Knowledge-Based Intelligent Information and Engineering Systems
9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV
By: Rajiv Khosla (Editor)
Paperback | 30 August 2005
At a Glance
1020 Pages
23.39 x 15.6 x 5.08
Paperback
$187.31
or 4 interest-free payments of $46.83 with
orAims to ship in 7 to 10 business days
A method for optimal division of data sets for use in neural networks | p. 1 |
Excluding fitness helps improve robustness of evolutionary algorithms | p. 8 |
Testing voice mimicry with the YOHO speaker verification corpus | p. 15 |
Image multi-noise removal via Levy process analysis | p. 22 |
Evaluating the size of the SOAP for integration in B2B | p. 29 |
Personalised search on electronic information | p. 35 |
Data mining coupled conceptual spaces for intelligent agents in data-rich environments | p. 42 |
An evolutionary algorithm for constrained bi-objective optimization using radial slots | p. 49 |
An optimization approach for feature selection in an electric billing database | p. 57 |
Integrating relation and keyword matching in information retrieval | p. 64 |
Production testing of spark plugs using a neural network | p. 74 |
Variable neighborhood search with permutation distance for QAP | p. 81 |
Using rough set to induce comparative knowledge and its use in SARS data | p. 89 |
Mining class association rules with artificial immune system | p. 94 |
Discovering fuzzy association rules with interest and conviction measures | p. 101 |
Automatic generation of operation manuals through work motion observation | p. 108 |
A method of controlling household electrical appliance by hand motion in LonWorks | p. 115 |
Contribution of biological studies to the understanding and modeling of skilled performance : some examples | p. 124 |
Measurement of human concentration with multiple cameras | p. 129 |
Constructive induction-based clustering method for ubiquitous computing environments | p. 136 |
Indoor location determination using a topological model | p. 143 |
Lightweight agent framework for camera array applications | p. 150 |
The location of optimum set-point using a fuzzy controller | p. 157 |
Genetic modeling : solution to channel assignment problem | p. 164 |
On self-organising diagnostics in impact sensing networks | p. 170 |
A coevolutionary algorithm with spieces as varying contexts | p. 179 |
Hybrid filter fusion for robust visual information processing | p. 186 |
Edge detection in digital image using variable template operator | p. 195 |
Combining demographic data with collaborative filtering for automatic music recommendation | p. 201 |
Different perspectives on modeling workflows in an agent based workflow management system | p. 208 |
An agent-enhanced workflow management system | p. 215 |
Knowledge sharing between design and manufacture | p. 221 |
Toward improvement-oriented reuse of experience in engineering design processes | p. 228 |
A hybrid approach to determining the best combination on product form design | p. 235 |
Utilizing active software to capture tacit knowledge for strategic use | p. 242 |
A bandwidth efficiency of Lempel-Ziv scheme for data authentication | p. 249 |
Research on confidential level extended BLP model | p. 257 |
Secure tamper localization in binary document image authentication | p. 263 |
A seal imprint verification with rotation invariance | p. 272 |
Robust authenticated encryption scheme with message linkages | p. 281 |
BPCS-steganography - principle and applications | p. 289 |
Improved video watermark detection using statistically-adaptive accumulation | p. 300 |
Comparison of feature extraction techniques for watermark synchronization | p. 309 |
Reversible watermarking based on improved patchwork algorithm and symmetric modulo operation | p. 317 |
Spatial knowledge-based applications and technologies : research issues | p. 324 |
Managing spatial knowledge for mobile personalized applications | p. 329 |
Geospatial clustering in data-rich environments : features and issues | p. 336 |
Spatio-temporal modeling of moving objects for content- and semantic-based retrieval in video data | p. 343 |
Calendars and topologies as types | p. 352 |
Moving object detection in dynamic environment | p. 359 |
A general framework based on dynamic constraints for the enrichment of a topological theory of spatial simulation | p. 366 |
Automatic geomorphometric analysis for digital elevation models | p. 374 |
The study of electromagnetism-like mechanism based fuzzy neural network for learning fuzzy if-then rules | p. 382 |
Statistical data analysis for software metrics validation | p. 389 |
A multi-stage fuzzy-grey approach to analyzing software development cost | p. 396 |
A two-phased ontology selection approach for semantic Web | p. 403 |
A method for acquiring fingerprint by linear sensor | p. 410 |
Evaluation and NLP | p. 417 |
A handwriting tool to support creative activities | p. 423 |
Natural storage in human body | p. 430 |
Computerized support for idea generation during knowledge creating process | p. 437 |
Awareness in group decision : communication channel and GDSS | p. 444 |
Aware group home : person-centered care as creative problem solving | p. 451 |
COLLECT-UML : supporting individual and collaborative learning of UML class diagrams in a constraint-based intelligent tutoring system | p. 458 |
Using affective leaner states to enhance learning | p. 465 |
Three foraging models comprised of ants with different pheromone sensitivities | p. 472 |
Emerging of an object shape information caused by signal-transmission relay of multi-robots | p. 480 |
Autonomous synchronization scheme access control for sensor network | p. 487 |
Supporting design for manufacture through neutral files and feature recognition | p. 496 |
A programmable pipelined queue for approximate string matching | p. 503 |
