By Topic

Knowledge-Based Intelligent Engineering Systems and Allied Technologies, 2000. Proceedings. Fourth International Conference on

Aug. 30 2000-Sept. 1 2000

Go

Filter Results

Displaying Results 1 - 25 of 97
  • KES 2000 Fouth International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies [frontmatter]

    Publication Year: 2000, Page(s):0_1 - 0_20
    Request permission for commercial reuse | PDF file iconPDF (920 KB)
    Freely Available from IEEE
  • D*+ identification using a neural network method in νμ charged current interactions in the NOMAD experiment

    Publication Year: 2000, Page(s):784 - 787
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing decomposition methods for classification

    Publication Year: 2000, Page(s):788 - 791 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB)

    Decomposition methods for multiclass classification problems constitute a powerful framework to improve generalization capabilities of a large set of learning machines, including support vector machines and multi-layer perceptrons. We present a review of the main decomposition approach to classification and an experimental comparison of One-Per-Class (OPC), Correcting Classifiers (CC) and Error Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition in RICH counters using the Possibilistic C-Spherical Shell algorithm

    Publication Year: 2000, Page(s):792 - 795 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB)

    The pattern recognition problem in RICH counters concerns the identification of an unknown number of imperfect roughly-circular rings made of a low number of discrete points in presence of background. We present some preliminary results obtained using the Possibilistic C-Spherical Shell algorithm. In particular, we show that the algorithm is very tolerant and robust to noise (outliers rate) level.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of self tuning PID control system based on minimum variance control algorithm

    Publication Year: 2000, Page(s):874 - 877
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB)

    In this paper, we proposes design method of self tuning PID control adapted for uncertainty of plant in control which characteristic change dynamicaly. In proposal method, characteristic polynomial was designed, and minimum variance control on basis of minimization of estimation example was used. Furthermore, self tuning PID control which used stabilization technique proposed. In range of characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy queries against a crisp database over the Internet: an implementation

    Publication Year: 2000, Page(s):704 - 707 vol.2
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We present an implementation of fuzzy querying over the Internet/WWW. We advance our previous work on the topic, employing the newest developments in Internet technology. While the back-end part of the solution, i.e., the fuzzy querying engine is subject to small changes only, the user interface is completely redesigned. The question of customization of the interface and the number of network roun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building of trust evaluation model based on the failure prediction

    Publication Year: 2000, Page(s):659 - 662 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The paper suggests an effective bankruptcy avoidance behavior by a creditor. Empirical work based on actual data found the risk factor effectively in the credit accommodation from bankruptcy enterprises. An extreme validity risk factor was obtained: Information of Liability and Equity “Ile”. Ile is the decomposition analysis index developed by the author, which means the detection of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy approach to adaptive hypermedia

    Publication Year: 2000, Page(s):700 - 703 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    We present an open, concurrent model of adaptive hypermedia; all its functionality and data are completely distributed on a web of autonomous actors. The model that enables the system to interact adaptively is a fuzzy stereotype-based user model. Its presentation and application are exploited in the cooperative actor-based environment, generated from the hypermedia model. The merge of these two pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tools for shifting human context into disasters: a case-based guideline for computer-aided earthquake proofs

    Publication Year: 2000, Page(s):655 - 658 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    According to interviews with refugees of the south-Hyogo earthquake (1995, M7.2), the human processes leading to activities for protecting themselves from disaster is made of multiple steps. The paper presents a guideline for stimulating essential steps in this process by computer, which aids humans in making life earthquake-proof. Two core tools in the proposed guideline are well coordinated real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering promising new topics on the WWW

    Publication Year: 2000, Page(s):804 - 807 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The phenomenon that a `little' topic can make a big difference is called `The Tipping Point'. As a strategy for marketing this phenomenon could be a great economic opportunity. For instance, at is a good strategy to promote items associated with a certain fashion. The Tipping Point refers to a situation where the topic matches potential needs of customers. We analyze the mechanism of The Tipping P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mediating off-site electronic reference services: human-computer interactions between librarians and Web mining technology

    Publication Year: 2000, Page(s):695 - 699 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The Internet enables global dissemination and retrieval of information at any time; as a result, it has a tremendous impact on how libraries provide reference services to this new Web based clientele. One impact is the increase in off-site library users who make in-person reference interviews impossible. To serve this new clientele, academic libraries are setting up electronic reference services t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic field and accessibility relations

    Publication Year: 2000, Page(s):491 - 494 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    We give a fundamental definition of semantic fields and explain how accessibility relations can be related to semantic fields. The semantic field is then related to set theory, laws and facts, and Scott-Montague models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data fusion of multisensor data

    Publication Year: 2000, Page(s):537 - 540 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The problem of data fusion of multisensor data for multitarget tracking is considered. A hierarchical fusion system is presented for fusion of numerical data from multiple local radar stations, and a fuzzy clustering technique is introduced. Simulation results are presented for a scenario having three local radar stations and three targets with trajectories containing some type of acceleration and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The hierarchical neural network for generating an arbitrary period rhythm

