20-22 Nov. 2013
Filter Results
-
[Front cover]
Publication Year: 2013, Page(s): C4|
PDF (709 KB)
-
[Title page i]
Publication Year: 2013, Page(s): i|
PDF (15 KB)
-
[Title page iii]
Publication Year: 2013, Page(s): iii|
PDF (108 KB)
-
[Copyright notice]
Publication Year: 2013, Page(s): iv|
PDF (145 KB)
-
Table of contents
Publication Year: 2013, Page(s):v - xv|
PDF (159 KB)
-
Message from the Chairs
Publication Year: 2013, Page(s):xvi - xvii -
Conference Organization
Publication Year: 2013, Page(s):xviii - xxii|
PDF (252 KB)
-
Technical sponsors
Publication Year: 2013, Page(s): xxiii|
PDF (287 KB)
-
Keynotes [3 abstracts]
Publication Year: 2013, Page(s):xxiv - xxxiProvides an abstract for each of the three keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»
-
Tuning Factor the Single Input Fuzzy Logic Controller to Improve the Performances of Depth Control for Underwater Remotely Operated Vehicle
Publication Year: 2013, Page(s):3 - 7
Cited by: Papers (1)This paper investigates the factor of tuning variable parameter for Single Input Fuzzy Logic Controller (SIFLC) to improve the performances of depth control for the underwater Remotely Operated Vehicle (ROV). This study and investigates will focus on the number of rules in SIFLC, lookup table, slope of a linear equation, and also model reference to give optimum performances of depth control withou... View full abstract»
-
Uni-temporal Modelling Extension at the Object vs. Attribute Level
Publication Year: 2013, Page(s):8 - 13
Cited by: Papers (5)Today's requirement for the database systems is to provide management for historical and future valid data. Uni-temporal system is one of the most frequently used temporal structure. The time component in this system represents the row state defined validity. Standard uni-temporal solution used today has a lot of disadvantages, which influences the quality. One of the problems is based on the whol... View full abstract»
-
Keywords Similarity Based Topic Identification for Indonesian News Documents
Publication Year: 2013, Page(s):14 - 20Topic identification (TID) is a technique associated with labelling a set of textual documents with a meaningful label representing its content. TID for online news presents different problems from TID for other corpora, such as the large data volume and the frequently updated topic. Moreover, the number of developing methods for Indonesian corpus is rather small. Brace well's algorithm has been p... View full abstract»
-
Physiotherapy Exercises Recognition Based on RGB-D Human Skeleton Models
Publication Year: 2013, Page(s):21 - 29
Cited by: Papers (2)In the Western world, aging is a growing problem of the society and computer assisted treatments can facilitate the telemedicine for old people or it can help in rehabilitations of patients after sport accidents in far locations. Physical exercises play an important role in physiotherapy and RGB-D devices can be utilized to recognize them in order to make interactive computer healthcare applicatio... View full abstract»
-
Genetic Algorithms Applied to Discrete Distribution Fitting
Publication Year: 2013, Page(s):30 - 35
Cited by: Papers (3)A common problem when dealing with preprocessing of real world data for a large variety of applications, such as classification and outliers detection, consists in fitting a probability distribution to a set of observations. Traditional approaches often require the resolution of complex equations systems or the use of specialized software for numerical resolution. This paper proposes an approach t... View full abstract»
-
Behavioural Observation for Critical Infrastructure Security Support
Publication Year: 2013, Page(s):36 - 41
Cited by: Papers (3)The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation to add to the Defence in Depth (DiD). Our approach is proactive and continually looks to identify patterns or behaviour, which is out of place in the ordinary operations of the infrastructure. As this work demonstrates, applying behavioural ob... View full abstract»
-
Subject-Dependent Physical Activity Recognition Model Framework with a Semi-supervised Clustering Approach
Publication Year: 2013, Page(s):42 - 47
Cited by: Papers (2)Activity recognition systems have been found to bevery effective for tracking users' activities in research areas like healthcare and assisted living. Wearable accelerometers that can help in classifying Physical Activities (PA) have been made available by MEMS technology. State-of-the-art PAclassification systems use threshold-based techniques and Machine Learning (ML) algorithms. Each PA may exh... View full abstract»
-
PSO of Neural Networks to Predict Busy Times of Cellular Traffic for Assignment to TV Idle Channels by Cognitive Radio
Publication Year: 2013, Page(s):48 - 52
