Knowledge-Based Intelligent Engineering Systems and Allied Technologies, 2000. Proceedings. Fourth International Conference on

Aug. 30 2000-Sept. 1 2000

Go

Filter Results

Displaying Results 1 - 25 of 97
  • KES 2000 Fouth International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies [frontmatter]

    Publication Year: 2000, Page(s):0_1 - 0_20
    Request permission for commercial reuse | PDF file iconPDF (920 KB)
    Freely Available from IEEE
  • D*+ identification using a neural network method in νμ charged current interactions in the NOMAD experiment

    Publication Year: 2000, Page(s):784 - 787
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing decomposition methods for classification

    Publication Year: 2000, Page(s):788 - 791 vol.2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB)

    Decomposition methods for multiclass classification problems constitute a powerful framework to improve generalization capabilities of a large set of learning machines, including support vector machines and multi-layer perceptrons. We present a review of the main decomposition approach to classification and an experimental comparison of One-Per-Class (OPC), Correcting Classifiers (CC) and Error Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition in RICH counters using the Possibilistic C-Spherical Shell algorithm

    Publication Year: 2000, Page(s):792 - 795 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB)

    The pattern recognition problem in RICH counters concerns the identification of an unknown number of imperfect roughly-circular rings made of a low number of discrete points in presence of background. We present some preliminary results obtained using the Possibilistic C-Spherical Shell algorithm. In particular, we show that the algorithm is very tolerant and robust to noise (outliers rate) level.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of self tuning PID control system based on minimum variance control algorithm

    Publication Year: 2000, Page(s):874 - 877
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB)

    In this paper, we proposes design method of self tuning PID control adapted for uncertainty of plant in control which characteristic change dynamicaly. In proposal method, characteristic polynomial was designed, and minimum variance control on basis of minimization of estimation example was used. Furthermore, self tuning PID control which used stabilization technique proposed. In range of characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure diagnosis method for machinery in unsteady operating condition by instantaneous power spectrum and genetic programming

    Publication Year: 2000, Page(s):640 - 643 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The paper proposes a failure diagnosis method for machinery in unsteady operating condition using instantaneous power spectrum (IPS) and genetic programming (GP). The IPS is used to extract feature frequency of each machine state from measured vibration signal for distinguishing failures by the Relative Crossing Information (RCI). Excellent symptom parameters for detecting failures are automatical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of blade contamination in turbine flowmeters using neural networks

    Publication Year: 2000, Page(s):635 - 639 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The accumulation of contaminating materials on the rotor blades of a gas turbine flowmeter is a condition of concern to the manufacturers, since it can lead to loss of calibration. Over time, a deposit of tar and heavy oil mixed with sand and dust can build up on the rotor blades, which causes the meter factor to change from its original value of calibration. A novel neural network technique is de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic model of a mobile agent network suitable for performance evaluation

    Publication Year: 2000, Page(s):675 - 678 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Deals with a generic model of a mobile agent network that includes a multi-agent system and a set of processing nodes connected by a communication network. A mobile agent network is described as a queuing system where mobile agents represent the information units that must be served. Network flows related to agent hosting and migration and the serving capabilities of processing nodes are proposed.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An impression-based retrieval system of music collection

    Publication Year: 2000, Page(s):856 - 859 vol.2
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Recently, we have been able to create multimedia contents easily without individual recourse to each medium. Often one needs to select data to match one's impressions from a medium with which one is unfamiliar. We propose a retrieval method for music using “impression” words. The characteristic of the proposed method is the use of the “affective value” of the musical piece ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robot end-effector based sensor integration for tracking moving parts

    Publication Year: 2000, Page(s):628 - 634 vol.2
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper presents a cost-efficient end-effector based infrared proximity sensor integration system and the implementation of a fuzzy logic control algorithm. End-effector sensor outputs are incorporated in a fuzzy logic control algorithm to make the robotic manipulator grasp objects on a moving conveyor belt. The robot movements are going to be the result of the comparative measurements made by t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty and the semantic field

    Publication Year: 2000, Page(s):581 - 584 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    In this paper, we describe a method by which several kinds of uncertainty, represented by probability, fuzzy sets and the Dempster-Shafer theory of evidence, can be formulated in the semantic field View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilization of differential evolution in inverse kinematics solution of a parallel redundant manipulator

    Publication Year: 2000, Page(s):812 - 815 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    A novel type of redundant parallel manipulator is presented and studied. The inverse kinematics model of the manipulator is postulated. The static stiffness of the manipulator is discussed. To achieve a minimum deflection in the solution of the inverse kinematics problem the differential evolution method is used. In the inverse kinematics solution also the appropriate link motions to avoid collisi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust knowledge-based technique for ischemia detection in noisy ECGs

