Trends in Intelligent Systems and Computer Engineering

Front Cover
Oscar Castillo, Li Xu
Springer Science & Business Media, Apr 25, 2008 - Computers - 670 pages
A large international conference, Intelligent Systems and Computer Engineering, was held in Hong Kong, March 21–23, 2007, under the International MultiConf- ence of Engineers and Computer Scientists (IMECS) 2007. The IMECS 2007 is organized by the International Association of Engineers (IAENG), a nonpro?t int- national association for engineers and computer scientists. The IMECS conferences serve as good platforms for the engineering community to meet with each other and to exchange ideas. The conferences also strike a balance between theoretical and - plication development. The conference committees have been formed with over two hundred committee members who are mainly research center heads, faculty deans, department heads, professors, and research scientists from over thirty countries. The conferences are truly international meetings with a high level of participation from many countries. The response that we have received for the multiconference is - cellent. There have been more than one thousand one hundred manuscript subm- sions for the IMECS 2007. All submitted papers have gone through the peer review process and the overall acceptance rate is 58. 46%. This volume contains revised and extended research articles on intelligent s- tems and computer engineering written by prominent researchers participating in the multiconference IMECS 2007. There is huge demand, not only for theories but also applications, for the intelligent systems and computer engineering inthe society to meet the needs of rapidly developing top-end high technologies and to improve the increasing high quality of life.

From inside the book

Contents

A MetamodelAssisted SteadyState Evolution Strategy
1
An Improved Multiclassifier for Soft Fault Diagnosis of Analog
9
Robust Hybrid Sliding Mode Control for Uncertain Nonlinear
33
Using Filtering Algorithm for Partial Similarity Search on
34
A Dynamic GABased Rhythm Generator
57
A Metaoptimization
75
HumanRobot Interaction as a Cooperative Game
91
Swarm and Entropic Modeling for Landmine Detection Robots 105
104
Detecting Similar Negotiation Strategies
297
Prediction Method for Real Thai Stock Index Based on Neurofuzzy
326
Innovative Technology Management System with Bibliometrics
349
Mapping Cobweb to SQL 363
362
Partitioning Strategy for Embedded Multiprocessor FPGA Systems
395
Interpretation of Sound Tomography Image for the Recognition
409
A Secure Multiagent Intelligent Conceptual Framework
427
On Generating Algebraic Equations for A5Type Key Stream
442

The Effect of Background Knowledge in GraphBased Learning
141
Clustering Dependencies with Support Vectors 155
154
A Comparative Study of Gender Assignment in a Standard Genetic
167
PSO Algorithm for Primer Design
175
Genetic Algorithms and Heuristic Rules for Solving the Nesting
188
MCSACNN Algorithm for Image Noise Cancellation
209
An Integrated Approach Providing Exact SNP IDs from Sequences
221
PseudoReverse Approach in Genetic Evolution 233
232
Microarray Data Feature Selection Using Hybrid GAIBPSO
243
DiscreteTime Model Representations for Biochemical Pathways
255
Performance Evaluation of Decision Tree for Intrusion Detection
272
Novel and Efficient Hybrid Strategies for Constraining the Search
285
A New Solution for Protein Comparison 467
466
TopicSpecific Language Model Based on Graph Spectral Approach
497
Automatic Construction of FSA Language Model for Speech
515
Integrating Design by Contract Focusing Maximum Benefit
541
Performance Engineering for Enterprise Applications 557
556
A Framework for UMLBased Software Component Testing
575
Extending the Service Domain of an Interactive Bounded Queue
599
A Hybrid Evolutionary Approach to Cluster Detection
619
Transforming the Natural Language Text for Improving
637
Index
655
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 285 - Given a set of transactions, where each transaction is a set of items, an association rule is an expression of the form X => Y, where X and Y are sets of items. The intuitive meaning of such a rule is that transactions in a database which contain X tend to contain Y as well.
Page xiii - Korea Advanced Institute of Science and Technology, 373-1 Guseong-Dong, Yuseong-Gu, Daejeon 305-701, Republic of Korea...
Page 277 - AA .. AB AC AD AE AF AG AH .. . AI AJ AK .. - ■AL AM .. AN .. AO .. AP...
Page 252 - Using mutual information for selecting features in supervised neural net learning.
Page 231 - Altschul SF, Gish W, Miller W, Myers EW, Lipman DJ. Basic local alignment search tool.
Page 539 - Garcia-Luna-Aceves. An Efficient Routing Protocol for Wireless Networks. ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, Oct.
Page 276 - User to root (U2Su) exploits are a class of attacks where an attacker starts out with access to a normal user account on the system and is able to exploit vulnerability to gain root access to the system.
Page 220 - Cellular Neural Networks: Theory," IEEE Transactions on Circuits and Systems. vol. 35, pp. 1257-1272, Oct. 1988. [4] LO Chua and L. Yang, "Cellular Neural Networks: Applications," IEEE Transactions on Circuits and Systems, vol.
Page 284 - Third International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, pages 923-93 1 . Association for Computing Machinery, 1990.

References to this book