Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIIRajiv Khosla Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Paci?c Rim. The KES conferences cover a wide range of intelligent systems topics. The broad focus of the conference series is the theory and applications of intelligent systems. From a pure research ?eld, intel- gent systems have advanced to the point where their abilities have been incorporated into many business and engineering application areas. KES 2005 provided a valuable mechanism for delegates to obtain an extensive view of the latest research into a range of intelligent-systems algorithms, tools and techniques. The conference also gave de- gates the chance to come into contact with those applying intelligent systems in diverse commercial areas. The combination of theory and practice represented a unique opp- tunity to gain an appreciation of the full spectrum of leading-edge intelligent-systems activity. The papers for KES 2005 were either submitted to invited sessions, chaired and organized by respected experts in their ?elds, or to a general session, managed by an extensive International Program Committee, or to the Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) Workshop, managed by an International Workshop Technical Committee. |
Contents
1 | |
Excluding Fitness Helps Improve Robustness of Evolutionary Algorithms | 8 |
Testing Voice Mimicry with the YOHO Speaker Verification Corpus | 15 |
The Effect of Alteration in Service Environments | 16 |
A RS Approach to Trends Breaks Detection | 21 |
Image Multinoise Removal via Levy Process Analysis | 22 |
Multilevel Semantic Analysis for Sports Video | 24 |
Applying Extending Classifier System to Develop an OptionOperation | 27 |
Annealing Sensor Networks | 581 |
Measuring Global Behaviour of Multiagent Systems | 587 |
Recognizing and Simulating Sketched Logic Circuits | 588 |
Color Image Restoration Using Explicit Local Segmentation | 589 |
A Lossless Watermarking Technique for Halftone Images | 593 |
In Use Parameter Estimation of Inertial Sensors | 595 |
Information Engineering and Ubiquitous Computing | 602 |
Optimal Design Using Clonal Selection Algorithm | 604 |
Evaluating the Size of the SOAP for Integration in B2B | 29 |
Learning Plans with Patterns of Actions in BoundedRational Agents | 30 |
Aerial Photograph Image Retrieval Using the MPEG7 Texture Descriptors | 31 |
Applying TwoStage XCS Model on Global Overnight Effect | 34 |
Personalised Search on Electronic Information | 35 |
Yet Another Induction Algorithm | 37 |
Intelligent Network Based Education | 41 |
Data Mining Coupled Conceptual Spaces for Intelligent Agents | 42 |
An Implementation of Learning Classifier Systems | 45 |
Probabilistic Reasoning Techniques for the Tactical Military Domain | 46 |
Network Based Engineering Design Education | 48 |
Data Mining and Soft Computing Applications II | 49 |
ImmunityBased Systems | 53 |
Representative Term Based Feature Selection Method | 56 |
An Optimization Approach for Feature Selection in an Electric Billing Database | 57 |
The Design and Implementation | 62 |
Integrating Relation and Keyword Matching in Information Retrieval | 64 |
Emergence of Immune Memory and Tolerance | 65 |
Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized Networks | 69 |
Mutual Repairing System Using ImmunityBased Diagnostic Mobile Agent | 72 |
Production Testing of Spark Plugs Using a Neural Network | 74 |
A CaseBased Reasoning Approach to Formulating University Timetables | 76 |
A Network Selfrepair by Spatial Strategies in Spatial Prisoners Dilemma | 79 |
Variable Neighborhood Search with Permutation Distance for QAP | 81 |
A Critical Phenomenon in a Selfrepair Network by Mutual Copying | 86 |
Estimation of the Optimal Number of ClusterHeads in Sensor Network | 87 |
Using Rough Set to Induce Comparative Knowledge and Its Use in SARS Data | 89 |
An Application of Information Retrieval Technique | 90 |
A Worm Filter Based on the Number of Unacknowledged Requests | 93 |
Mining Class Association Rules with Artificial Immune System | 94 |
Comparison of Wavenet and Neuralnet for System Modeling | 100 |
Efficient Migration Scheme Using Backward Recovery Algorithm | 101 |