A framework for mining association rules | p. 509 |
Near-optimal fuzzy systems using polar clustering : application to control of vision-based arm-robot | p. 518 |
Door traversing for a vision-based mobile robot using PCA | p. 525 |
Local feature analysis with class information | p. 532 |
Training of feature extractor via new cluster validity - application to adaptive facial expression recognition | p. 542 |
Adaptive fuzzy output-feedback controller for SISO affine nonlinear systems without state observer | p. 549 |
High-speed extraction model of interest region in the parcel image of large size | p. 559 |
Using interval singleton type 2 fuzzy logic system in corrupted time series modelling | p. 566 |
Defining and detecting emergence in complex networks | p. 573 |
Annealing sensor networks | p. 581 |
Measuring global behaviour of multi-agent systems from pair-wise mutual information | p. 587 |
In use parameter estimation of inertial sensors by detecting multilevel quasi-static states | p. 595 |
Self-restructuring peer-to-peer network for e-learning | p. 602 |
An improvement approach for word tendency using decision tree | p. 606 |
A new technique of determining speaker's intention for sentences in conversation | p. 612 |
New approach for speeding-up technique of the retrieval using dynamic full-text search algorithm | p. 619 |
Dafo, a multi-agent framework for decomposable functions optimization | p. 626 |
Parameter space exploration of agent-based models | p. 633 |
Efficient pre-processing for large window-based modular exponentiation using ant colony | p. 640 |
COSATS, X-COSATS : two multi-agent systems cooperating simulated annealing, tabu search and X-over operator for the K-graph partitioning problem | p. 647 |
Building hyper-heuristics through ant colony optimization for the 2D bin packing problem | p. 654 |
Real-time co-composing system using multi-aspects | p. 661 |
Empirical study on usefulness of algorithm SACwRApper for reputation extraction from the WWW | p. 668 |
New logical classes of plausibility functions in Dempster-Shafer theory of evidence | p. 675 |
Person tracking with infrared sensors | p. 682 |
Entropy criterion for classifier-independent feature selection | p. 689 |
Finding and auto-labeling of task groups on e-mails and documents | p. 696 |
Person recognition by pressure sensors | p. 703 |
Extraction and revision of signboard images for recognition of character strings | p. 709 |
Model selection and weight sharing of multi-layer perceptrons | p. 716 |
Detecting search engine spam from a trackback network in blogspace | p. 723 |
Analysis for adaptability of policy-improving system with a mixture model of Bayesian networks to dynamic environments | p. 730 |
Parallel stochastic optimization for humanoid locomotion based on neural rhythm generator | p. 738 |
Visualizing dynamics of the hot topics using sequence-based self-organizing maps | p. 745 |
Intelligent consumer purchase intention prediction system for green products | p. 752 |
Reverse-query mechanism for contents delivery management in distributed agent network | p. 758 |
A My Page service realizing method by using market expectation engine | p. 765 |
Multi-agent modeling of peer to peer communication with scale-free and small-world properties | p. 772 |
A case-oriented game for business learning | p. 779 |
Learning value-added information of asset management from analyst reports through text mining | p. 785 |
HHM-based risk management for business gaming | p. 792 |
An efficient method for creating requirement specification of plant control software using domain model | p. 799 |
The study and application of crime emergency ontology event model | p. 806 |
From links to meaning : a burglary data case study | p. 813 |
A methodology for constructing decision support systems for crime detection | p. 823 |
AASLMA : an automated argument system based on logic of multiple-valued argumentation | p. 830 |
Trust and information-taking behavior in the Web community | p. 839 |
Robust intelligent tuning of PID controller for multivariable system using clonal selection and fuzzy logic | p. 848 |
Intelligent control of AVR system using GA-BF | p. 854 |
Fault diagnosis of induction motor using linear discriminant analysis | p. 860 |
Classifier fusion to predict breast cancer tumors based on microarray gene expression data | p. 866 |
An efficient face detection method in color images | p. 875 |
A robust and invisible watermarking of 3D triangle meshes | p. 881 |
Advances of MPEG scalable video coding standard | p. 889 |
Extended fuzzy description logic ALCN | p. 896 |
Automated operator selection on genetic algorithms | p. 903 |
Weak key analysis and micro-controller implementation of CA stream ciphers | p. 910 |
Table of Contents provided by Blackwell. All Rights Reserved. |
ISBN: 9783540288978
ISBN-10: 354028897X
Series: Lecture Notes in Computer Science
Published: 30th August 2005
Format: Paperback
Language: English
Number of Pages: 1020
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6 x 5.08
Weight (kg): 1.4
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
Machine Learning with Python Cookbook
2nd Edition - Practical Solutions from Preprocessing to Deep Learning
Paperback
RRP $121.75
$53.75
OFF
This product is categorised by
- Non-FictionEngineering & TechnologyElectronics & Communications EngineeringElectronics Engineering
- Non-FictionComputing & I.T.Computer ScienceArtificial IntelligenceExpert Systems & Knowledge-Based Systems
- Non-FictionComputing & I.T.DatabasesData Capture & Analysis
- Non-FictionBusiness & ManagementBusiness Mathematics & Systems
- Non-FictionComputing & I.T.Information Technology General IssueEthical & Social Aspects of IT
- Non-FictionScienceBiology, Life Sciences
- Non-FictionComputing & I.T.Computer Programming & Software DevelopmentSoftware Engineering