    Publication Year: 2000, Page(s):772 - 775 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The living body has various biological rhythms with different periods. The nervous system is very important as a mechanism and a control for rhythm generation. However, the detailed constitution and the operating algorithm for the system are not well known for neural physiology or anatomy. We thus propose a hierarchical neural network for generating a sine wave with an arbitrary period rhythm. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding users' latent interests for recommendation by learning classifier systems

    Publication Year: 2000, Page(s):651 - 654 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Collaborative filtering often used in e-commerce applications, is a method to cluster similar users based on their profiles, characteristics or attitudes on specific subjects. The paper proposes a novel method to implement dynamic collaborative filtering by genetics based machine learning, in which we employ a learning classifier system extended to multiple environments. The characteristics of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic model of a mobile agent network suitable for performance evaluation

    Publication Year: 2000, Page(s):675 - 678 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Deals with a generic model of a mobile agent network that includes a multi-agent system and a set of processing nodes connected by a communication network. A mobile agent network is described as a queuing system where mobile agents represent the information units that must be served. Network flows related to agent hosting and migration and the serving capabilities of processing nodes are proposed.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shopping-chances in Web-pages discovered from user's access logs

    Publication Year: 2000, Page(s):800 - 803 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Recently, we have been able to obtain information easily from the WWW (World Wide Web). However, it is difficult to find the required information, because the Web space is non-linear space connected by hyperlinks which hides novel useful information. The degree of user interest can be regarded as having an intimate relationship to the number of keywords of the homepage, i.e., meaningful words for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse-oriented design of embedded systems

    Publication Year: 2000, Page(s):691 - 694 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The paper describes an object oriented model and a reuse oriented methodology for the co-design of embedded computer systems. Our approach is based on a hierarchy of classes which describes all possible specifications of systems of a certain domain, the behavior of hardware and software components, and the target architectures. The content of this knowledge base (reusable, formalized descriptions)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge based genetic algorithm for dynamic route selection

    Publication Year: 2000, Page(s):616 - 619 vol.2
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Addresses the problem of selecting a route to a given destination on a road map under a dynamic environment. The proposed solution uses a genetic algorithm adopting viral infection. The method is to use the viruses as domain-specific knowledge. A part of an arterial road is regarded as a virus. We generate a population of viruses in addition to a population of routes. Crossover and infection deter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Degrees of significance and generation of an accessibility relation

    Publication Year: 2000, Page(s):487 - 490 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The notion of degrees of significance of possible worlds under a given context are introduced and thereby a way of how an accessibility relation between possible worlds is generated. This is the first answer to the problem which was pointed out by Resconi et al. in uncertainty hierarchical metatheory View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web server future planning decision analysis-fuzzy linguistic weighted approach

    Publication Year: 2000, Page(s):826 - 830 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    In this paper, a fuzzy weighted approach is used to solve the multi-criteria decision making problem in a Web server system. The assessments of the Web server by Web administrators are assigned using linguistic terms. The overall assessments of alternatives, with respect to every criteria, are allowed by different weights using a symmetrical triangular fuzzy number with fixed interval confidence. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The genetic algorithm method for multiple depot capacitated vehicle routing problem solving

    Publication Year: 2000, Page(s):520 - 526 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Many organizations face the problem of delivering goods from a certain number of warehouses to a number of retail sites using a fleet of vehicles. The multiple depot capacitated vehicle routing problem is mathematical model that closely approximates the problem faced by many of these organizations. Because the problem is NP-hard, requiring excessive time to be solved exactly, we develop a heuristi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An inference mechanism under incomplete knowledge based on rule similarity considering viewpoint

    Publication Year: 2000, Page(s):750 - 755 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    This paper describes a mechanism that uses similarities between rules to obtain an approximate solution when the knowledge stored in the problem-solving system is incomplete. When the knowledge base does not contain rules needed to solve a problem, the problem is solved by applying similar rules. The similarities between rules are measuring considering the circumstances of the problem. A large-sca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On intelligent human intelligible routing

    Publication Year: 2000, Page(s):712 - 715 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Presents a human-intelligible approach to the solution of Internet routing problems. This paper suggests a user-friendly dialogue in the definition of customer choices as a compromise between their preferences and temporary Internet abilities. Such a compromise arises in the comparison of customer needs for timely, price-affordable, secure and safe Internet transactions with the multi-variant, add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Gabor filter-based classification for diffuse lung opacities in thin-section computed tomography images

    Publication Year: 2000, Page(s):780 - 783 vol.2
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The classification of diffuse lung opacities in thin-section computed tomography (HRCT) images is an important step of developing a computer-aided diagnosis (CAD) system. We have evaluated the performance of a Gabor filter-based classification of typical diffuse lung opacities in HRCT images. The experimental results show that the Gabor filter-based approach is an effective means of classifying di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.