Detecting isa and partof Relations in Heterogeneous Data Flow | 104 |
Skill Acquisition and Ubiquitous Human Computer Interaction | 108 |
Medical Diagnosis | 116 |
Generate Context Metadata Based on Biometric System | 119 |
An Incremental FPGrowth Web Content Mining | 121 |
Performance Comparison for MLP Networks | 123 |
Contribution of Biological Studies to the Understanding and Modeling | 124 |
Relative Magnitude of Gaussian Curvature from Shading Images | 128 |
Combining Machine Learned and Heuristic Rules Using GRDR | 131 |
A RuleBased and ComputationIndependent Business Modelling Language | 134 |
Web Access Path Prediction Using Fuzzy Case Based Reasoning | 135 |
Automatic Detection of Breast Tumours from Ultrasound Images | 138 |
Indoor Location Determination Using a Topological Model | 143 |
An Automatic Body ROI Determination for 3D Visualization | 145 |
Design and Implement a Web News Retrieval System | 149 |
A Promising Symbiosis | 154 |
Soft Computing and Their Applications IV | 157 |
Development of Engineering Ontology on the Basis of IDEF0 Activity Model | 162 |
Integrating Service Registries with OWLS Ontologies | 163 |
A Novel Approach to Retrosynthetic Analysis | 169 |
On Selforganising Diagnostics in Impact Sensing Networks | 170 |
Intelligent Hybrid Systems and Control | 172 |
Reconfigurable PowerAware Scalable Booth Multiplier | 176 |
Effective Information Sharing Using Concept Mapping | 177 |
Base Reference Analytical Hierarchy Process for Engineering Process Selection | 184 |
Hybrid Filter Fusion for Robust Visual Information Processing | 186 |
Enterprise Information System Contextual Ontologies Project | 191 |
Study on the Development of Design Rationale Management System | 198 |
An HILS and RCP Based Interworking Scheme for Computational Evaluation | 200 |
Combining Demographic Data with Collaborative Filtering | 201 |
Intelligent Agent Technology and Applications I | 205 |
Computer Vision Image Processing and Retrieval | 206 |
AgentBased Software Architecture for Simulating Distributed Negotiation | 212 |
Bayesian Inference Driven Behavior Network Architecture | 214 |
An AgentEnhanced Workflow Management System | 215 |
A Multiagent Framework for NET | 219 |
Face Recognition by Multiple Classifiers a DivideandConquer Approach | 225 |
On an IT Security Framework | 226 |
Toward ImprovementOriented Reuse of Experience | 228 |
Investigating the Transport Communicating Rates of Wireless Networks | 233 |
A Fast Image Retrieval Using the Unification Search Method | 240 |
Utilizing Active Software to Capture Tacit Knowledge for Strategic Use | 242 |
EmotionBased Smart Recruitment System | 243 |
Forming Proactive Team Cooperation by Observations | 247 |
Communicative Intelligence II | 255 |
Research on Confidential Level Extended BLP Model | 257 |
Emotional Extraction System by Using the Color Combination | 258 |
Development and Implementation | 261 |
Mining Internet Data Sets for Computational Grids | 268 |
A Seal Imprint Verification with Rotation Invariance | 272 |
Towards Using FirstPerson Shooter Computer Games | 276 |
Robust Authenticated Encryption Scheme with Message Linkages | 281 |
An Empirical Analysis | 282 |
ContextAware Computing Based Adaptable Heart | 284 |
A New Approach for Conflict Resolution of Authorization | 290 |
Analysis of Conversation Quanta for Conversational Knowledge Circulation | 296 |
Human Face Detection Using Skin Color Context Awareness | 298 |
Improved Video Watermark Detection | 300 |
Data Engineering Knowledge Engineering and Ontologies | 304 |
A Covert Timing ChannelFree Optimistic Concurrency Control Scheme | 310 |
Reversible Watermarking Based on Improved Patchwork Algorithm | 317 |
A Unifying Ontology Modeling for Knowledge Management | 318 |
An Evolvable Hardware System Under Uneven Environment | 319 |
The Efficient Multipurpose Convertible Undeniable Signature Scheme | 325 |
On KnowledgeBased Editorial Design System | 332 |
Features and Issues | 336 |
A Study on the Correction of Gun Fire Error Using Neural Network | 339 |
An OCR Postprocessing Approach Based on Multiknowledge | 346 |
Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler | 350 |
