By Topic

# Knowledge-Based Intelligent Engineering Systems and Allied Technologies, 2000. Proceedings. Fourth International Conference on

## Filter Results

Displaying Results 1 - 25 of 97
• ### KES 2000 Fouth International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies [frontmatter]

Publication Year: 2000, Page(s):0_1 - 0_20
| PDF (920 KB)
• ### D*+ identification using a neural network method in νμ charged current interactions in the NOMAD experiment

Publication Year: 2000, Page(s):784 - 787
| | PDF (338 KB)

First Page of the Article
View full abstract»

• ### Comparing decomposition methods for classification

Publication Year: 2000, Page(s):788 - 791 vol.2
Cited by:  Papers (6)
| | PDF (390 KB)

Decomposition methods for multiclass classification problems constitute a powerful framework to improve generalization capabilities of a large set of learning machines, including support vector machines and multi-layer perceptrons. We present a review of the main decomposition approach to classification and an experimental comparison of One-Per-Class (OPC), Correcting Classifiers (CC) and Error Co... View full abstract»

• ### Pattern recognition in RICH counters using the Possibilistic C-Spherical Shell algorithm

Publication Year: 2000, Page(s):792 - 795 vol.2
Cited by:  Papers (1)
| | PDF (353 KB)

The pattern recognition problem in RICH counters concerns the identification of an unknown number of imperfect roughly-circular rings made of a low number of discrete points in presence of background. We present some preliminary results obtained using the Possibilistic C-Spherical Shell algorithm. In particular, we show that the algorithm is very tolerant and robust to noise (outliers rate) level.... View full abstract»

• ### The design of self tuning PID control system based on minimum variance control algorithm

Publication Year: 2000, Page(s):874 - 877
| | PDF (369 KB)

In this paper, we proposes design method of self tuning PID control adapted for uncertainty of plant in control which characteristic change dynamicaly. In proposal method, characteristic polynomial was designed, and minimum variance control on basis of minimization of estimation example was used. Furthermore, self tuning PID control which used stabilization technique proposed. In range of characte... View full abstract»

• ### Fuzzy queries against a crisp database over the Internet: an implementation

Publication Year: 2000, Page(s):704 - 707 vol.2
Cited by:  Papers (5)  |  Patents (1)
| | PDF (384 KB)

We present an implementation of fuzzy querying over the Internet/WWW. We advance our previous work on the topic, employing the newest developments in Internet technology. While the back-end part of the solution, i.e., the fuzzy querying engine is subject to small changes only, the user interface is completely redesigned. The question of customization of the interface and the number of network roun... View full abstract»

• ### Building of trust evaluation model based on the failure prediction

Publication Year: 2000, Page(s):659 - 662 vol.2
| | PDF (228 KB)

The paper suggests an effective bankruptcy avoidance behavior by a creditor. Empirical work based on actual data found the risk factor effectively in the credit accommodation from bankruptcy enterprises. An extreme validity risk factor was obtained: Information of Liability and Equity “Ile”. Ile is the decomposition analysis index developed by the author, which means the detection of t... View full abstract»

• ### A fuzzy approach to adaptive hypermedia

Publication Year: 2000, Page(s):700 - 703 vol.2
Cited by:  Papers (3)
| | PDF (360 KB)

We present an open, concurrent model of adaptive hypermedia; all its functionality and data are completely distributed on a web of autonomous actors. The model that enables the system to interact adaptively is a fuzzy stereotype-based user model. Its presentation and application are exploited in the cooperative actor-based environment, generated from the hypermedia model. The merge of these two pa... View full abstract»

• ### Tools for shifting human context into disasters: a case-based guideline for computer-aided earthquake proofs

Publication Year: 2000, Page(s):655 - 658 vol.2
| | PDF (400 KB)