    Publication Year: 2000, Page(s):768 - 771 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    In cases where the signal-to-noise ratio (SNR) in ECGs is very poor, the correct definition of characteristics such as the isoelectric line and the J-point (beginning of the ST segment) is difficult. Inaccurate definition of those ECG characteristics can lead an automated ischemia detector to an incorrect diagnosis. We propose a method capable of extracting from noisy long duration ECG recordings ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-linear control with neural networks

    Publication Year: 2000, Page(s):868 - 873 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    This paper is concerned with a non-linear self-tuning tracking problem using back-propagation (BP) neural learning and system identification techniques. Traditional self-tuning adaptive control techniques can only deal with linear systems or special nonlinear systems. BP neural networks have the capability to learn arbitrary non-linearities and show great potential for adaptive control application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generalized regression neural network for logo recognition

    Publication Year: 2000, Page(s):475 - 478 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    One of the primary concerns of document analysis systems is logo or trademark recognition, but few solutions proposed to date can deal with the problem of successfully classifying a logo that has been distorted in scale or rotation. We propose the use of a two-stage method applying a generalised regression neural network to provide the necessary flexibility to cope with these variations. A novel m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk classifiers and generalized perceptrons

    Publication Year: 2000, Page(s):720 - 723 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Risk classification of financial institutions is analyzed in the case where several risk classes are present. It is shown that the classical scoring systems (simple perceptrons) may no longer provide sufficient storage capacity in this case (no matter which learning algorithm is employed). Hence, a generalized version of the perceptron, which increases the storage capacity, is considered. It is ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based generic intelligent network model

    Publication Year: 2000, Page(s):671 - 673 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    An intelligent network provides information processing, retrieval and transfer services for an arbitrary number of users in a transparent way. The architecture proposed is based on the demand-driven information processing model with static or dynamic task allocation over inhomogeneous or homogeneous resource types and network structures. Such a system can be modelled as having logical, temporal an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emotion-based planning evaluation method

    Publication Year: 2000, Page(s):852 - 855 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    It has been suggested by a number of researchers that emotional systems in agents might have great practical value. We propose a system that makes a decision about a plan, basing its judgment on emotion (i.e. pleasure/displeasure) extracted from knowledge, in an attempt to build a human-like computer agent, better able to communicate with users. We present an emotion-based plan evaluation method, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient backpropagation for RBF networks

    Publication Year: 2000, Page(s):624 - 627 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Many algorithms have been proposed in order to train radial basis function (RBF) networks. Resilient Backpropagation (RPROP) with a weight decay term is proposed to train RBF networks and used to differentiate surfaces of 3D objects in range images and to classify eight different machine learning data sets for classification purposes. We show the advantages of resilient backpropagation for the RBF... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new inequality for VQ image coding

    Publication Year: 2000, Page(s):577 - 580 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    One of the important factors for image coding of vector quantization (VQ) is the response time of encoding. A new inequality is derived for efficient codeword search of vector quantization. This new inequality is applied to VQ image coding. Experimental results confirm the derivation of the new inequality compared with the method of using the previous vector candidate and triangular inequality eli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational capabilities of linear recursive networks

    Publication Year: 2000, Page(s):462 - 465 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Recursive neural networks are a new connectionist model introduced for processing graphs. Linear recursive networks are a special subclass where the neurons have linear activation functions. The approximation properties of recursive networks are tightly connected to the possibility of distinguishing the patterns by generating a different internal encoding for each input of the domain. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a knowledge based system for computer aided diagnosis

    Publication Year: 2000, Page(s):549 - 552 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    In this paper we present a method for building a knowledge based system for computer aided diagnosis. This method concerns specification, operationalization and validation of expert knowledge. First, it consists in defining an acquisition model adapted to this kind of knowledge in terms of extended event graphs. Then the model is operationalized by using the DEVS formalism. The obtained model can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible query techniques for well-formed XML documents

    Publication Year: 2000, Page(s):708 - 711 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    An increasing number of XML (eXtensible Markup Language) documents available on the World Wide Web have no document type definition (DTD); still, most current query languages for XML rely on the user knowing the DTD when composing queries on XML data. In this paper, a flexible query model for well-formed XML documents without DTDs is outlined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building of trust evaluation model based on the failure prediction

    Publication Year: 2000, Page(s):659 - 662 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The paper suggests an effective bankruptcy avoidance behavior by a creditor. Empirical work based on actual data found the risk factor effectively in the credit accommodation from bankruptcy enterprises. An extreme validity risk factor was obtained: Information of Liability and Equity “Ile”. Ile is the decomposition analysis index developed by the author, which means the detection of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An aiding system for Internet surfings by associations: get one through chances

    Publication Year: 2000, Page(s):808 - 811 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Most Internet users use search engines to find information according to their intentions. However, this approach excludes serendipity; that is, opportunities exist on other routes from the most direct. We propose a system to assist Internet surfing which employs a search engine. This system reminds users of potential interest by supplying keywords related to search keywords. As many of words do no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.