Calendars and Topologies as Types | 352 |
An Experimental Comparison on Gabor Wavelet | 353 |
Mining Quantitative Data Based on Tolerance Rough Set Model | 359 |
Iris Pattern Recognition Using Fuzzy LDA Method | 364 |
Precise Segmentation Rendering for Medical Images | 366 |
Precision Tracking Basedon Fuzzy Reasoning Segmentation | 371 |
InformationBased Pruning for Interesting Association Rule Mining | 372 |
Fuzzy Lowpass Filtering | 378 |
Fast Video Retrieval via the Statistics of Motion Within the RegionsofInterest | 381 |
Intelligent Data Analysis and Applications II | 382 |
Fuzzy Logic Based Intelligent Tool for Databases | 386 |
A New CellBased Clustering Method | 391 |
Knowledge Representation and Its Practical Application | 393 |
Design of a Digital Forensics Image Mining System | 395 |
A Multistage FuzzyGrey Approach to Analyzing Software Development Cost | 396 |
Meeting the Need for Knowledge Management in Schools | 403 |
Advanced Network Application | 405 |
A Method for Acquiring Fingerprint by Linear Sensor | 410 |
Improved Image Coding with Classified VQ and SideMatch VQ | 411 |
Evaluating the Functioning of Rules | 416 |
Capturing Window Attributes for Extending Web Browsing History Records | 418 |
Using Bayesian Networks for Modeling Students Learning Bugs | 422 |
Creativitiy Support Environment and Its Social Applications | 423 |
Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm | 425 |
Temporal Knowledge Representation and Reasoning Model | 430 |
Position Estimation for Goods Tracking System Using Mobile Detectors | 431 |
Computerized Support for Idea Generation | 437 |
Improving Image Quality for JPEG Compression | 442 |
The Architecture to Implement the Home Automation Systems | 445 |
Approaches and Methods into Security Engineering III | 446 |
PersonCentered Care as Creative Problem Solving | 451 |
Separated Ethernet Algorithm for Intelligent Building Network Integration | 452 |
Efficient Revocation of Security Capability | 453 |
Multimedia Signal Processing | 456 |
Approaches and Methods of Security Engineering I | 459 |
A Study on PrivacyRelated Considerations | 460 |
A Hybrid Method of Data Hiding and Image Compression | 463 |
Using Affective Leaner States to Enhance Learning | 465 |
An Efficient and Secured Media Access Mechanism | 470 |
Collective Intelligence | 472 |
Dynamic Integrated Model for Distributed Multimedia System | 476 |
PilotSymbol Aided SFBCOFDM Channel Estimation | 477 |
A Study of Power Network Stabilization Using an Artificial Neural Network | 479 |
Cryptographic Protocol Design Concept with Genetic Algorithms | 483 |
An Adaptive Repeater System for OFDM with Frequency Hopping Control | 485 |
Autonomous Synchronization Scheme Access Control for Sensor Network | 487 |
An Efficient Backoff Scheme for IEEE 802 11e EDCF Differential Service | 490 |
Intelligent and Effective Digital Watermarking Scheme | 492 |
Speech Authentication by Semifragile Watermarking | 497 |
Performance Improvement of OFDM System | 498 |
Communicative Intelligent I | 500 |
A Programmable Pipelined Queue for Approximate String Matching | 503 |
Arbitrated Verifier Signature with Message Recovery for Proof of Ownership | 504 |
Smart Systems | 505 |
Multiagent System for Web Advertising | 507 |
Chance Discovery I | 511 |
Distributed Web Integration with Multiagent Data Mining | 513 |
A Mobile Agent Approach to Intrusion Detection in Network Systems | 514 |
Computational Methods for Intelligent Neurofuzzy Applications | 518 |
Nontextual Document Ranking Using Crawler Information | 520 |
Waste Incinerator Emission Prediction | 526 |
A Propagation Strategy Implemented in Communicative Environment | 527 |
Local Feature Analysis with Class Information | 532 |
A Context of Creative Design | 533 |
Comparison of the Effectiveness of Decimation | 540 |
Fault Diagnosis of Discrete Event Systems Using Place Invariants | 541 |
Chance Discovery and the Disembodiment of Mind | 547 |
Adaptive Fuzzy OutputFeedback Controller for SISO Affine Nonlinear Systems | 549 |
Soft Computing Techniques and Their Applications III | 554 |
Information Hiding and Multimedia Signal Processing | 561 |
OnLine Reinforcement Learning | 562 |