According to interviews with refugees of the south-Hyogo earthquake (1995, M7.2), the human processes leading to activities for protecting themselves from disaster is made of multiple steps. The paper presents a guideline for stimulating essential steps in this process by computer, which aids humans in making life earthquake-proof. Two core tools in the proposed guideline are well coordinated real... View full abstract»

• ### Discovering promising new topics on the WWW

Publication Year: 2000, Page(s):804 - 807 vol.2
| | PDF (368 KB)

The phenomenon that a little' topic can make a big difference is called The Tipping Point'. As a strategy for marketing this phenomenon could be a great economic opportunity. For instance, at is a good strategy to promote items associated with a certain fashion. The Tipping Point refers to a situation where the topic matches potential needs of customers. We analyze the mechanism of The Tipping P... View full abstract»

• ### Mediating off-site electronic reference services: human-computer interactions between librarians and Web mining technology

Publication Year: 2000, Page(s):695 - 699 vol.2
| | PDF (432 KB)

The Internet enables global dissemination and retrieval of information at any time; as a result, it has a tremendous impact on how libraries provide reference services to this new Web based clientele. One impact is the increase in off-site library users who make in-person reference interviews impossible. To serve this new clientele, academic libraries are setting up electronic reference services t... View full abstract»

• ### Semantic field and accessibility relations

Publication Year: 2000, Page(s):491 - 494 vol.2
| | PDF (240 KB)

We give a fundamental definition of semantic fields and explain how accessibility relations can be related to semantic fields. The semantic field is then related to set theory, laws and facts, and Scott-Montague models View full abstract»

• ### Data fusion of multisensor data

Publication Year: 2000, Page(s):537 - 540 vol.2
| | PDF (232 KB)

The problem of data fusion of multisensor data for multitarget tracking is considered. A hierarchical fusion system is presented for fusion of numerical data from multiple local radar stations, and a fuzzy clustering technique is introduced. Simulation results are presented for a scenario having three local radar stations and three targets with trajectories containing some type of acceleration and... View full abstract»

• ### The hierarchical neural network for generating an arbitrary period rhythm

Publication Year: 2000, Page(s):772 - 775 vol.2
| | PDF (220 KB)

The living body has various biological rhythms with different periods. The nervous system is very important as a mechanism and a control for rhythm generation. However, the detailed constitution and the operating algorithm for the system are not well known for neural physiology or anatomy. We thus propose a hierarchical neural network for generating a sine wave with an arbitrary period rhythm. The... View full abstract»

• ### Finding users' latent interests for recommendation by learning classifier systems

Publication Year: 2000, Page(s):651 - 654 vol.2
| | PDF (368 KB)

Collaborative filtering often used in e-commerce applications, is a method to cluster similar users based on their profiles, characteristics or attitudes on specific subjects. The paper proposes a novel method to implement dynamic collaborative filtering by genetics based machine learning, in which we employ a learning classifier system extended to multiple environments. The characteristics of the... View full abstract»

• ### Generic model of a mobile agent network suitable for performance evaluation

Publication Year: 2000, Page(s):675 - 678 vol.2
Cited by:  Papers (4)
| | PDF (276 KB)

Deals with a generic model of a mobile agent network that includes a multi-agent system and a set of processing nodes connected by a communication network. A mobile agent network is described as a queuing system where mobile agents represent the information units that must be served. Network flows related to agent hosting and migration and the serving capabilities of processing nodes are proposed.... View full abstract»

• ### Shopping-chances in Web-pages discovered from user's access logs

Publication Year: 2000, Page(s):800 - 803 vol.2
| | PDF (248 KB)

Recently, we have been able to obtain information easily from the WWW (World Wide Web). However, it is difficult to find the required information, because the Web space is non-linear space connected by hyperlinks which hides novel useful information. The degree of user interest can be regarded as having an intimate relationship to the number of keywords of the homepage, i.e., meaningful words for ... View full abstract»

• ### Reuse-oriented design of embedded systems

Publication Year: 2000, Page(s):691 - 694 vol.2
Cited by:  Papers (2)
| | PDF (312 KB)

