into the BBNN based IDS. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Use of Genetic Programming for Automatic Text Summarization

    Publication Year: 2012, Page(s):93 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    Text Summarization is the process of identifying and extracting the most vital information in a document. It has been seen as an effective method for dealing with increasing amount of information on the Internet nowadays. In this paper, we present an application of Genetic Programming to the problem of Automatic Text Summarization. Genetic Programming was used to evolve the function that ranks the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Efficient Sport Data Integration through Semantic Annotation

    Publication Year: 2012, Page(s):99 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB) | HTML iconHTML

    In news genre, the sport domain is one of great interest to audiences on many occasions. The explosion of Internet these days leads to many obstacles for users in searching information due to enormous amount of data collected from multiple media streams. In this case, Semantic Web is believed to bring a solution for information integration. In this paper, we introduce a novel approach for an integ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.