By Topic

2014 International Conference on Computational Science and Computational Intelligence

10-13 March 2014

Go

Filter Results

Displaying Results 1 - 25 of 82
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (838 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Message from Program and General Co-chairs

    Publication Year: 2014, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xv - xix
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Keynote Talk

    Publication Year: 2014, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (34 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiscale Contact Mechanics of Ankle Joint Implant: Comparison of Two Implant Models

    Publication Year: 2014, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    This paper compares two different types of ankle implants. The first is the cylinder-cylinder configuration in conformal contact and the second involves a cylinder-flat in contact. The interaction of implant rough surfaces including both elastic and plastic deformations is included in the contact model. The tibia and the talus surfaces are treated as macroscopically conforming cylinders in the fir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete Time Evolution of Proteomic Biomarkers

    Publication Year: 2014, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    We measured a panel of 12 cytokines in seven different populations: i.e., healthy non-smokers, healthy smokers, COPD, Aden carcinoma and Squamous cell carcinoma of the lung. From these 12 biomarkers of host response to lung disease we have developed a computational and visual model that reliably distinguishes these clinical types. Protein biomarker behavior models are developed as the topological ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Sliding Mode Position Control for Electrical Motors

    Publication Year: 2014, Page(s):17 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    An adaptive sliding mode position control for induction motors using field oriented control theory is presented. The proposed sliding-mode control law incorporates an adaptive switching gain to avoid calculating an upper limit of the system uncertainties. The design incorporates a flux estimator that operates on the principle of flux and current observer. The proposed observer is basically an esti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of a Semi-autonomic Data Stream Query Processing Testbed

    Publication Year: 2014, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    This work describes the design and implementation of data stream query processing system built with two goals in mind. The main goal is to create a single-user data stream query processing system designed for small to medium scale live-data applications and for querying large datasets. The system will have features such as minimal setup and configuration, an easy-to-use yet powerful query language... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tamper Resistance Verification Method for Consumer Security Products

    Publication Year: 2014, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Consumer security products handling confidential information are secured by encrypting data. The encryption standard, which has been widely diffused in recent years, is certified that its decryption is computationally impossible. However, it was recently reported that even if an encryption algorithm is theoretically secured, when the algorithm is incorporated into hardware, confidential informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perceived Barriers and Benefits of Web Based Services

    Publication Year: 2014, Page(s):34 - 39
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Rapid developments in information communication and technology have set the pace for an electronic revolution leading to emergence of electronic services. Although, the pace with which electronic services are made available and accepted is lower than planned or expected. Therefore, it has been indicated that certain barriers exist which hinder the adoption of e-services. This paper aims to underst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CETD Matrix Approach to Analyze the Dimensions of Personality of Person

    Publication Year: 2014, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    The objective of this paper is to find out the peak age of person getting anger in Chennai, for that we study the dimensions of personality of person. Personality has been classified in to five factors as Openness, Conscientiousness, Extraversion, Agreeableness and Negative Emotion. Each of these dimensions has six facets. For the first time in 1998 fuzzy matrix theory was developed by W.B. Vasant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reactive Presentation Support System Based on a Slide Object Manipulation Method

    Publication Year: 2014, Page(s):46 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1414 KB) | HTML iconHTML

    We realized a system that provides manipulations of slide objects to enable users to give a reactive presentation. The "reactive presentation'' means a presentation that can immediately react an unexpected context change. A presenter requires applying the presentation to the unexpected context such as the state of audiences, unexpected questions and audiences' knowledge. Attention controls by anim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified Balanced Assignment Problem in Vector Case: System Construction Problem

    Publication Year: 2014, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    We consider a combinatorial problem that arises from systems' construction. Each system consists of many components, and every component has its own error expressed in a vector. It is required to make the combination that minimizes as small as possible the difference between the maximum error and the minimum one. It means the vector case's balanced optimization problem. In this paper, we consider ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent System Development and Integration for Cloud Computing

    Publication Year: 2014, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Many "big data" software systems are not interactive, automated, or run in a real-time mode. The true utility of cloud computing and "big data systems" can be increased by providing an execution framework and control software that is native to cloud architectures and supports interactivity and time synchronization. In addition, a framework to integrate different artificial intelligence and machine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the Principles of Bayesian Statistics to Improve the Performances of Medical Diagnostic Tests

    Publication Year: 2014, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The study analyzed diagnostic data from 432 patients evaluated in the emergency department for shortness of breath. Electronically recorded heart sounds and brain natriuretic peptide (BNP) were analyzed to determine whether left ventricular systolic dysfunction (LVSD) with heart failure caused each patient's symptoms. In each patient's computerized digital electrocardiogram, measurements of the du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced First-Fit Decreasing Algorithm for Energy-Aware Job Scheduling in Cloud

    Publication Year: 2014, Page(s):69 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    With the emerging of many data centers around the globe, heavy loads of large-scale commercial and scientific applications executed in the cloud call for efficient cloud resource management strategies to save energy without compromising the performance and system throughput. According to the statistics from the Data Centre Dynamic (DCD) organization, the expected energy consumption by computer ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Based C4I Systems: Security Requirements and Concerns

    Publication Year: 2014, Page(s):75 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in military, emergency response, and in disaster management etc. Due to the sensitive nature of domains and applications of these systems, quality could never be compromised. C4I systems are resource demanding system, their expansion or up gradation for the sake of impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Process Mining Approach Based on the Markov Transition Matrix

    Publication Year: 2014, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    According to the situation that many workflow instances may deviate from the predefined model, this paper proposed a new process mining approach based on analyzing the workflow log to realize the workflow process reconstruction. First, build the Markov transition matrix based on the workflow log, then design a multi-step process mining algorithm to mine the structural relationships between the act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Web Browsing Activities for User Needs Identification

    Publication Year: 2014, Page(s):86 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2085 KB) | HTML iconHTML

    Browsing sessions are rich in elements useful to build profiles of user interests, but at the same time HTML pages include noise data, such as ads and navigation menus. Moreover, pages might cover several different topics. For these reasons they are often ignored in personalized approaches. We propose a novel approach for implicitly recognizing valuable text descriptions of current user needs base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downscaling Interest In Interest Rates

    Publication Year: 2014, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    During periods of high interest rates, businesses utilize their own capital, merge with other businesses, or diversify, and borrow when it is absolutely necessary. People also avoid hardship through refinancing during economic slowdowns because interest rates are low enough to recover some of their income and lower debt-interest. High interest rates are more inviting to investments although hard t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.