The paper describes an object oriented model and a reuse oriented methodology for the co-design of embedded computer systems. Our approach is based on a hierarchy of classes which describes all possible specifications of systems of a certain domain, the behavior of hardware and software components, and the target architectures. The content of this knowledge base (reusable, formalized descriptions)... View full abstract»

• ### Knowledge based genetic algorithm for dynamic route selection

Publication Year: 2000, Page(s):616 - 619 vol.2
Cited by:  Papers (15)  |  Patents (2)
| | PDF (300 KB)

Addresses the problem of selecting a route to a given destination on a road map under a dynamic environment. The proposed solution uses a genetic algorithm adopting viral infection. The method is to use the viruses as domain-specific knowledge. A part of an arterial road is regarded as a virus. We generate a population of viruses in addition to a population of routes. Crossover and infection deter... View full abstract»

• ### Degrees of significance and generation of an accessibility relation

Publication Year: 2000, Page(s):487 - 490 vol.2
| | PDF (280 KB)

The notion of degrees of significance of possible worlds under a given context are introduced and thereby a way of how an accessibility relation between possible worlds is generated. This is the first answer to the problem which was pointed out by Resconi et al. in uncertainty hierarchical metatheory View full abstract»

• ### Web server future planning decision analysis-fuzzy linguistic weighted approach

Publication Year: 2000, Page(s):826 - 830 vol.2
| | PDF (328 KB)

In this paper, a fuzzy weighted approach is used to solve the multi-criteria decision making problem in a Web server system. The assessments of the Web server by Web administrators are assigned using linguistic terms. The overall assessments of alternatives, with respect to every criteria, are allowed by different weights using a symmetrical triangular fuzzy number with fixed interval confidence. ... View full abstract»

• ### The genetic algorithm method for multiple depot capacitated vehicle routing problem solving

Publication Year: 2000, Page(s):520 - 526 vol.2
Cited by:  Papers (2)
| | PDF (540 KB)

Many organizations face the problem of delivering goods from a certain number of warehouses to a number of retail sites using a fleet of vehicles. The multiple depot capacitated vehicle routing problem is mathematical model that closely approximates the problem faced by many of these organizations. Because the problem is NP-hard, requiring excessive time to be solved exactly, we develop a heuristi... View full abstract»

• ### An inference mechanism under incomplete knowledge based on rule similarity considering viewpoint

Publication Year: 2000, Page(s):750 - 755 vol.2
Cited by:  Patents (2)
| | PDF (444 KB)

This paper describes a mechanism that uses similarities between rules to obtain an approximate solution when the knowledge stored in the problem-solving system is incomplete. When the knowledge base does not contain rules needed to solve a problem, the problem is solved by applying similar rules. The similarities between rules are measuring considering the circumstances of the problem. A large-sca... View full abstract»

• ### On intelligent human intelligible routing

Publication Year: 2000, Page(s):712 - 715 vol.2
Cited by:  Papers (2)
| | PDF (404 KB)

Presents a human-intelligible approach to the solution of Internet routing problems. This paper suggests a user-friendly dialogue in the definition of customer choices as a compromise between their preferences and temporary Internet abilities. Such a compromise arises in the comparison of customer needs for timely, price-affordable, secure and safe Internet transactions with the multi-variant, add... View full abstract»

• ### A Gabor filter-based classification for diffuse lung opacities in thin-section computed tomography images

Publication Year: 2000, Page(s):780 - 783 vol.2
Cited by:  Papers (5)  |  Patents (2)
| | PDF (248 KB)

The classification of diffuse lung opacities in thin-section computed tomography (HRCT) images is an important step of developing a computer-aided diagnosis (CAD) system. We have evaluated the performance of a Gabor filter-based classification of typical diffuse lung opacities in HRCT images. The experimental results show that the Gabor filter-based approach is an effective means of classifying di... View full abstract»