Using Interval Singleton Type 2 Fuzzy Logic System | 566 |
Copyright Authentication Enhancement of Digital Watermarking | 567 |
Evolutionary and Selforganizing Sensors Actuators | 573 |
Using Rough Set to Reduce SVM Classifier Complexity | 575 |
Compressed Domain Video Watermarking in Motion Vector | 580 |
KnowledgeBased Fuzzy Control of PilotScale SBR for Wastewater Treatment | 608 |
A New Technique of Determining Speakers Intention for Sentences | 612 |
CSFs for HCI in Ubiquitous Computing Environments | 616 |
Analysis of RED with Multiple ClassBased Queues | 618 |
New Approach for Speedingup Technique of the Retrieval | 619 |
Control System for Optimal Flight Trajectories for Terrain Collision Avoidance | 622 |
Learning Behaviors of the Hierarchical Structure Stochastic Automata | 624 |
Multiagent Systems and Evolutionary Computing | 626 |
Parameter Space Exploration of AgentBased Models | 633 |
Design and Implementation of Home Media Server | 635 |
Efficient Preprocessing for Large WindowBased Modular Exponentiation | 640 |
Feature Generation by Simple FLD | 643 |
Location and ContextBased Systems | 649 |
eLearning and | 651 |
Building Hyperheuristics Through Ant Colony Optimization | 654 |
Influence of Music Listening on the Cerebral Activity by Analyzing EEG | 657 |
RealTime Cocomposing System Using Multiaspects | 661 |
An Efficient Eye Location Using ContextAware Binarization Method | 662 |
Modeling Understanding Level of Learner in Collaborative Learning | 665 |
Ubiquitous Pattern Recognition | 668 |
iJADE Tourist Guide A Mobile LocationAwareness AgentBased System | 671 |
New Logical Classes of Plausibility Functions in DempsterShafer Theory | 675 |
Integrated Management of Multilevel Road Network | 677 |
Information TechnologyBased Educational Software Framework | 681 |
Person Tracking with Infrared Sensors | 682 |
BehaviorBased Blind GoalOriented Robot Navigation by Fuzzy Logic | 686 |
Entropy Criterion for ClassifierIndependent Feature Selection | 689 |
News Video Retrieval Using Automatic Indexing of Korean ClosedCaption | 694 |
Finding and Autolabeling of Task Groups on EMails and Documents | 696 |
Architecture of a Web Operating System Based on Multiagent Systems | 700 |
Person Recognition by Pressure Sensors | 703 |
Logic Based Intelligent Information Systems | 708 |
eBased Systems in Education Commerce and Health | 713 |
Representation of Procedural Knowledge of an Intelligent Agent | 714 |
Neural Networks for Data Mining | 716 |
A KnowledgeBased Interaction Model Between Users | 722 |
Detecting Search Engine Spam from a Trackback Network in Blogspace | 723 |
Nonalethic Reasoning in Distributed Systems | 724 |
The Searching Methods of Mobile Agents | 728 |
Analysis for Adaptability of PolicyImproving System with a Mixture Model | 730 |
A Connectionist Model for Predicate Logic Reasoning | 732 |
Synthetic Character with Bayesian Network and Behavior Network | 737 |
Parallel Stochastic Optimization for Humanoid Locomotion | 738 |
A Time Judgement System Based on an Association Mechanism | 742 |
Visualizing Dynamics of the Hot Topics | 745 |
A Deductive Semantic Brokering System | 746 |
ResponseDriven WebBased Assessment System | 749 |
Intelligent Environments for NextGeneration eMarkets | 751 |
Intelligent Consumer Purchase Intention Prediction System for Green Products | 752 |
Intelligent Systems for eBusiness and eLearning II | 758 |
Specifying Distributed Authorization with Delegation | 761 |
Computational Biology and Bioinformatics | 763 |
A My Page Service Realizing Method by Using Market Expectation Engine | 765 |
Dynamic Location Management for OnDemand Car Sharing System | 768 |
Multiagent Modeling of Peer to Peer Communication | 772 |
Intelligent Data Analysis Decision Making and Modelling Adaptive Financial | 775 |
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data | 777 |
A CaseOriented Game for Business Learning | 779 |
Development of Judging Method of Understanding Level in Web Learning | 781 |
Learning ValueAdded Information of Asset Management | 785 |
A Medical Advisory System | 789 |
A Hybrid Approach to Combine HMM and SVM Methods | 792 |
eLearning Materials Development Based on Abstract Analysis | 794 |