Cited by: Papers (1)Kenya has identified radio spectrum as a keydriver in its development. Yet, globally, radio spectrum is inefficiently utilized due to ITU's static spectrum allocation.In Kenya, mobile operators are running short of bandwidth due to deployment of 4G services, which enable super fast mobile broadband/internet. In the USA and UK, FCC and Ofcom, respectively, have made effort to allow opportunistic 'p... View full abstract»
-
A Novel Technique for a Power of Two Based S-Box Implementation
Publication Year: 2013, Page(s):53 - 58The S-Box is one of the major steps of the Advances Encryption Standard. Its entries are pre-computed and stored on read-only-memory lookup tables to avoid tedious real time computations using Galois Field. However, such setup is not a use-anytime any environment standard. On the one hand,storing entries of the S-Box may not be desirable for some environments. On the other hand, real time computin... View full abstract»
-
Metrics for Weight Stuck-at-Zero Fault in Sigmoidal FFANNs
Publication Year: 2013, Page(s):61 - 66
Cited by: Papers (1)In this paper, a class of weight fault model known as single weight stuck-at-zero for a single hidden layer (with sigmoidal nodes) feed forward artificial neural networks is analyzed. Fault measures/metrics are derived for weight stuck-at-zero fault. Experiments are conducted for four function approximation tasks wherein a set of 30 networks are trained for each task. A network which has a least v... View full abstract»
-
Analyzing MBSA Performance Using NetLogo
Publication Year: 2013, Page(s):67 - 72
Cited by: Papers (1)Optimizing problems are problems of finding the best feasible solution in a set of solutions. Multi Battalion Search Algorithm (MBSA) is a heuristic algorithm used to solve optimization problems by simulating battlefield strategies and tactics to find optimal or near optimal solutions. The strategy of search in MBSA consists of dividing search space into several battalions or cells. The algorithm ... View full abstract»
-
On the Performance of Sampling-Based Optimal Motion Planners
Publication Year: 2013, Page(s):73 - 78
Cited by: Papers (3)Sampling based algorithms provide efficient methods of solving robot motion planning problem. The advantage of these approaches is the ease of their implementation and their computational efficiency. These algorithms are probabilistically complete i.e. they will find a solution if one exists, given a suitable run time. The drawback of sampling based planners is that there is no guarantee of the qu... View full abstract»
-
Garbage Collection Algorithms for NAND Flash Memory Devices -- An Overview
Publication Year: 2013, Page(s):81 - 86
Cited by: Papers (4)This paper highlights the necessary garbage collection algorithms which is needed in flash translation layer (FTL) for NAND Flash memory devices such as SATA SSD's (Solid State Devices). Garbage collection is the process of freeing up partially filled blocks to make room for more data and the Garbage collection (GC) algorithms recommended here plays a key role in maintaining SSD's Performance and ... View full abstract»
-
The Control Automation System Method Based on Combined Implementation of Fuzzy Logic and Discrete Automation Systems
Publication Year: 2013, Page(s):87 - 90
Cited by: Papers (1)The article deals with the approach for synthesis of control and simulating systems based on analysis of nature language based models. We use fuzzy sets and complex numbers for the analysis, and for logical based design of control systems. Authors offer the complex method for control and simulating systems synthesis, which incorporates both fuzzy and discrete logic models. View full abstract»
-
Terrain Backscatter and Oil Sand Exploration: Initial Measurements Results
Publication Year: 2013, Page(s):91 - 96
Cited by: Papers (1)An approach to measure the relationship between sensor configuration and terrain backscatter using microwave modeling and measurement techniques is presented. Based on apriori synthetic aperture radar scattering models the investigation measured the far field electromagnetic wave reflectivity of four different barefaced terrains at microwave frequencies in an anechoic chamber. A system which inclu... View full abstract»
-
Physical-Informatical Essence-Duality-Aware Generic Modeling of Threat Handling Processes
Publication Year: 2013, Page(s):97 - 102
Cited by: Papers (1)Systems interact with real world entities, and must hold internal representations of these entities in order to handle them appropriately. Physical-informatical essence duality (PIED) is the parallel existence of the entity as both the original, usually physical source, and its informatical representation, as held by each agent interacting with the entity. The distinction between the original exte... View full abstract»