An Efficient Method for Creating Requirement Specification | 799 |
Complex Adaptive Systems | 806 |
Study on the Velocity of Saccadic Eye Movements | 808 |
A Burglary Data Case Study | 813 |
Adaptation on the Commons | 820 |
Innovations in Intelligent Agents | 821 |
New Directions | 825 |
An Automated Argument System Based on Logic | 830 |
Hyperspectral Image Watermarking with an Evolutionary Algorithm | 833 |
Supporting Adaptive Learning with High Level Timed Petri Nets | 834 |
Cognitive Hybrid Reasoning Intelligent Agent System | 838 |
Blind Signal Separation Through Cooperating ANNs | 847 |
Generating CG Movies Based on a Cognitive Model of Shot Transition | 848 |
Reasoning About Time in a BDI Architecture | 851 |
Sustainable Memory System Using Global and Conical Spaces | 861 |
Classifier Fusion to Predict Breast Cancer Tumors | 866 |
Locomotion Control Technique for Immersive Conversation Environment | 875 |
Intelligent Human Computer Interaction Systems | 880 |
A Robust and Invisible Watermarking of 3D Triangle Meshes | 881 |
Analysis and Synthesis of HelpDesk Responses | 890 |
Attribute Intensity Calculating Method from Evaluative Sentences | 893 |
Improving Search on WWW HR Web Directory by Introducing Ontologies | 894 |
Extended Fuzzy Description Logic ALCN | 896 |
Development of a New Vocal Cords Based on Human Biological Structures | 908 |
Weak Key Analysis and Microcontroller Implementation | 910 |
An Experimental Study on Computer Programming with Linguistic Expressions | 911 |
Ontology Modeling and Storage System for Robot Context Understanding | 922 |
Effect of Direct Communication in Ant System | 925 |
Clustering Categorical Streams Using Attribute Selection | 929 |
ActivityObject Bayesian Networks for Detecting Occluded Objects | 937 |
Experience Management and Knowledge Management | 938 |
Combining an OrderSemisensitive Text Similarity and Closest Fit Approach | 943 |
Design of a Simultaneous Mobile Robot Localization | 945 |
A Framework of Checking Subsumption Relations Between Composite Concepts | 953 |
An Adaptive Forecasting Method for Data Streams | 957 |
Mining Classification Rules Using Evolutionary Multiobjective Algorithms | 959 |
TwoPhase Path Retrieval Method for Similar XML Document Retrieval | 967 |
Computational Intelligence Tools Techniques and Algorithms | 972 |
Using Artificial Neural Network Ensembles to Extract Data Content | 974 |
A Mutual Influence Algorithm for Multiple Concurrent Negotiations | 986 |
Network Security RealTime and Fault Tolerant Systems | 987 |
Program Simplification in Genetic Programming for Object Classification | 988 |
The Interactive Evolutionary Computation Based on the Social Distance | 991 |
Algorithms for CTL System Modification | 1000 |
Wavelength Converter Assignment Problem in All Optical WDM Networks | 1004 |
Multimedia Security and Stegnography | 1005 |
An Efficient MDS Algorithm for the Analysis | 1015 |
A Preliminary Design for a PrivacyFriendly Free P2P Media File | 1018 |
Mobile Agent System | 1021 |
SE33Intelligent IDBased Threshold System by an Encryption | 1022 |
A New Steganography Scheme in the Domain | 1032 |
A Quantitative Trust Model Based on Multiple Evaluation Criteria Hak Joon Kim and Keon Myung Lee | 1036 |
Method of Hiding Information in Agglutinative Language Documents | 1039 |
Performance Analysis of a Antenna Array System | 1050 |
Dual Communication System Using Wired and Wireless | 1051 |
Stegnography | 1058 |
Theory and Application of Artificial Neural Networks | 1064 |
Intelligent Method for Building Security Countermeasures | 1069 |
A Verifiable Fingerprint Vault Scheme | 1072 |
A Genetic Information Based Load Redistribution Approach | 1081 |
Audio CoFIP Contents Fingerprinting Robust Against Collusion Attack Kotaro Sonoda Ryouichi Nishimura and Yˆoiti Suzuki | 1083 |
Data Hiding in a Hologram by Modified Digital Halftoning Techniques | 1086 |
Approaches and Methods of Security Engineering II | 1094 |
A New Watermark Surviving After Reshooting | 1099 |
A Reversible Information Hiding Scheme Based on Vector Quantization | 1101 |
Implementation of Adaptive ReedSolomon Decoder | 1111 |
Soft Computing Approach to Industrial Engineering II | 1115 |
A Relationship Between Products Evaluation and IT Systems Assurance | 1125 |
The Air Pollution Constraints Considered Best Generation Mix | 1129 |
Gesture Recognition by Attention Control Method | 1139 |
Ranking Functions Perceptrons and Associated Probabilities | 1143 |
System Architecture Analysis of a Hybrid Watermarking Method | 1145 |
Intelligent Multimedia Service System | 1146 |
Watermarking with Association Rules Alignment | 1159 |
A General Fuzzy Min Max Neural Network | 1160 |
Condition Monitoring Capability Developed Through a Knowledge | 1173 |
Extracting High Quality Scenario | 1174 |
Improved Method of Spread Spectrum Watermarking Techniques | 1175 |
An Approach to Automatic Text Production | 1187 |
Multimedia Retrieval I | 1190 |
Intelligent Watermarking Algorithms | 1193 |
Effective Video Scene Detection Approach Based on Cinematic Rules | 1197 |
Physiological Modeling and Simulation for Aerobic Circulation | 1204 |
Neural Network Based Image Retrieval | 1210 |
Improved Quantization Watermarking with an Adaptive Quantization Step Size | 1212 |
Knowledge Based Intelligent Systems for Health Care | 1218 |
Method for Searching Similar Images Using Quality Index Measurement | 1224 |
Implementation of Image Steganographic System Using Wavelet Zerotree | 1226 |
Leximancer Concept Mapping of Patient Case Studies | 1232 |
A RSTInvariant Robust DWTHMM Watermarking Algorithm | 1233 |
Automated Information Mining on Multimedia TV News Archives | 1238 |
Preprocessing for Extracting Information from Medical Record | 1246 |
Soft Computing Techniques and Their Applications II | 1248 |
A Distributed Backup Agent Based on Grid Computing Architecture | 1252 |
Health Support Intelligent System for Diabetic Patient by Mobile Phone | 1260 |
Automatic Extraction System of a Kidney Region Based on the QLearning | 1261 |
An Intelligent Extracting Web Content Agent on the Internet | 1265 |
Intelligent Learning Environment | 1274 |
Word Sense Disambiguation of Thai Language with Unsupervised Learning | 1275 |
Trend of Fuzzy Multivariant Analysis in Management Engineering | 1283 |
A Visualization System for Organizing and Sharing Research Information | 1288 |
Binary Neural Networks A CMOS Design Approach | 1291 |
Experience Management and Information Systems | 1298 |
Automatic Generation of Answers Using Solution Network | 1303 |
Automatic Detection of Failure Patterns Using Data Mining | 1312 |
Knowledge Level Design Support | 1317 |
Automatic Classification Using Decision Tree and Support Vector Machine | 1325 |
A New Algorithm to Discover PageAction Rules on Web HengLi Yang and QingFung Lin | 1331 |
Mining Association Rules from Distorted Data for Privacy Preservation Peng Zhang Yunhai Tong Shiwei Tang and Dongqing Yang | 1345 |
Individualized Product Design by Evolutionary Algorithms Maik Maurer and Udo Lindemann | 1359 |
Building the Fuzzy Control System Based on the Pilot Knowledge Michał Lower Dariusz Krol and Bogusław Szlachetko | 1373 |
1381 | |
Other editions - View all
Knowledge-Based Intelligent Information and Engineering Systems: Pt. III ... Robert J. Howlett No preview available - 2005 |
Common terms and phrases
algorithm analysis application approach architecture Artificial Intelligence Berlin Heidelberg 2005 block cache classified client cluster cluster-heads communication Computer concept data mining database defined detection distributed domain dynamic ebXML Engineering environment evaluation extracted frame function fuzzy genetic algorithm goal Heidelberg IEEE implemented input integration intelligent interaction Internet Japan JPEG-LS JXTA keyword Khosla Korea layer learning LNAI matching metadata mobile agent module motifs motion estimation multi-agent multi-agent system multimedia neural network node ontology optimal output OWL-S paper parameters password pattern performance pixel prediction problem protocol PSNR Q-learning quantization query region retrieval scheme Section selected semantic sensors Seoul sequence server signal similarity simulation Springer-Verlag Berlin Heidelberg Step strategy structure T-Money Table techniques Technology tion traffic TV-Anytime UDDI undeniable signature University vector